February 2017

Contact a Cyber Security Expert to Learn about Application Whitelisting

2.2M Voice Recordings Leaked From Children’s Toy, CloudPets

CloudPets Breached Leaving 820k Users Exposed The children’s toy, CloudPets, has been breached, leaving 820,000 users exposed.  This led to an estimated 2.2 million voice recordings between parents and their children being leaked.  What is most shocking is just how avoidable this data breach was. According to Troy Hunt, the platform the toy used, MongoDB, did […]

2.2M Voice Recordings Leaked From Children’s Toy, CloudPets Read More »

Two Ransomware Attacks Overrun MySQL Database

According to Network World a recent ransomware attack was initiated on February 12, 2017, which completely overran MySQL Database.  The attack originated from an IP address located in the Netherlands.  The attack lead to thousands upon thousands of databases being erased and replaced with a .2 bitcoin ($234) ransom demand.  Although the demand is not painstakingly

Two Ransomware Attacks Overrun MySQL Database Read More »

Cyber Security Hygiene Affects Network and Endpoint Security with Application Whitelisting

How PC Matic Pro Stacks Up Against Its Competition

What is PC Matic Pro? PC Matic Pro, developed by PC Pitstop, is the professional version of the advanced security solution, PC Matic.  PC Matic Pro is researched, developed and supported in the United States.  This innovative security solution is available for businesses, government facilities, nonprofit organizations and educational institutions. Advanced Malware Detection PC Matic Pro offers an automated

How PC Matic Pro Stacks Up Against Its Competition Read More »

Fake Adobe Update Leads to Support Scam With Ransomware Ties

Support Scam With Ransomware Ties Another support scam has evolved, tying in the concept of ransomware to increase their payday.  The malicious attack occurs after the user chooses to download a fake Adobe update, or clicks on a malicious ad.  Upon doing so, the computer will begin executing a malicious “update”, which results in the

Fake Adobe Update Leads to Support Scam With Ransomware Ties Read More »

3,400 Websites Compromised After Cloudflare Breach

Thousands of Sites Impacted by Cloudflare Breach Cloudflare, a popular content delivery network, was recently breached.  This breach impacted 3,400 websites, including popular sites such as Fitbit and Uber.  A full list of impacted websites has not been released. Cloudflare has made a public statement on their blog, “The bug was serious because the leaked memory

3,400 Websites Compromised After Cloudflare Breach Read More »

Security lock

82% of Anti-Virus Consumers Do Not Rely on Third Party Testing

Who Relies on Third Party Testing When Considering Their AV Solution? In a recent survey conducted by PC Matic, participants were asked, “Which of the following independent anti-virus (AV) testing authorities did you consider when choosing your AV solution?” The options provided were Virus Bulletin, AV Comparatives, AV Labs, NSS Labs, SE Labs, Don’t use third party

82% of Anti-Virus Consumers Do Not Rely on Third Party Testing Read More »