Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software

Everything isn’t always what we seem.  This is something we have come to know and accept.  However, when we download a program that is supposed to protect us, that is what we expect it to do.  Apple users were recently duped with Adware Doctor, which positioned itself as an adware prevention tool, but actually was […]

51 total views, 39 views today

Continue reading


Microsoft Macros Listed as Primary Malware Distribution Tactic

Hackers Use Microsoft Macros to Distribute Malware Tech Republic has determined in the month of August, approximately 45% of malicious activity monitored was executed through Microsoft’s macros feature.  This means that the malware was hidden in a Microsoft program and upon opening, the malware would execute assuming macros were enabled.  Often times Microsoft’s macro feature is […]

137 total views, 77 views today

Continue reading


Ransom Payments or Downtime – Which is Worse for SMBs?

Which Creates More Issues for SMBs? Asking questions like this is simply asking, which is the lesser of these two evils?  Neither is wanted or preferred.  And both cause substantial damage.  So forgive my bluntness, but which sucks less? Reports have suggested downtime is more damaging, financially than paying the ransom demand.  This is contingent upon several […]

153 total views, 20 views today

Continue reading


Hawaii Issues Breach Warning After Ransomware Infection

Hawaii Medical Facility Issues Warning to 40k Patients The Fetal Diagnostic Institute of the Pacific (FDIP), located in Honolulu, Hawaii has begun contacting over 40,000 patients regarding a potential data breach.  Concerns of a breach come after the facility fell victim to a ransomware attack in June of this year. After discovering the ransomware, FDIP contacted […]

394 total views, 8 views today

Continue reading


RDP Attacks – What they are and how you can stay protected

What is an RDP Attack? RDP, or Remote Desktop Protocol, is a port on devices that allow for remote access to be gained by anyone who has the appropriate credentials.  An RDP attack means an unauthorized person or entity is accessing the network through the device’s RDP ports.  The attack may be an actual person […]

414 total views, 9 views today

Continue reading


Targeted Attacks or Untargeted Attacks – Which is Most Common?

Targeted and Untargeted Cyber Attacks Before discussing the attack methods of hackers, targeted or untargeted, we first must understand the difference between the two. First, untargeted attacks are when hackers have no specific vertical, business, or person they are attacking.  Instead, they simply cast as wide of net as possible, and send out the malicious […]

1,444 total views, 22 views today

Continue reading


An Antivirus Protection That Never Quits

Antivirus Protection that Never Quits — What Every Customer in the World Needs Cyber security threats are evolving every single day.  As customers of antivirus solutions, you need to demand better products.  You need to demand an antivirus protection that never quits.  But what would that look like? Consistent Innovation First, is the need for […]

1,608 total views, 17 views today

Continue reading


Fun Fact – You Can Use PowerPoint to Record Your Screen

Microsoft Windows

Recording Your Computer Screen With PowerPoint It likely isn’t a regular occurrence that you wish to record something on your computer screen.  However, if the need is ever present, it is nice to know it can be done without installing yet another third-party application. How To Do It You will need to have open whatever […]

2,073 total views, 9 views today

Continue reading


Hackers Target Specifically Based on This One Thing

How Hackers Choose Their Targets According to Security Boulevard, the #1 security vulnerability identified by IT managers is unpatched systems. Hackers target vulnerable systems.  There it is.  That is the big secret, which likely isn’t as shocking as one anticipated.  Why do hackers target vulnerable systems?  This too is rather simple.  They don’t want to […]

6,360 total views, 16 views today

Continue reading


BEWARE: Scammers Offering Fake Refunds to Steal Banking Information

Scammers Call Offering Fraudulent Refunds There have been several reports lately regarding people receiving phone calls from individuals claiming to work for their security solution provider.  Not only do they work for your trusted security company, but they’re offering you major refunds!  But don’t get too excited — it’s a scam.  These hackers are calling, asking for […]

2,975 total views, 9 views today

Continue reading


How Hackers Know If They’ve Hit a Gold Mine

Top Information Hackers Look For There are two types of cyber attacks, targeted and untargeted.  Targeted could be as specific as going after a certain business or government agency, or as broad as a certain sector such as education or healthcare.  Targeted attacks often occur when an enemy or competitor specifically targets a business or […]

3,664 total views, 8 views today

Continue reading


T-Mobile Notifies 3 Million Customers After Security Breach

Hackers Breach T-Mobile, Leaving Millions Exposed Approximately 3 million T-Mobile customers either have been or soon will be notified their information was involved in a security breach.  Although details are not being released regarding how the attack was executed, T-Mobile has reported approximately 5% of their 75 million users were impacted by a recent data […]

5,367 total views, 7 views today

Continue reading


PC Matic Pro Wins Silver in Best in Biz Awards 2018 International

PC Matic Pro

PC Matic Pro Earns International Recognition for Most Innovative Product Sioux City, Iowa, USA – August 22, 2018 – PC Matic Pro has been named the silver winner in Most Innovative Product of the Year – SMB in Best in Biz Awards 2018 International, the only independent global business awards program judged each year by […]

1,248 total views, 5 views today

Continue reading


Must Have Technologies to Thwart Ransomware

Top Tools for Proper Ransomware Defense Ed Tech Magazine recently released three major tools the education sector must have to effectively block ransomware from executing on their systems.  Although Ed Tech was specifically focusing on the educational vertical, these tips can be used in any industry. The three “must haves” include application whitelisting, endpoint protection, […]

1,887 total views, 3 views today

Continue reading


Scammers Target Fortnite Users with Android Expansion

Fortnite Users Anxiously Await Android Version – Falling for Scammers in the Process This summer’s “it” game, Fortnite, will soon be expanding its compatibility features to include Android devices.  Although this may be great news for gamers — it may come at a price.  The game’s developers have decided to make downloading available only through […]

3,490 total views, 1 views today

Continue reading


Alternative Approach to Tackling Vulnerabilities

Security Vulnerabilities Leave End-Users Exposed, But Perhaps There’s Another Way… I recently read an article on software vulnerabilities and the belief these issues will always be present.  This theory makes sense, as society’s dependence on technology and software continues to increase, the likelihood of security gaps existing increases as well.  Although, as long as these […]

3,450 total views, 1 views today

Continue reading


Anti-Virus or Anti-Malware? What’s the Difference?

Malware, Virus, Tomato, Tomahto? Recently, I’ve received a few different questions on the concepts of anti-malware and anti-virus programs.  Are they the same thing?  Which is better?  Is PC Matic an anti-malware program? There’s a lot to be said on the matter.  But here is the most basic explanation.  Malware is a blanket term used […]

1,912 total views, 1 views today

Continue reading


No One is Safe From Ransomware — Not Even the PGA

Ransomware Hits PGA’s American Servers Days Before Tournament The Professional Golf Association (PGA) has been the most recent victim of ransomware.  As their tournament is about to kick off in St. Louis, Missouri, the PGA has found all of their American servers encrypted with ransomware.  Meaning, all of the data on those servers is inaccessible […]

1,646 total views, 1 views today

Continue reading


PC Matic Teams Up with IDShield to Offer Identity Theft Protection

IDShield offers PC Matic Customers Exclusive Discount As breaches become more and more prevalent, keeping your personally identifiable information safe becomes increasingly important. PC Matic has now teamed up with IDShield to offer exclusive discounts for identity theft protection plans.  PC Matic users are able to save 10% on an individual identity theft protection plan with […]

3,937 total views, 4 views today

Continue reading


Ransomware Hits Alaskan Medical Records Facility

But That’s Not All… In April, ransomware infiltrated the servers of Golden Heart Administrative Professionals (GHAP), a medical billing, and bookkeeping facility located in Fairbanks, Alaska.  The incident was reported to impact approximately 500 of GHAP’s clients, exposing approximately 44,600 patient files.  Although there is no evidence the information breached has been used maliciously, GHAP reported […]

1,617 total views, 2 views today

Continue reading


Virginia Bank Loses $2.4M to Russian Hackers in Two Targeted Attacks

Fool me once, shame on you, fool me twice, shame on me… In May of 2016, an employee at The National Bank of Blacksburg fell victim to a targeted phishing email.  It was this single email that led to a malware infection on not only that user’s computer but a secondary workstation as well.  The secondary computer […]

3,228 total views, 5 views today

Continue reading


Major American Medical Facility, LabCorp, Riddled with Ransomware

LabCorp Suffers From Cyber Attack A suspected ransomware attack hit America’s medical lab facility, LabCorp, the weekend of July 14, 2018.  Suspicious activity was detected on the company’s diagnostic systems.  The ransomware variant has been disclosed as SamSam.  This is the same variant that took down the City of Atlanta and Colorado’s Department of Transportation.  […]

2,011 total views, 2 views today

Continue reading


Missouri Regional Medical Facility Diverts Patients Elsewhere, Post Ransomware Attack

Missouri’s Cass Regional Medical Facility Falls Victim to Cyber Attack Cass Regional Medical Center, located in Kansas City, Missouri was infected with ransomware on July 9, 2018.  Health IT Security reported the organization responded with their emergency response efforts within 30 minutes of suspected infiltration.  The facility’s IT department is continuing work to restore the […]

4,863 total views, 1 views today

Continue reading


Major Breach Impacts 340 Million American Customers and Businesses

Breach Releases Personal Details for Millions of U.S. Citizens and Businesses Have you ever heard of Exactis?  According to their website, the company states, “Exactis is a leading compiler and aggregator of premium business and consumer data”.  They go on to tout “With over 3.5 billion records (updated monthly), our universal data warehouse is one […]

13,149 total views, 4 views today

Continue reading


Have a Digital Wallet? Better Check Your Address!!

New Malware Variant Alters Digital Wallet Addresses It seems like, since the Bitcoin boom, there has been a higher growth of digital wallets or the wallets where crypto-currency is stored.  Now, with the spike in mining crypto-currency, digital wallets need to be increasingly secure.  Unfortunately, they are not very user-friendly.  Often times, in order to […]

2,080 total views, no views today

Continue reading


New Hampshire City Spends $156k to Restore Computers

Portsmouth New Hampshire Recovers From Malware Infection, For the Small Price of $156,000 After a nasty virus infection, beginning in March of 2018, the city of Portsmouth, New Hampshire is beginning to recover.  The virus determined to be an Emotet Trojan horse began sending out fraudulent emails stamped with the addresses of city officials and […]

1,402 total views, no views today

Continue reading