Users Grant Malware Permission to Manipulate Contact Information

Crusader Malware Manipulates Contact Information A new malware deemed Crusader has been found being installed on PCs all over.  The malware is actually an add-on to free bundle software programs.  By granting Crusader the permission they request, users are authorizing contact information found within ads to be manipulated.  Therefore, a legitimate ad could be altered […]

Continue reading


Alternative Malware Detection Method Proven Highly Effective

Securing your data from a malware attack, should be your primary priority when it comes to data security.  However, it appears a vast majority of organizations, both large and small, aren’t taking the preventative steps necessary to properly secure their data.  With more businesses, educational institutions, government agencies and non-profits falling victim to malware attacks […]

Continue reading


Dutch Parliament “Briefly” Hit with Ransomware

Are the Turks responsible for the ransomware hit on the Dutch Parliament? As previously reported, there has been some hostility overseas between Turkey and Germany and the Netherlands.  Germany and the Netherlands have banned Turkish ministers from campaigning in their regions for an upcoming election.  This ban has caused strains between the three areas, which […]

Continue reading


Another Urology Clinic Hit With Ransomware

Another Urology Clinic is Victimized In late 2016, the Metropolitan Urology Group was hit with ransomware.  Now, Urology Austin, located in Austin, Texas, just released they were hit with ransomware on January 22, 2017.  Ransomware, the malware that locks critical files and demands a payment from the victim to release the files, has been taking the […]

Continue reading


14 Security Solutions Vulnerable to Double Agent Malware

Double Agent Malware Infects Security Solutions A malware attack dubbed Double Agent has been discovered by security vendor, Cybellum.  It is reported, although this attack has been discovered, it has not been yet witnessed in the public. Double Agent effectively uses a 15 year-old vulnerability within the Windows operating system.  The security gap is associated with […]

Continue reading


PC Matic or PC Matic Pro — Which Solution is Best for You?

PC Matic

PC Matic Compared to PC Matic Pro Often times, we get questions from potential consumers asking which security solution would best meet their needs, PC Matic or PC Matic Pro.  To address this, we created the table below which provides the different features in each solution.  Additional information regarding each feature is included below.   Automated Global Application […]

Continue reading


New Bill About to Pass in Indiana Focusing on Cyber Crime

Indiana Works to Pass Cyber Crime Bill We recently discussed the law enforcement’s actions towards cyber criminals, or lack thereof.  Understandably, it is difficult to track down cyber criminals overseas.  It is also understandable that it may be increasingly difficult due to the effort the hackers put into covering their tracks.  However, they are still […]

Continue reading


Richmond Housing Agency Loses Data After Ransomware Attack

Richmond Housing Agency Lost a Month’s Worth of Data The Richmond Housing Agency, in Indiana, was recently hit with a ransomware attack.  The systems were infected in on February 27, 2017.  The ransomware variant is believed to have ties back to India.  After encrypting the housing agency’s systems, hackers demanded $8,000 to restore the company’s […]

Continue reading


Metropolitan Urology Group Suffers Breach Due to Ransomware Attack

Metropolitan Urology Group Found Patient Information Leaked During Ransomware Attack In November, 2016, the Metropolitan Urology Group (MUG) was hit with a ransomware attack.  Two months later, in January, 2017, MUG discovered the hackers obtained private, patient information during the attack.  The patients impacted are those who rendered services between 2003 and 2010.  The information exposed […]

Continue reading


Appropriate Defense Against Ransomware is Not Backups

The Today Show featured another piece on cyber security today, this time discussing ransomware.  During which, Tom Costello claimed the best way to protect yourself from a ransomware attack is to back up your data.  This cannot be further from the truth.  First of all, backups do not protect you from becoming a victim of ransomware.  It can be […]

Continue reading


Twitter Hacked and It Appears the Turks Are to Blame

Twitter Hacked Leaving Nazism Messages Today, dozens of Twitter accounts were hacked impacting various individuals from the European Parliament, UNICEF USA and BBC North America.  It is believed the attacks originated due to a diplomatic spat between Germany, Turkey and the Netherlands.  According to MSN, the Germans and Dutch barred Turkish ministers from campaigning in […]

Continue reading


Canadian Revenue Agency Goes Offline As Security Breach Precaution

Canadian Revenue Agency Uses Precautionary Measures On March 10, 2017 the Canadian Revenue Agency (CRA) took their operations offline after discovering a potential security vulnerability.  After 90 minutes, they were back online; however, by mid afternoon on Friday, they took their site offline again.  The CRA assured users this was simply a precautionary measure, and […]

Continue reading


Phishing Attack Compromised 1,600 School Employees’ W-2s

Connecticut Schools Hit Hard By Phishing Attacks Glastonbury Public Schools in Connecticut was the recent victim of a phishing attack.  The phishing attack resulted in 1,600 W-2s being compromised.  The school district is uncertain who exactly had their information exposed.  However, they did report the food service personnel do not need to be concerned about […]

Continue reading


Wood River Police Department Catches Ransomware Before Major Issues Presented

Wood River Police Department of Illinois Hit With Ransomware According to The Telegraph, on March 5, 2017 the Wood River Police Department was hit with a malicious phishing attack that included ransomware.  The phishing attack was successful, infecting one computer.  However, the issues that presented after the attack set off red flags for the officers. […]

Continue reading


“Perhaps, as an industry, we’re going insane.” – CyberEdge Group CEO

CyberEdge Group Releases Cyberthreat Defense Report CyberEdge Group, a research and marketing firm serving the security industry’s top vendors, shared the results of its fourth-annual Cyberthreat Defense Report.  Key findings suggest, the security industry may be going insane.  CyberEdge group CEO, Steve Piper states, “If the definition of insanity is doing the same thing repeatedly and […]

Continue reading


“I was skeptical of the whitelist approach…”

Houston County Schools, in Alabama, has been using PC Matic Pro to protect America’s most valuable asset, education.  Bob Blalock, Technology Coordinator for Houston County Schools, shared his experience with PC Matic Pro, their whitelist technology and technical support. Bob Blalock, Technology Coordinator, Houston County Schools: “We were a Sophos customer for about 10 years […]

Continue reading


State Senate Crippled After Ransomware Attack

PA State Senate Ransomware Attack Pennsylvania senators were unable to access their computer networks and data after ransomware took over the Pennsylvania Senate’s computer systems.  According to 10 TV, the attack hasn’t affected the state’s networks, which are separate from the Senate’s computers. The ransomware variant that successfully infiltrated the Senate’s system is not being disclosed, nor […]

Continue reading


PC Matic Removes Registry Cleaning Tool From Default Programming

PC Matic

Registry Cleaning Tool Removed From PC Matic Default Effective immediately, PC Matic will be removing the registry cleaning from the default version of its security software.  The option will remain within PC Matic; however, in order to use it, subscribers will need to enable the feature.  Step-by-step instructions on how to do so, are provided at […]

Continue reading


Corporations Boost Bitcoin Supply in Preparation for Ransomware Attacks

Companies Are Prepping to Pay Cyber Criminals According to Coin Telegraph, many corporations are preparing for ransomware attacks by increasing their supply of the non-traceable currency, bitcoins.  Since bitcoins are not traceable, it is typically the currency of choice by hackers. Am I the only one who thinks this is absolutely absurd? Malware attacks of […]

Continue reading


Malware Prevention Tops IT Pros List of Security Priorities

Malware Prevention Deemed Higher Priority Than Detection According to a recent study conducted by Barkley, 51% of IT pros would allocate additional funds to malware prevention over detection and recovery efforts.  This should come as no surprise, considering one in three respondents gave their organizations a failing grade when it comes to prevention of malware […]

Continue reading


2.2M Voice Recordings Leaked From Children’s Toy, CloudPets

CloudPets Breached Leaving 820k Users Exposed The children’s toy, CloudPets, has been breached, leaving 820,000 users exposed.  This led to an estimated 2.2 million voice recordings between parents and their children being leaked.  What is most shocking is just how avoidable this data breach was. According to Troy Hunt, the platform the toy used, MongoDB, did […]

Continue reading


How PC Matic Pro Stacks Up Against Its Competition

What is PC Matic Pro? PC Matic Pro, developed by PC Pitstop, is the professional version of the advanced security solution, PC Matic.  PC Matic Pro is researched, developed and supported in the United States.  This innovative security solution is available for businesses, government facilities, nonprofit organizations and educational institutions. Advanced Malware Detection PC Matic Pro offers an automated […]

Continue reading


3,400 Websites Compromised After Cloudflare Breach

Thousands of Sites Impacted by Cloudflare Breach Cloudflare, a popular content delivery network, was recently breached.  This breach impacted 3,400 websites, including popular sites such as Fitbit and Uber.  A full list of impacted websites has not been released. Cloudflare has made a public statement on their blog, “The bug was serious because the leaked memory […]

Continue reading


82% of Anti-Virus Consumers Do Not Rely on Third Party Testing

Who Relies on Third Party Testing When Considering Their AV Solution? In a recent survey conducted by PC Matic, participants were asked, “Which of the following independent anti-virus (AV) testing authorities did you consider when choosing your AV solution?” The options provided were Virus Bulletin, AV Comparatives, AV Labs, NSS Labs, SE Labs, Don’t use third party […]

Continue reading