Scammers Obtain Thousands of Employee W-2s After Successful Phishing Attack

Phishing Attack Hits Bloomington Public Schools – Minnesota Star Tribune reported an estimated 2,800 current and former Bloomington Public School employees has their private information stolen after a malicious email scam tricked a school employee to send the information to hackers. The phishing scam requested for all of the 2016 W-2s to be sent to a specific […]

Continue reading


Is Your Internet Service Provider Giving You Enough Bandwidth?

Is your internet service provider (ISP) giving you the bandwidth you’re paying for?  How much bandwidth does the average household need?  The use of internet for downloading music and video and other uses has exploded during recent years.  More devices, such as smart TVs,  game consoles and some household appliances are now making use of […]

Continue reading


Just How Long Has Time Warner Cable Been Ripping You Off??

Spectrum, Previous Time Warner Cable, Involved In Massive Lawsuit New York Attorney General Eric T. Schneiderman made his opinion clear when he announced the lawsuit against Charter, and it’s subsidiarity Spectrum (previously Time Warner Cable – TWC).  According to Hacker News Scheiderman stated, “The allegations in today’s lawsuit confirm what millions of New Yorkers have long […]

Continue reading


Fareit Malware Returns With A Vengeance

The malicious software named “Fareit” has returned, and with a vengeance.  Fareit malware focuses on breaching your computer’s security, in an effort to obtain critical login credentials. The History of Fareit This particular form of malware was discovered in 2012, but has continued morphing throughout the years in an attempt to bypass anti-virus protection. Historically, […]

Continue reading


Cleaning Your Computer’s Registry — Is It Necessary?

PC Matic

What is a Registry? Before going into detail about cleaning your computer’s registry, first I want to discuss your registry is.  The registry within your PC holds details about every piece of your computer.  For instance where programs are stored, which programs are in your Start menu, which programs have shared applications, and so much […]

Continue reading


Malwarebytes Removes PC Matic PUA Categorization

PC Pitstop is pleased to announce that Malwarebytes is no longer flagging PC Matic as a potentially unwanted program. Both applications can once again co-exist on systems. The Malwarebytes detection began on December 5th, and we initiated efforts to resolve the issue. On December 23rd, we made contact with the proper people at Malwarebytes. After […]

Continue reading


PC Matic Dominates with Perfect Virus Detections on the Venerable VB100

In April 2016, we released PC Matic’s Super Shield 2.0 engine at no additional cost. There were numerous improvements in the new engine. Super Shield 2.0 Improvements enhanced signature based detections enhanced hash based detections enhanced DLL detections 100% internally developed and implemented eliminating our reliance on Vipre’s black list engine new script based detections […]

Continue reading


Windows Operating Systems Life Cycle – End of Extended Support Coming for Another Windows Product

Microsoft Windows

End of Support for Microsoft Windows Products – What does it mean? Windows Operating Systems life cycle report, which Microsoft maintains, provides end-of-support dates for each of Microsoft’s Windows products. Based on the report, support for Windows Vista happens in April of 2017. Source: Windows Lifecycle Fact Sheet  – Dec 2016 The life cycle report […]

Continue reading


Cloud Based File Synchronization Software – What are you Waiting for?

Cloud Storage

What is Cloud Based File Synchronization? Cloud based file synchronization represents the storage and access of electronic data or media files via the “Cloud”.  In simpler terms, it just means saving and maintaining your PC files use cloud storage.  Cloud storage is just another way of saying a hard drive found on an internet server.  […]

Continue reading


HUD Security Breaches Result in More Than 475,000 Leaked Records

HUD Breaches Leave Thousands Exposed National Mortgage News reported the Department of Housing and Urban Development (HUD) suffered two major breaches in August and September. The first resulted in over 50,000 leaked records, and the second, over 420,000 records. The exposure was through the department’s website, where this private information was inadvertently made public. The individuals […]

Continue reading


Android Devices Riddled by Repeated Malware Issues

Android devices have been experiencing several security issues lately. Earlier this month, we reported on the malware associated with fake Flash Players on Android devices. Then, BleepingComputer reported Android banking Trojans, which impacted over 200,000 users. Now, it has been discovered, over three million Android devices have firmware installed on them. Firmware, the software that enables […]

Continue reading


Strengthening Cyber Security Infrastructure with Automated Global Whitelist

PC Matic’s Vice President of Cyber Security, Dodi Glenn, recently conducted a webinar regarding how to strengthen cyber security infrastructures with an automated global whitelist approach. During the webinar, Dodi discussed the current threat landscape, malware sample manipulation, and preventative detection with application whitelisting. Dodi shared with the audience the malware trends, and his thoughts […]

Continue reading


Default Deny – The Future to PC Protection

Default Deny What is default deny? Essentially, it is application whitelisting. Application whitelisting is the preventative detection method, proven to be more effective in preventing malware attacks than the traditional methods used by many anti-virus programs. Google senior security engineer, Darren Bilby, has asked for research to be focused on more meaningful defenses such as whitelisting applications, instead […]

Continue reading


Ransomware Attacks on SMBs Increase by 800%

The ransomware epidemic has taken the world by storm.  It has impacted everyone from large enterprises to home users.  The small and medium businesses (SMBs) have seen a drastic uptake in ransomware attacks in 2016.  This year alone, The Inquirer reported the number of ransomware attacks hitting the SMB market has increased 800%.  Ransomware distributers have found […]

Continue reading


Android Devices at Risk After Fake Adobe Flash Player App Installs Malware

A fake Adobe Flash Player being installed on Android devices is spreading malware like wildfire. When Android users download this malicious application, an “Activate Device Administrator” popup displays.  At this point, they are either damned if they do and damned if they don’t.  By clicking cancel, the message just repopulates.  Once the user hits “Activate”, the […]

Continue reading


Solid-State Drives (SSD) Continue to Gain Popularity

The rotating platter hard disk drives (HDD) have been around since the early days of PCs.  Technology improvements are allowing for the improvement of speeds and capacity.  Basically the HDD technology involves a armature that moves across the surface of the platter.  Using magnetism, the drive head reads and writes information to the disk.  SSD […]

Continue reading