Ironic Twist – Cyber Security Firm Hit with Ransomware

The cyber security firm Verint, was recently hit with an unknown ransomware variant. As if that is not ironic enough, the hackers targeted the company’s largest business operations, located in Israel. This is ironic since Verint reports they are a U.S. based company. It’s not shocking that the company has offices overseas, considering most security […]

72 total views, 27 views today

Continue reading


PC Matic Pro Co-Sponsors Booth at 2019’s FETC Event

We kicked off the first quarter of 2019 by co-sponsoring a booth with one of our partners at this year’s Future of Education and Technology Conference (FETC). FETC gathers the most dynamic and creative education professionals from around the world for an intensive, highly collaborative exploration of new technologies, best practices and pressing issues.  In […]

87 total views, 8 views today

Continue reading


Exciting Start to 2019 for PC Pitstop and PC Matic Pro

PC Pitstop, Makers of PC Matic Pro, Shares Spotlight in Q1 The first quarter of 2019 was quite successful for PC Pitstop and PC Matic Pro. With recognition from CRN, Cyber Defense Magazine, and Info Security Products Guide, the company and products continue to prove themselves in the cyber security industry. Rob Cheng, PC Pitstop’s […]

83 total views, 7 views today

Continue reading


PC Matic Developers Continue to Advance Their Solution

PC Matic Shield

The first quarter of 2019 brought about some changes for PC Matic, and we are confident you’re going to love them. Below is a list of all of the recent changes you may have already noticed: Sidebar UI Drawing on user feedback with a focus on improving your everyday workflow our team launched a revamped […]

89 total views, 7 views today

Continue reading


Employer Networks Left Exposed Due to Employee’s Poor Cyber Security Hygiene

Survey Confirms People Aren’t Practicing Good Cyber Security – And It’s Impacting Their Employers… A recent study, conducted by PC Matic, dove into the password and cyber security hygiene of 5,000 computer users. The results have been proven concerning, primarily for businesses. Users with poor cyber security hygiene often bring these negative habits to work […]

200 total views, 17 views today

Continue reading


DHS and FBI Publish Report Warning of New Trojan From North Korea

Malware

North Korean Hacking Group Releases New Trojan The U.S. Department of Homeland Security and the Federal Bureau of Investigation have issued a joint malware analysis report highlighting a new Trojan used by the hacking group, Lazarus, out of North-Korea. The report, published on the US-CERT website, stated the new Trojan, deemed Hoplight, was detected while […]

393 total views, 49 views today

Continue reading


Cyber Criminals Strike Georgia Again…

Stone Mountain Park Association of Georgia Corrupted with Ransomware What do the City of Atlanta, Jackson County, and the Stone Mountain Park Association have in common? They have all been the victim of ransomware. The City of Atlanta spent millions recovering from the cyber attack that corrupted city networks. Then, last month Jackson County paid […]

369 total views, 25 views today

Continue reading


Garfield County Pays Hackers to Unlock Files

Utah’s Garfield County Paid Attackers Undisclosed Amount to Regain Access to Network and Files The number of recent ransomware attacks on public municipalities is staggering. Over the last few weeks, attackers have successfully infiltrated the networks of the City of Albany, the City of Greenville, Genesee County, Orange County, and now Garfield County. The exact […]

229 total views, 6 views today

Continue reading


North Carolina City Became Attacker’s Newest Ransomware Target

North Carolina City Offices Crippled by Robbinhood The City of Greenville, North Carolina, was struck with ransomware on April 10, 2019. The ransomware variant, called Robbinhood, left the city with no choice but to shutdown their networks. Fortunately, even with their networks offline, public safety systems remained in tact. The extent of the damage due […]

374 total views, 7 views today

Continue reading


Triton Threat Group Reappears in Second Critical Infrastructure Facility

Triton Wormed Their Way Into Another Critical Infrastructure, and Possibly Many More… The advanced hacker group, Triton, was responsible for an attack on a Saudi petrochemical plant in 2017.  The attack would have been successful in destroying the facility, except there was a bug in Triton malware’s coding. Now, years later, researchers have confirmed finding […]

377 total views, 49 views today

Continue reading


Hackers Put a New Spin on Tax Scams

Tax Evasion Scam Spreads, and Hackers Want Paid — or Else… Extortion emails have increased in popularity lately, starting with the massive sextortion campaign that began earlier this year.  Now, a new extortion scam is underway that claims the victim’s computer was hacked.  Then, upon being hacked, it was determined taxes were being hidden from the […]

367 total views, 7 views today

Continue reading


Latest Malware Variant, Deemed Baldr, is Invisible to Users…

Security lock

Advanced Malware, Baldr, Targets Key Locations to Extract Vital Data An advanced malware variant designed to steal information, deemed Baldr, is being sold on various cybercrime forums on the dark web.  The malicious software is sold for a mere $150, and appears to be carefully crafted.  Based on the research completed to date, the creators […]

351 total views, 6 views today

Continue reading


Cyber Crime Group Moves from Credit Card Skimming to Ransomware

Malware

Russian Hackers Move From Skimmers to Ransomware by Exploiting Vulnerable RDP Ports FIN6, a Russian cybercrime group that has historically focused on attacking point-of-sale (POS) devices to steal credit card data, is now expanding their portfolio into ransomware distribution.  Over the last three years, the hacking group has targeted the hospitality and retail industries, successfully […]

2,457 total views, 9 views today

Continue reading


Hackers Capitalize on Tax Season with Spread of Banking Trojan

Banking Trojan TrickBot Spreads Like Wildfire For years, cyber criminals have increased spam campaigns around tax time, in an attempt to make a quick buck.  This year is no different.  Cyber criminals have begun distributing the banking Trojan, TrickBot, through malicious emails fraudulently portraying tax and payroll services.  Researchers confirmed the malware has been used […]

3,992 total views, 17 views today

Continue reading


New Jersey Students Hack School WiFi Network to Skip Testing

It’s not the first time students breached a school’s network, and likely won’t be the last… ust last month, Michigan students hacked into their school’s system to change their grades and attendance records.  Then, an Ohio student broke into their school’s system using a teacher’s credentials, and used the access to create a “hit-list” of students that […]

1,605 total views, 6 views today

Continue reading


Samsung Galaxy S10 Security Duped By 3D Printed Fingerprint

Reddit User Bypasses Samsung Galaxy’s Fingerprint Security with 3D Imaging The newly-enhanced fingerprint scanner feature in the Samsung Galaxy S10 is not as secure as the Korean company claims it to be.  Recently, a Reddit user who goes by darkshark9, found the scanner could be tricked into unlocking the device with the help of a […]

1,682 total views, 8 views today

Continue reading


5th Largest County in Michigan Corrupted by Ransomware

Protect your PC

Earlier this week the empire state’s capital, Albany, was paralyzed by ransomware.  Now, just days later, the fifth largest county in Michigan, Genesee county, suffered a ransomware attack.  Very few details are being released at this time, as the cyber attack is still quite fresh.  However, here is what we do know — County officials […]

1,639 total views, 42 views today

Continue reading


Researchers Exploit Security Gaps in Medical Imaging Devices

In an attempt to draw attention to the security gaps found in many medical imaging devices, like CT or MRI machines, Israeli researchers have developed a malware specifically designed to exploit the vulnerability. The Malware Variant  The malware they created would allow cyber criminals to add realistic, malignant-seeming growths to imaging scans before radiologists and doctors examine […]

438 total views, 1 views today

Continue reading