Ransomware Takes Down Another County Municipality

Madison County Municipality Suffers Ransomware Attack An unknown ransomware variant has infected Madison County municipality offices, located in Rexburg, Idaho.  The infection took place over the weekend of October 6th.  The exact time is unclear; however, county officials reported employees have been unable to send emails since Sunday, October 7th.  Fortunately, the county is able […]

466 total views, 47 views today

Continue reading


PC Matic Earns Certification from AV-Test

AV-Test Breaks Down PC Matic Performance, Protection, and Usability PC Matic has been testing with AV-Test since the fall of 2017, with test scores progressively increasing.  In August, AV-Test conducted another round of testing, leaving PC Matic with its best protection scores yet. PC Matic‘s Super Shield was able to block 100% of the real-world threats including zero-day […]

695 total views, 25 views today

Continue reading


PC Matic Pro Named Editor’s Choice Anti-Malware by Cyber Defense Magazine

PC Matic Pro

Cyber Defense Magazine Names PC Pitstop, Makers of PC Matic Pro, Editor’s Choice Anti-Malware Sioux City, Iowa, October 3, 2018 – PC Pitstop, the makers of PC Matic Pro, today announced that Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine, has honored PC Matic Pro in its 2018 Cyber Defense Global Awards.  PC […]

2,141 total views, 41 views today

Continue reading


The Port of San Diego Struggles to Recover Days After Ransomware Attack

Ransomware Strikes Port of San Diego On September 25, 2018, the Port of San Diego in California was hit with an unknown ransomware variant.  Over the last three days, park permits, business filings, and public record requests have slowed down to a glacial pace.  In addition, the San Diego Harbor Police Department was forced to […]

1,577 total views, 28 views today

Continue reading


Symantec, Makers of Norton, Faces Claims They Aren’t as “Industry Leading” as They Report

Symantec Claims to be Industry Leading — But Are They Really? According to a federal ruling, Symantec Corporation will have to continue defending class claims that its Norton and Enterprise products failed to protect its users against the latest online cyber threats. Edward Chen of the U.S District Court ruled Symantec’s statement that its software […]

9,567 total views, 76 views today

Continue reading


Breaches Increase, Yet Households Are Less Worried About Identity Theft?

Security Breaches Rise, Yet Households Report Less Concern? According to Javelin Strategy and Research, identity theft has risen for four consecutive years.  Yet, in the 2017 survey from the Commerce Department’s National Telecommunications and Information Administration (NTIA), only 57% of households reported concerns regarding data breaches, compared to 63% in 2015. Now, this would make sense […]

1,764 total views, 25 views today

Continue reading


Romanian Hackers Arrested for D.C. Police Camera Hack

Two Romanian Hackers Face Charges for D.C. Camera Hack A mere days before the 2017 Presidential Innaugeration, Washington D.C.’s police cameras were inaccessible due to ransomware that infected approximately 126 computers connected to the camera’s networks.  After infecting the systems, hackers demanded over $60,000 to restore the systems.  However, the IT department worked quickly, taking […]

1,676 total views, 23 views today

Continue reading


Users Actively Seeking Out Alternative Antivirus Programs Due to Cyber Threats

Users Look for Better Protection Against Today’s Cyber Threats PC Matic recently conducted a survey, including 500 participants, regarding the impact of recent ransomware and crypto-jacking attacks.  According to the results, approximately 45% of participants have either already switched antivirus providers, or are considering it, due to these growing cyber threats. Of those who participated, […]

564 total views, 22 views today

Continue reading


Is This Windows File Hoarding Your Personal Information?

Microsoft Windows

Windows WaitList.dat File Has Been Found Storing User Data Now, before anyone panics, there are two major things you must understand.  First, this is only impacting Windows PCs with touchscreen capabilities.  In addition, a user of this PC must have enabled the handwriting recognition feature.  This feature generated formatted text from a person’s writings they […]

2,312 total views, 26 views today

Continue reading


Flood of Cyber Attacks Drives Endusers to New Antivirus Solutions

Ransomware Attacks Drive 44.53% of Endusers to Reconsider Their Antivirus Solutions Not only are ransomware attacks taking place daily, but news coverage of these attacks has increased.  Therefore, the public has become more aware of this cyber threat.  The same can be said for another cyber threat, crypto-jacking.  Not long ago, computer users would have […]

4,649 total views, 23 views today

Continue reading


Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software

Everything isn’t always what we seem.  This is something we have come to know and accept.  However, when we download a program that is supposed to protect us, that is what we expect it to do.  Apple users were recently duped with Adware Doctor, which positioned itself as an adware prevention tool, but actually was […]

5,408 total views, 23 views today

Continue reading


Microsoft Macros Listed as Primary Malware Distribution Tactic

Hackers Use Microsoft Macros to Distribute Malware Tech Republic has determined in the month of August, approximately 45% of malicious activity monitored was executed through Microsoft’s macros feature.  This means that the malware was hidden in a Microsoft program and upon opening, the malware would execute assuming macros were enabled.  Often times Microsoft’s macro feature is […]

1,880 total views, 22 views today

Continue reading


Ransom Payments or Downtime – Which is Worse for SMBs?

Which Creates More Issues for SMBs? Asking questions like this is simply asking, which is the lesser of these two evils?  Neither is wanted or preferred.  And both cause substantial damage.  So forgive my bluntness, but which sucks less? Reports have suggested downtime is more damaging, financially than paying the ransom demand.  This is contingent upon several […]

1,372 total views, 18 views today

Continue reading


PC Matic Pro Featured In CRN 2018 Cloud Partner Program Guide

PC Matic Pro

CRN’s Partner Program Guide Highlights Leading Cloud Partner Programs Sioux City, Iowa, September 17, 2018 – PC Matic Pro, America’s antivirus, announced today that CRN®, a brand of The Channel Company, has recognized PC Matic Pro, by PC Pitstop, in its 2018 Cloud Partner Program Guide, a list of leading technology vendors with cloud-related partner […]

766 total views, 17 views today

Continue reading


Hawaii Issues Breach Warning After Ransomware Infection

Hawaii Medical Facility Issues Warning to 40k Patients The Fetal Diagnostic Institute of the Pacific (FDIP), located in Honolulu, Hawaii has begun contacting over 40,000 patients regarding a potential data breach.  Concerns of a breach come after the facility fell victim to a ransomware attack in June of this year. After discovering the ransomware, FDIP contacted […]

981 total views, 16 views today

Continue reading


RDP Attacks – What they are and how you can stay protected

What is an RDP Attack? RDP, or Remote Desktop Protocol, is a port on devices that allow for remote access to be gained by anyone who has the appropriate credentials.  An RDP attack means an unauthorized person or entity is accessing the network through the device’s RDP ports.  The attack may be an actual person […]

1,028 total views, 16 views today

Continue reading


Florida Schools Lose Computing Ability After Symantec Fails to Stop Ransomware Attack

Florida Schools Struggle After Ransomware Infects Networks Monroe School District, located in Key West, Florida is attempting to restore their computer systems after the ransomware variant GandCrab infected its systems earlier this week.  On Sunday a member of the school staff noticed something was off with their networks.  They contacted the IT department promptly for proper […]

949 total views, 14 views today

Continue reading


Targeted Attacks or Untargeted Attacks – Which is Most Common?

Targeted and Untargeted Cyber Attacks Before discussing the attack methods of hackers, targeted or untargeted, we first must understand the difference between the two. First, untargeted attacks are when hackers have no specific vertical, business, or person they are attacking.  Instead, they simply cast as wide of net as possible, and send out the malicious […]

1,977 total views, 16 views today

Continue reading


An Antivirus Protection That Never Quits

Antivirus Protection that Never Quits — What Every Customer in the World Needs Cyber security threats are evolving every single day.  As customers of antivirus solutions, you need to demand better products.  You need to demand an antivirus protection that never quits.  But what would that look like? Consistent Innovation First, is the need for […]

2,128 total views, 13 views today

Continue reading


Ransomware Threat Can Be A Reseller’s Opportunity

A Reseller’s Opportunity – Education and Protection Ransomware threats have been increasing year-over-year, yet several businesses are not aware of the magnitude of the cyber threat.  This lack of awareness could be on this particular form of malware, or it may spill over into proper protection methods. It has become a reseller’s opportunity to educate […]

777 total views, 16 views today

Continue reading


Fun Fact – You Can Use PowerPoint to Record Your Screen

Microsoft Windows

Recording Your Computer Screen With PowerPoint It likely isn’t a regular occurrence that you wish to record something on your computer screen.  However, if the need is ever present, it is nice to know it can be done without installing yet another third-party application. How To Do It You will need to have open whatever […]

2,663 total views, 22 views today

Continue reading


Hackers Target Specifically Based on This One Thing

How Hackers Choose Their Targets According to Security Boulevard, the #1 security vulnerability identified by IT managers is unpatched systems. Hackers target vulnerable systems.  There it is.  That is the big secret, which likely isn’t as shocking as one anticipated.  Why do hackers target vulnerable systems?  This too is rather simple.  They don’t want to […]

6,996 total views, 12 views today

Continue reading


New Hampshire Healthcare Facility Offers Up Patient Data to Hackers

New Hampshire Healthcare Facility Suffers Ransomware, Followed by Security Breach Health Management Concepts (HMC) of New Hampshire recently suffered a ransomware attack.  The variant has not been disclosed to the public, but HMC officials did report they paid an undisclosed ransom amount. Before going on, it should be noted that paying the ransom demands is […]

2,048 total views, 1 views today

Continue reading


BEWARE: Scammers Offering Fake Refunds to Steal Banking Information

Scammers Call Offering Fraudulent Refunds There have been several reports lately regarding people receiving phone calls from individuals claiming to work for their security solution provider.  Not only do they work for your trusted security company, but they’re offering you major refunds!  But don’t get too excited — it’s a scam.  These hackers are calling, asking for […]

4,064 total views, 7 views today

Continue reading