14 Security Solutions Vulnerable to Double Agent Malware

Double Agent Malware Infects Security Solutions A malware attack dubbed Double Agent has been discovered by security vendor, Cybellum.  It is reported, although this attack has been discovered, it has not been yet witnessed in the public. Double Agent effectively uses a 15 year-old vulnerability within the Windows operating system.  The security gap is associated with […]

Continue reading


PC Matic or PC Matic Pro — Which Solution is Best for You?

PC Matic

PC Matic Compared to PC Matic Pro Often times, we get questions from potential consumers asking which security solution would best meet their needs, PC Matic or PC Matic Pro.  To address this, we created the table below which provides the different features in each solution.  Additional information regarding each feature is included below. Application […]

Continue reading


New Bill About to Pass in Indiana Focusing on Cyber Crime

Indiana Works to Pass Cyber Crime Bill We recently discussed the law enforcement’s actions towards cyber criminals, or lack thereof.  Understandably, it is difficult to track down cyber criminals overseas.  It is also understandable that it may be increasingly difficult due to the effort the hackers put into covering their tracks.  However, they are still […]

Continue reading


Richmond Housing Agency Loses Data After Ransomware Attack

Richmond Housing Agency Lost a Month’s Worth of Data The Richmond Housing Agency, in Indiana, was recently hit with a ransomware attack.  The systems were infected in on February 27, 2017.  The ransomware variant is believed to have ties back to India.  After encrypting the housing agency’s systems, hackers demanded $8,000 to restore the company’s […]

Continue reading


Metropolitan Urology Group Suffers Breach Due to Ransomware Attack

Metropolitan Urology Group Found Patient Information Leaked During Ransomware Attack In November, 2016, the Metropolitan Urology Group (MUG) was hit with a ransomware attack.  Two months later, in January, 2017, MUG discovered the hackers obtained private, patient information during the attack.  The patients impacted are those who rendered services between 2003 and 2010.  The information exposed […]

Continue reading


Appropriate Defense Against Ransomware is Not Backups

The Today Show featured another piece on cyber security today, this time discussing ransomware.  During which, Tom Costello claimed the best way to protect yourself from a ransomware attack is to back up your data.  This cannot be further from the truth.  First of all, backups do not protect you from becoming a victim of ransomware.  It can be […]

Continue reading


Twitter Hacked and It Appears the Turks Are to Blame

Twitter Hacked Leaving Nazism Messages Today, dozens of Twitter accounts were hacked impacting various individuals from the European Parliament, UNICEF USA and BBC North America.  It is believed the attacks originated due to a diplomatic spat between Germany, Turkey and the Netherlands.  According to MSN, the Germans and Dutch barred Turkish ministers from campaigning in […]

Continue reading


Canadian Revenue Agency Goes Offline As Security Breach Precaution

Canadian Revenue Agency Uses Precautionary Measures On March 10, 2017 the Canadian Revenue Agency (CRA) took their operations offline after discovering a potential security vulnerability.  After 90 minutes, they were back online; however, by mid afternoon on Friday, they took their site offline again.  The CRA assured users this was simply a precautionary measure, and […]

Continue reading


Phishing Attack Compromised 1,600 School Employees’ W-2s

Connecticut Schools Hit Hard By Phishing Attacks Glastonbury Public Schools in Connecticut was the recent victim of a phishing attack.  The phishing attack resulted in 1,600 W-2s being compromised.  The school district is uncertain who exactly had their information exposed.  However, they did report the food service personnel do not need to be concerned about […]

Continue reading


Wood River Police Department Catches Ransomware Before Major Issues Presented

Wood River Police Department of Illinois Hit With Ransomware According to The Telegraph, on March 5, 2017 the Wood River Police Department was hit with a malicious phishing attack that included ransomware.  The phishing attack was successful, infecting one computer.  However, the issues that presented after the attack set off red flags for the officers. […]

Continue reading


“Perhaps, as an industry, we’re going insane.” – CyberEdge Group CEO

CyberEdge Group Releases Cyberthreat Defense Report CyberEdge Group, a research and marketing firm serving the security industry’s top vendors, shared the results of its fourth-annual Cyberthreat Defense Report.  Key findings suggest, the security industry may be going insane.  CyberEdge group CEO, Steve Piper states, “If the definition of insanity is doing the same thing repeatedly and […]

Continue reading


“I was skeptical of the whitelist approach…”

Houston County Schools, in Alabama, has been using PC Matic Pro to protect America’s most valuable asset, education.  Bob Blalock, Technology Coordinator for Houston County Schools, shared his experience with PC Matic Pro, their whitelist technology and technical support. Bob Blalock, Technology Coordinator, Houston County Schools: “We were a Sophos customer for about 10 years […]

Continue reading


State Senate Crippled After Ransomware Attack

PA State Senate Ransomware Attack Pennsylvania senators were unable to access their computer networks and data after ransomware took over the Pennsylvania Senate’s computer systems.  According to 10 TV, the attack hasn’t affected the state’s networks, which are separate from the Senate’s computers. The ransomware variant that successfully infiltrated the Senate’s system is not being disclosed, nor […]

Continue reading


PC Matic Removes Registry Cleaning Tool From Default Programming

PC Matic

Registry Cleaning Tool Removed From PC Matic Default Effective immediately, PC Matic will be removing the registry cleaning from the default version of its security software.  The option will remain within PC Matic; however, in order to use it, subscribers will need to enable the feature.  Step-by-step instructions on how to do so, are provided at […]

Continue reading


Corporations Boost Bitcoin Supply in Preparation for Ransomware Attacks

Companies Are Prepping to Pay Cyber Criminals According to Coin Telegraph, many corporations are preparing for ransomware attacks by increasing their supply of the non-traceable currency, bitcoins.  Since bitcoins are not traceable, it is typically the currency of choice by hackers. Am I the only one who thinks this is absolutely absurd? Malware attacks of […]

Continue reading


Malware Prevention Tops IT Pros List of Security Priorities

Malware Prevention Deemed Higher Priority Than Detection According to a recent study conducted by Barkley, 51% of IT pros would allocate additional funds to malware prevention over detection and recovery efforts.  This should come as no surprise, considering one in three respondents gave their organizations a failing grade when it comes to prevention of malware […]

Continue reading


2.2M Voice Recordings Leaked From Children’s Toy, CloudPets

CloudPets Breached Leaving 820k Users Exposed The children’s toy, CloudPets, has been breached, leaving 820,000 users exposed.  This led to an estimated 2.2 million voice recordings between parents and their children being leaked.  What is most shocking is just how avoidable this data breach was. According to Troy Hunt, the platform the toy used, MongoDB, did […]

Continue reading


How PC Matic Pro Stacks Up Against Its Competition

What is PC Matic Pro? PC Matic Pro, developed by PC Pitstop, is the professional version of the advanced security solution, PC Matic.  PC Matic Pro is researched, developed and supported in the United States.  This innovative security solution is available for businesses, government facilities, nonprofit organizations and educational institutions. Advanced Malware Detection PC Matic Pro offers an automated […]

Continue reading


3,400 Websites Compromised After Cloudflare Breach

Thousands of Sites Impacted by Cloudflare Breach Cloudflare, a popular content delivery network, was recently breached.  This breach impacted 3,400 websites, including popular sites such as Fitbit and Uber.  A full list of impacted websites has not been released. Cloudflare has made a public statement on their blog, “The bug was serious because the leaked memory […]

Continue reading


82% of Anti-Virus Consumers Do Not Rely on Third Party Testing

Who Relies on Third Party Testing When Considering Their AV Solution? In a recent survey conducted by PC Matic, participants were asked, “Which of the following independent anti-virus (AV) testing authorities did you consider when choosing your AV solution?” The options provided were Virus Bulletin, AV Comparatives, AV Labs, NSS Labs, SE Labs, Don’t use third party […]

Continue reading


When It Comes To Computer Security — Ignorance Is Not Bliss

Some people believe ignorance is bliss.  Which may be true, under certain circumstances.  However, I can assure you, one of those circumstances is not computer security. 19.63% Of PC Users Choose Not To Use Security Programs In a recent survey conducted by PC Matic, 19.63% of respondents stated they were not using an anti-virus solution.  […]

Continue reading


Bingham County Struggles to Recover After Ransomware Attack

Bingham County Taken Offline After Ransomware Attack Bingham County of Idaho continues to struggle to get all of their systems back online after ransomware hit their systems last Wednesday.  On February 15, 2017 the county first discovered the ransomware.  Every county office has been impacted in some way, whether it is their phones, database, or […]

Continue reading


Scammers Obtain Thousands of Employee W-2s After Successful Phishing Attack

Phishing Attack Hits Bloomington Public Schools – Minnesota Star Tribune reported an estimated 2,800 current and former Bloomington Public School employees has their private information stolen after a malicious email scam tricked a school employee to send the information to hackers. The phishing scam requested for all of the 2016 W-2s to be sent to a specific […]

Continue reading


Application Whitelisting Ranks #1 For Security Essentials

Application whitelisting has identified as the top security essential tool by Business IT.  Application whitelisting implements a security method that, if utilized correctly, will only allow trusted programs to run.  Since malware is not a trusted program, the executable will not be allowed to run.  Theoretically. this will eliminate malware infections on PCs that are […]

Continue reading


Uber Online Lottery Scam — You Just Won $1.5M!!!!

Uber Online Lottery Scam The Uber Online Lottery scam is making its way across the nation, claiming recipients have one $1.5 million dollars.  They just need your banking information to “deposit” the funds.  Below is the image that will populate within the scam email. There is not any content that comes within the email, just this […]

Continue reading


75% of Ransomware Developed Has Russian Ties

Russians Lead In Ransomware Development Russian based security company, Kaspersky, has confirmed 75% of crypto ransomware was developed by Russians or Russian-speaking individuals.  To some, that may be surprising.  For others, it may validate what they’ve assumed all along. According to Computing, there were 47 crypto ransomware variants that were developed by Russians or Russian-speaking individuals in 2016.  All […]

Continue reading


Google Finds Themselves In Hot Water After Courts Rule Against Them

Good Thing Google Has Deep Pockets… The search engine tycoon, Google, was recently ordered to pay $20 million after the courts found they infringed on four different anti-malware patents.  The infringement involved the development of the company’s popular web browser, Chrome. According to The Next Web, the suit originated in 2013 after Alfonso Cioffi and, […]

Continue reading


New Malvertising Attacks Can Be Prevented With Adblocking Technology

Malvertising Takes Advanced Approach Malvertising, or malicious software that is distributed through advertisements, is taking an advanced approach.  According to Lifars, the cyber criminal group AdGholas, have sophisticated their attack approach leaps and bounds. First, their malicious ad does not infect your PC right away.  It is designed to start obtaining data that they can […]

Continue reading


More Security Breaches, Why Restaurants Are Becoming The Hacker’s Dream

You may have heard about the recent security breach that impacted fast food giant, Arby’s.  The hackers were able to gain access to Arby’s systems and obtain an estimated 350,000 credit card numbers from customers who visited the restaurant chain from October 2016 to January 2017.  Last year, Wendy’s, another major fast food chain, was hit with a breach […]

Continue reading