Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Has Malware Made a Home in Your Router?

Has Malware Made a Home in Your Router?

Hackers and cybercriminals, like most people, tend to gravitate towards high-reward activities. In this case, that means that focus is turning to creating malware that attacks the router, potentially infecting the users that leverage it to connect wirelessly to the Internet. Researchers at Kaspersky Lab recently discovered an example of such a malware, so today, we will review this threat and how to best protect your network.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessNetwork SecurityMobile DevicesHardwareIT ServicesProductivitywindowsUpgradeComputerEmailDataCommunicationSaving MoneyGadgetsSmartphonesIT SupportMiscellaneousVirtualizationAppsWindows 10SmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityVoIPServerBrowserMobile Device ManagementMicrosoft OfficeMobile ComputingSocial MediaTech TermInformation TechnologyHealthAndroidQuick TipsPasswordsCybersecurityData BackupOffice 365Mobile OfficeHolidayWindows 10Going GreenOperating SystemData RecoveryOfficeSave MoneyChromecommunicationsAppApplicationInternet of ThingsAlertEmployer-Employee RelationshipBest PracticeCollaborationspamUsersBYODCybercrimeOutsourced ITSearchRansomwareData SecurityLaw EnforcementManaged IT ServicesIT SupportMarketingFacebookWearable TechnologyWirelessAppleVendor ManagementWiFiRemote ComputingBring Your Own DevicePhishingThe Internet of ThingsTabletCost ManagementUser ErrorRemote MonitoringMaintenanceSaving TimeMobilityAntivirusUnified Threat ManagementAvoiding DowntimeAutomationHistoryMoneyHackingRouteriPhoneWireless TechnologyBDRRisk ManagementGovernmentArtificial IntelligenceBandwidthCustomer Relationship ManagementOffice TipsPasswordIT SolutionsCloud ComputingTech SupportBig DataData ManagementComputersEncryptionSocialHard DrivesTelephone SystemsOneNoteProactive ITFirewallSocial NetworkingBudgetLithium-ion batteryCurrent EventsPhone SystemVPNHumorManaged IT ServicesTwo-factor AuthenticationInformationWebsiteUpdateNet NeutralityEducationUnsupported SoftwarePrinterWi-FiShortcutOutlookVulnerabilityGmailUSBPowerPointNetworkingAnalyticsGoogle DriveStreaming MediaComputer RepairTrendingApplicationsAuditManaged ITEntertainmentBatteryIntranetVirusRecoveryLaptopBlockchainAugmented RealityPersonal InformationContent FilteringadministrationIdentity TheftWordDisasterTelevisionWork/Life BalanceRetailExcelManaged ServicePaperless OfficeMobile DeviceMeetingsTelephonyPoliticsTravelSocial EngineeringIT COnsultantAccess ControlHuman ResourcesDDoSMobile SecurityFile SharingWannaCryData BreachInstant MessagingEmailsProject ManagementOnline CurrencyYoutubeTouchscreenCortanaEvernoteSportsHybrid CloudSamsungBenefitseWasteComputer AccessoriesUninterrupted Power SupplySalesHard DriveSaaSAutomobileValueCleaningPoint of SalePrinter ServerHaaSPrintingSave TimeData ProtectionProgrammingManaging StressTwitterComputer CareStorageGoogle AssistantConferencingIT ManagementhackerDisplayAmazonWindows 8DevicesOneDriveLegalHosted SolutionTransportationFax ServerCommercePatch ManagementEnd of SupportBusiness IntelligenceFlexibilityData LossCustomer ServiceComputingFraudBiometricsGoogle DocsPrivate CloudVirtual RealityBusiness TechnologyData StorageScamHIPAAWireless ChargingInternet ExlporerIT consultingTestingScreen MirroringCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingMedical ITConsultantBooksTouchpadFinancialNokiaReliable ComputingCameraGift GivingCastAdminDistributed Denial of ServiceBlack MarketComplianceIdentity5GMonitorsElectronic Medical RecordsBloatwareProjectsIT budgetKeyboard ShortcutsMicrobloggingLicensingInbound MarketingData PrivacyEmployeesWebinarLegislationCommunityNanotechnologyWorkersFilesSafetyOperating SysytemVirtual AssistantISPWindows 7PayrollTrainingTabletsBrandingIntrantetMouseChromebookVoice over Internet ProtocolIT solutionsComparisonRoot Cause AnalysisUpdatesChromecastHBOAlexa for BusinessWIndows 7Co-Managed ServicesBloggingIdentitiesSecurity CamerasWebinarTutorialCompany CultureNFLImagesNetwork CongestionSabotageWindows 10sSpecificationsMicrosoft WordReputationRegulationsTelephoneLanguageMachine LearningBluetoothWorker CommuteAdministratorjunkPCSolid State DriveCo-managed ITSettingsDevice SecurityKeyboardCamerasSoftware as a ServiceUserHyperlinkDowntimeDebateWindows InkHelp DeskSharePointVideo GamesAccessfilterComputer ForensicsSmartwatchHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationBest AvailableWasting TimeProactiveE-CommercePrint ServerGoogle MapsTeamworkCredit CardsScienceManagementServer MaintenanceVendorSpywareSmart TechnologyAccessoryEbayWebsitesPayment CardsFAQRobotWireless InternetInvestmentEmployee-Employer RelationshipLifestyleSyncBuisnessAdvertisingRunning CableScalabilityPeripheralData TheftEmployeeiOSChargerExperienceData storageGamificationROINear Field CommunicationEdgePDFHow ToApp storeBreak/FixUpgradesMicrosoft ExcelComputer FanMusic3D PrintingMemory