New RDP Vulnerability Recently Discovered

Microsoft Scrambles to Issue Patch for New RDP Security Hole A new vulnerability was discovered within remote desktop protocol (RDP) ports, although the technical details of the gap are being kept under wraps. We do know, the vulnerability found impacts Windows Server 2008 and Window 7, as well as out-of-support versions Windows 2003 and XP. […]

3,092 total views, 33 views today

Continue reading


Viruses or Malware – What’s The Biggest Threat?

“Viruses aren’t my biggest problem. Malware, now that’s an issue.” That was a comment recently made by an IT professional. Shortly after hearing this, I was sent an article written by a tech expert stating, “While Chromebooks are aces at stopping viruses, they can’t block malware attacks.” I found these comments shocking. Soon you will […]

2,632 total views, 2 views today

Continue reading


Top 5 Cyber Security Tips The Everyday User Must Know

Protect your PC

Cyber security threats. What are they? The everyday device user typically isn’t thinking about the threats they may be facing every single day. Whether it is a security breach from their favorite app, or clicking on an infectious link in an email. Most users just don’t think about it. Instead, we like to live in […]

3,032 total views, 1 views today

Continue reading


Microsoft Patches Major Remote Access Security Hole

It’s Bad Enough, Microsoft Issued Patches for Legacy Systems Microsoft has recently released a critical update addressing a significant security hole found within their Remote Desktop Services. The security gap impacts multiple Windows versions, leaving Microsoft with no choice but to offer patches for all impacted operating systems, including legacy systems. Since patches are rarely […]

6,567 total views, 6 views today

Continue reading


Amazon Selling Exploding Li-Ion Batteries

Although this isn’t the first time a lithium-ion (Li-Ion) battery exploded, it does appear to be the first time the seller and distributor are less than responsive regarding the incident. According to The Atlantic, Nicholas Jones ordered a replacement Li-Ion battery for his laptop from Amazon. Shortly after installing it, there was a loud bang, […]

9,652 total views, 9 views today

Continue reading


MegaCortex, The World’s Newest Ransomware Threat

Latest Ransomware, MegaCortex, Spreads Across The Globe A new ransomware variant, deemed MegaCortex, has been found targeting organizations in the U.S., Canada, France, Netherlands, Ireland, and Italy. This particular ransomware uses a dual approach, deploying both automated and manual components in an attempt to infect as many people as possible. MegaCortex was first found in […]

779 total views, 1 views today

Continue reading


Fileless Infections Account For 35% of Cyber Attacks

Malware

Traditional Malware vs. Fileless Infections Traditional malware spreads through file-based attacks. This means they rely on an executable file to install the malware. Once the executable file that holds the malware is installed, the malware can infect accordingly. Fileless attacks do not rely on an executable. Instead, they inject malicious code into legitimate scripting engines […]

2,556 total views, no views today

Continue reading


The Hamburglar Strikes Canadian My McD’s App Users

Canadian Users of the My McD’s App Suffer Security Breach Canadians are losing hundreds of dollars to a shifty burger thief who is breaching their My McD’s apps and ordering a plethora of greasy goodness, all while charging it to their payment source on file. Most recently, Canadian journalist Patrick O’Rourke fell victim, with someone […]

1,807 total views, no views today

Continue reading


Survey Reveals IT Pros Lack Basic Knowledge and Best Practices

1 out of 10 surveyed, don’t know what phishing is… Granted, not everyone reading this will likely know what phishing is. However, not everyone reading this is likely making a living in the information technology industry. PC Matic recently conducted a password management and security best practices survey which included over 1,000 IT professionals. The […]

3,985 total views, 3 views today

Continue reading


Cybercrime Caused $2.7 in Total Losses in 2018

FBI Report Confirms Cybercrime Losses Reach $2.7 Billion The FBI’s Internet Crime Complaint Center (IC3) published its 2018 Internet Crime Report showing cybercrime was behind $2.7 billion in total losses during 2018. Of that, $1.2 billion were a result of wire transfers resulting from compromised email accounts, both at a business and individual basis. According […]

1,257 total views, 2 views today

Continue reading


Hackers Put a New Spin on Tax Scams

Tax Evasion Scam Spreads, and Hackers Want Paid — or Else… Extortion emails have increased in popularity lately, starting with the massive sextortion campaign that began earlier this year.  Now, a new extortion scam is underway that claims the victim’s computer was hacked.  Then, upon being hacked, it was determined taxes were being hidden from the […]

676 total views, 1 views today

Continue reading


Hackers Capitalize on Tax Season with Spread of Banking Trojan

Banking Trojan TrickBot Spreads Like Wildfire For years, cyber criminals have increased spam campaigns around tax time, in an attempt to make a quick buck.  This year is no different.  Cyber criminals have begun distributing the banking Trojan, TrickBot, through malicious emails fraudulently portraying tax and payroll services.  Researchers confirmed the malware has been used […]

4,408 total views, 2 views today

Continue reading


Responding to the Computer Skeptic

PC Matic Shield

It has been brought to PC Pitstop’s attention, the Courier Journal published an opinion piece regarding PC Matic – written by self-proclaimed “computer techie”, Jim Fisher. Unfortunately, the article was littered with misinformation about PC Pitstop, PC Matic and even personal attacks against the company’s CEO, Rob Cheng. Moreover, there is no indication that Mr. […]

5,282 total views, 5 views today

Continue reading


A Major Message of RSA

According to one of the world’s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks. This sounds rather dismal. Yet, depending on the security approach being deployed, it may be entirely accurate. In order to effectively stop future cyber attacks, there are proactive approaches businesses of all shapes and […]

1,314 total views, 4 views today

Continue reading


Google Advises Windows 7 Users to Update Their Systems ASAP

Chrome Users Exposed to Two Zero-Day Attacks, One of Which Remains Unresolved for Windows 7 Users It should be no secret that Microsoft will be ending their support for the Windows 7 operating system in January of 2020. However, due to the recent exploitation of two zero-day vulnerabilities within the Chrome browser, one of which […]

1,340 total views, 4 views today

Continue reading


Top 5 Reasons Your Employees Struggle with Cyber Security

They say you’re only as strong as your weakest link. This couldn’t be any more accurate when it comes to the strength of an organization’s cyber security. Even if there are knowledgeable IT professionals within the organization, and most employees are trained in cyber security risks — it only takes one. One person to click […]

1,966 total views, 2 views today

Continue reading


19 Year Old WinRAR Vulnerability Exploited Around the Globe

WinRAR, a popular file utility tool, has been found to have a 19 year-old vulnerability. Fortunately, WinRAR developers were able to remediate the problem shortly after the information went public. However, that’s not to say the issue has been entirely resolved. In order to receive the patch, users must update the software program. If users […]

4,849 total views, 2 views today

Continue reading