WannaCrypt Ransomware: Protecting your computers against the latest ransomware

Over the past few days, many businesses have reported infections from the latest round of ransomware called WannaCrypt. This massive cyberattack is likely to have stemmed from stolen tools used by the National Security Agency (NSA). Due to the rate of infection, and the number of machines being infected by WannaCrypt, Microsoft has released an […]

Continue reading


Forsyth Public Schools Overrun with Malware

Forsyth Schools Hacked Forsyth Public Schools, located in Montana was the victim of a major hack over the weekend.  They are uncertain when the hack began, but was identified on Saturday, April 1, 2017.  According to Last Best News, the school received three emails prior to the attack, saying they had to pay a ransom […]

Continue reading


14 Security Solutions Vulnerable to Double Agent Malware

Double Agent Malware Infects Security Solutions A malware attack dubbed Double Agent has been discovered by security vendor, Cybellum.  It is reported, although this attack has been discovered, it has not been yet witnessed in the public. Double Agent effectively uses a 15 year-old vulnerability within the Windows operating system.  The security gap is associated with […]

Continue reading


PC Matic or PC Matic Pro — Which Solution is Best for You?

PC Matic

PC Matic Compared to PC Matic Pro Often times, we get questions from potential consumers asking which security solution would best meet their needs, PC Matic or PC Matic Pro.  To address this, we created the table below which provides the different features in each solution.  Additional information regarding each feature is included below.   Automated Global Application […]

Continue reading


Malware Prevention Tops IT Pros List of Security Priorities

Malware Prevention Deemed Higher Priority Than Detection According to a recent study conducted by Barkley, 51% of IT pros would allocate additional funds to malware prevention over detection and recovery efforts.  This should come as no surprise, considering one in three respondents gave their organizations a failing grade when it comes to prevention of malware […]

Continue reading


Scammers Obtain Thousands of Employee W-2s After Successful Phishing Attack

Phishing Attack Hits Bloomington Public Schools – Minnesota Star Tribune reported an estimated 2,800 current and former Bloomington Public School employees has their private information stolen after a malicious email scam tricked a school employee to send the information to hackers. The phishing scam requested for all of the 2016 W-2s to be sent to a specific […]

Continue reading


Is Your Internet Service Provider Giving You Enough Bandwidth?

Is your internet service provider (ISP) giving you the bandwidth you’re paying for?  How much bandwidth does the average household need?  The use of internet for downloading music and video and other uses has exploded during recent years.  More devices, such as smart TVs,  game consoles and some household appliances are now making use of […]

Continue reading


Just How Long Has Time Warner Cable Been Ripping You Off??

Spectrum, Previous Time Warner Cable, Involved In Massive Lawsuit New York Attorney General Eric T. Schneiderman made his opinion clear when he announced the lawsuit against Charter, and it’s subsidiarity Spectrum (previously Time Warner Cable – TWC).  According to Hacker News Scheiderman stated, “The allegations in today’s lawsuit confirm what millions of New Yorkers have long […]

Continue reading


Fareit Malware Returns With A Vengeance

The malicious software named “Fareit” has returned, and with a vengeance.  Fareit malware focuses on breaching your computer’s security, in an effort to obtain critical login credentials. The History of Fareit This particular form of malware was discovered in 2012, but has continued morphing throughout the years in an attempt to bypass anti-virus protection. Historically, […]

Continue reading


Cleaning Your Computer’s Registry — Is It Necessary?

PC Matic

What is a Registry? Before going into detail about cleaning your computer’s registry, first I want to discuss your registry is.  The registry within your PC holds details about every piece of your computer.  For instance where programs are stored, which programs are in your Start menu, which programs have shared applications, and so much […]

Continue reading


Malwarebytes Removes PC Matic PUA Categorization

PC Pitstop is pleased to announce that Malwarebytes is no longer flagging PC Matic as a potentially unwanted program. Both applications can once again co-exist on systems. The Malwarebytes detection began on December 5th, and we initiated efforts to resolve the issue. On December 23rd, we made contact with the proper people at Malwarebytes. After […]

Continue reading


PC Matic Dominates with Perfect Virus Detections on the Venerable VB100

In April 2016, we released PC Matic’s Super Shield 2.0 engine at no additional cost. There were numerous improvements in the new engine. Super Shield 2.0 Improvements enhanced signature based detections enhanced hash based detections enhanced DLL detections 100% internally developed and implemented eliminating our reliance on Vipre’s black list engine new script based detections […]

Continue reading


Windows Operating Systems Life Cycle – End of Extended Support Coming for Another Windows Product

Microsoft Windows

End of Support for Microsoft Windows Products – What does it mean? Windows Operating Systems life cycle report, which Microsoft maintains, provides end-of-support dates for each of Microsoft’s Windows products. Based on the report, support for Windows Vista happens in April of 2017. Source: Windows Lifecycle Fact Sheet  – Dec 2016 The life cycle report […]

Continue reading


Cloud Based File Synchronization Software – What are you Waiting for?

Cloud Storage

What is Cloud Based File Synchronization? Cloud based file synchronization represents the storage and access of electronic data or media files via the “Cloud”.  In simpler terms, it just means saving and maintaining your PC files use cloud storage.  Cloud storage is just another way of saying a hard drive found on an internet server.  […]

Continue reading


HUD Security Breaches Result in More Than 475,000 Leaked Records

HUD Breaches Leave Thousands Exposed National Mortgage News reported the Department of Housing and Urban Development (HUD) suffered two major breaches in August and September. The first resulted in over 50,000 leaked records, and the second, over 420,000 records. The exposure was through the department’s website, where this private information was inadvertently made public. The individuals […]

Continue reading


Android Devices Riddled by Repeated Malware Issues

Android devices have been experiencing several security issues lately. Earlier this month, we reported on the malware associated with fake Flash Players on Android devices. Then, BleepingComputer reported Android banking Trojans, which impacted over 200,000 users. Now, it has been discovered, over three million Android devices have firmware installed on them. Firmware, the software that enables […]

Continue reading