IT Consultants' Insight on Business Technology | NSK Inc.

Office 365: Get It Done from Anywhere

Posted by Cathie Briggette

Wed, Dec 17, 2014

Whatever device you are working on -- PC, Mac, Tablet, phone -- Office 365 gives you access to everything you need -- your documents, email, calendars, contacts and team sites all come with you.  Your settings roam with you too, so your files are up to date and ready for you to pick up right where you left off, no matter what device your are using.  You are now able to work across all devices, from anywhere and have a consistent, clean, fast experience doing it.

Read More

Topics: Microsoft Office 365 Suite

A New Technology for Prosthetic Skin

Posted by Davide Palumbo

Wed, Dec 17, 2014

Some prosthetic limbs are so advanced that they can be controlled by their owners, using nerves, muscles, or even the brain. Unfortunately, no bionic arm of leg will ever be able to provide an absolute feeling of realism until they have a skin that can actually sense the external environment and send the collected information back to the amputee’s nervous system.

Read More

Topics: Technology, Seoul National University, Science Research, PDMS, Prosthetic Skin

SoakSoak: The Mysterious Malware That Has Infected 100,000+ WordPress Sites

Posted by Davide Palumbo

Tue, Dec 16, 2014

A Russian malware called SoakSoak has infected over 100,000 WordPress sites since Sunday, December 14th, turning blogs into attack platforms. The malware attempts to install dangerous programs on your computer that could possibly steal or delete your information. In an attempt to curb the damage, more than 11,000 websites have been blacklisted by Google after they were found infected. According to security firm Sucuri, which is the first security firm that reported on the blacklisting, the malware uses a vulnerability in a slideshow plug-in called Slider Revolution. The Slider Revolution team have already fixed it with updates. Unfortunately, the problem is that the old, vulnerable version of the plug-in is still bundled with WordPress themes, so lots of sites are still using the wrong version. SoakSoak modifies a file in infected sites’ WordPress installation, then it loads a JavaScript malware from the soaksoak.ru domain, which is where the malware’s name comes from.

Read More

Topics: Google, malware, SoakSoak, WordPress

YLastic: The Tool that Leverages The AWS Cloud Computing Enviroment

Posted by Davide Palumbo

Wed, Dec 10, 2014

Ylastic is a great web based tool that allows IT Technicians to manage all of the components of AWS (Amazon Web Services) from either a web browser or mobile device, including iPhone and Google’s Android platform.

Read More

Topics: backup, Amazon Web Services, YLastic, Amazon Machine Images

The Dark Side of a Good Deal

Posted by Davide Palumbo

Fri, Dec 05, 2014

With Black Friday and Cyber Monday, the holiday spending season has finally begun, and many retailers are offering bargains on consumer electronics. In particular, big names retailers like Best Buy, Walmart, Target, Kmart, Kohl’s, and Staples offer advantageous deals on their Android tablets which might be however unsafe from a security standpoint.

Read More

Topics: Security breach, Bluebox Lab, Android

Wanted in Boston IT Field Services & Help Desk Technician

Posted by Cathie Briggette

Thu, Dec 04, 2014


NSK Inc., located in downtown Boston, is looking for a new Full-Time IT Field Tech to join the team! This position provides IT consulting, network administration and remote support to keep our client’s up-to-date with industry standards. The ideal candidate will come equipped with strong trou­bleshooting abil­ities, aided by the ability to think crit­i­cally in all types of situ­a­tions. This a great opportunity for anyone experienced in the technical arena looking to work with the latest technology solutions, and get the hands-on experience needed to continue advancement in their career. If you are interested, please visit our website, www.NSKinc.com , and email your interest to careers@NSKinc.com.

Read More

Topics: Job Opening, Jobs

Christmas 2014: A Guide for your Tech Gifts

Posted by Davide Palumbo

Thu, Dec 04, 2014

The Holiday Season has finally started, and with Christmas around the corner, it is time to start gearing up for some Christmas shopping. However, buying the right thing for your loved ones is always a challenge, and it is even more so when your special someone is a geek. If the cool idea for a geeky boyfriend, husband, father or brother is what you are looking for, we might have a few suggestions to share with you. Here is a list of 12 tech gadgets that might become a precious life line for those who need help in selecting the most appropriate Christmas gift.

Read More

Topics: iPhone, Tech, 3 D printing, Gift Ideas, Christmas, Holiday Season, Wireless, USB

Merry Christmas & Happy New Year from Your Boston IT Experts

Posted by Cathie Briggette

Mon, Dec 01, 2014

The NSK Inc Team would like to wish you warm thoughts and best wishes for a wonderful holiday and a very Happy New Year.

As the holiday season approaches, we’d like to take this opportunity to thank you for your continued partnership.  It is business associates like you who make our jobs a pleasure and keep our company successful.

May your holiday season and the new year be filled with much joy, happiness and success.  We look forward to working with you in the coming year and hope our business relationship continues for many years to come.

Happy Holidays!

NSK Inc

Read More

Topics: IT Solutions, IT services Boston, IT Solutions Boston

Regin: The Malware That Has Been Spying On Computers Since 2008

Posted by Davide Palumbo

Tue, Nov 25, 2014

Symantec has found an advanced malicious software application that appears to have been used for spying and collecting data across the globe. Named Backdoor.Regin, or simply Regin, the software is essentially a very powerful Trojan Horse that appears to have been circulating since 2008. It has been hitting government agencies, internet providers, telecom companies, airlines, industrial entities, research institutes, energy companies, and individual systems with impunity, using sophisticated encryption and targeting systems to spy on targets. It is speculated that most infections came from computers visiting "spoofed versions of well-known websites," says Symantec, though one case confirms Yahoo! Messenger was also involved.

Read More

Topics: malware, cyber attack, Symantec, Cybersecurity, Regin

Why should I use an IT Managed Services Provider?

Posted by Cathie Briggette

Mon, Nov 24, 2014

IT Managed Services for SMBs

One question consistently asked by our clients is, “Why should we use your Managed Services?”  Many of these clients perceive that it would be better and more cost effective for them just to contact us as their technology issues arise.  It is a common misconception that having their technology under a Managed Services agreement is like insurance and that they would be paying for something they may or may not use.  Nothing could be further from the truth. 

Read More

Topics: IT management, Managed IT Services, Managed Services