Unlike any industry in the history of the world, the PC industry evolves at an incredible pace. At PC Matic, we have been tracking each and every trend related to CPUs, memory, storage, graphics, Windows, and bandwidth.
With tens of millions of PC’s in our database, Pitstop’s market research capabilities are unprecedented in terms of cost, depth, breadth, and accuracy. We have a front seat to all the most exciting trends in computing.
Research Charts |
---|
Research Sample Trends |
Windows OS Trends |
CPU Trends |
Memory Trends |
64 Bit Trends |
Storage Trends |
Monitor Display Trends |
Age Range Trends |
Battle of the Sexes |
We believe that our research capabilities are unparalleled in the PC industry and can complement your existing research. Please consider us for your market research needs.
- Users are looking for a proactive solution to keep their information secure from modern cyber threats.
- VARs/MSPs must to keep users educated on today's cyber threats, and offer effective solutions to keep user information and devices secure.
- Application whitelisting is the most effective method of preventative protection.
- Whitelisting has been encouraged by various U.S. government agencies including the US-CERT, FBI, NSA, and Department of Homeland Security.
- PC Matic Pro has been tested and proven effective in thwarting today's cyber security threats, including ransomware.
- Hold down the Ctrl+Alt+Delete keys
- Choose "Task Manager"
- Click on the browser you were using
- Select "End Task"
- If a company is going out of business, and customers are warranted a refund, the company will do so. However, they will not need you to provide your payment information, as it would already be tied to your account.
- If you're ever questioning the refund or offer -- ask for the person's name and tell them you will call them back. Contact the company, via their support options listed on their original website, to confirm what you were told by the original caller.
- Keep in mind, these scammers are going to push for your account information. They don't want you calling back, they want you to fall for the bogus scam. Therefore, they're going to urge you not to call back, and to give them your information now. If it's a legit company -- they won't care if you call back, your refund will still be there.
- Microsoft NEVER puts a 1-800 number in their BSoD screens, or pop-up messages. These are all fake virus scams.
Users Actively Seeking Out Alternative Antivirus Programs Due to Cyber Threats
Users Look for Better Protection Against Today's Cyber Threats

MSPs and VARs
"More than half (53 percent) of U.S. organizations that were infected with ransomware blamed legacy antivirus protection for failing to prevent the attack..."
Application Whitelisting Offers an Alternative and Effective Solution
Top 5 Takeaways
Flood of Cyber Attacks Drives Endusers to New Antivirus Solutions
Ransomware Attacks Drive 44.53% of Endusers to Reconsider Their Antivirus Solutions
Not only are ransomware attacks taking place daily, but news coverage of these attacks has increased. Therefore, the public has become more aware of this cyber threat. The same can be said for another cyber threat, crypto-jacking. Not long ago, computer users would have no idea what either of those terms meant. Now, increased awareness is leading users to reconsider their antivirus solutions. In a recent survey conducted by PC Matic, 44.53% of respondents reported reconsidering their current antivirus provider due to the recent news stories related to ransomware and crypto-jacking. Of those who are reconsidering, approximately 10% have already changed providers. In addition, 17.4% of respondents reported either they or their company, have been hit with ransomware. However, only 50% of those who have been hit with ransomware have switched antivirus programs in an attempt to prevent future attacks. Perhaps, most importantly, 100% of survey respondents who stated they were currently using a confirmed automated global whitelist antivirus program, reported they have not been victimized by ransomware.
PC Matic - The Fake Virus Experts
Imagine this alert showing up on your screen. Scary thought, right?
This message, and one's similar, are intended to scare users and force them into acting promptly by calling the toll-free number listed in the alert to fix the issue identified. The problem is, these alerts are completely fake. There is nothing wrong with the computer, therefore there is no need to fix anything.
Over approximately the last year, PC Matic has conducted extensive research regarding this particular tech support scam, deeming it the Fake Virus Scam.
About the Fake Virus Scam
This scam aims to trick users into believing that their computer or device needs to be fixed with unnecessary and costly technical support services. The alert messages create a sense of urgency, making users believe they must call quickly to remediate the problem. They also aim to increase a sense of legitimacy by using a well-known brand, like Microsoft in the alert. Please note, a legitimate Microsoft notification will not include a phone number.
But how does it worm its way onto a computer? Scammers have succeeded in getting an advertisement or pop-up into a user’s browser, probably during a freeware download, which will generate the above alert. Once the fake virus shows up on the computer, the browser appears to be locked. In addition, a voice over may come over your speakers. Below is a recording we've been able to obtain of these voice overs.
Just image you're in a work environment and that comes over your computer. Embarrassing, and highly concerning. By including this voice over, victims are increasingly likely to call the number listed to get the fake virus removed.Once a user calls the scammers, they will want a large payment or subscription fee to “fix” the computer. They also may offer to sell the user a bogus antivirus program, or some other unneeded service.
In order to install these applications, or “fix” the device, they will request authorization to remotely access the computer. Using remote access, these experienced scammers can misrepresent normal system output as signs of problems. It's nothing but a scam to get your money, credit card information and access to your computer.
PC Matic employee Michael Hucks, called one of these numbers to see what exactly the scammers are saying. You may listen to his call below:
How They’re Getting Away with It
The hoax uses what appears to be legitimate phone numbers to build trust with the victim. However, the scam often originates from a country, which will not cooperate with law or regulatory enforcement agencies trying to identify these scammers.
PC Matic has found, most of these fake tech support numbers are directed to one main center which modifies their Urgent Alert messages with new 1-800 numbers every couple of weeks. In just the last three months, PC Matic has tracked 140 different phone numbers tied to the fake virus scam.
Avoid Falling Victim
Wouldn’t it be nice if you never had to receive these messages at all?Last year, PC Matic recognized the fake virus problem and added a feature, for no additional charge, to their adblocking technology. This technology has proven to effectively and proactively block these threats. In just the last three months, PC Matic has blocked 4,128 of these scams; up to 450 per day. Fortunately, with PC Matic’s superior adblocking technology, users can rest assured in knowing they are protected and won’t be subject to these stressful and potentially invasive and costly tactics.
For those not using PC Matic, there is a way to rid a computer of the scam, after it has populated. In order to do so, complete the following steps:Just One Tool in the Hacker's Arsenal
This is not the only bogus virus scam going around. Additional fraudulent alerts include phone and email scams. This includes hackers calling a user saying their antivirus solution is going out of business and the caller needs the user's payment information to send a "credit". Hackers have also called users claiming that they have been over billed for services, and were making arrangements for a "refund"; however, they need the payment information to issue said "refund". Another example are emails promising refunds to users of various programs. An example of a scam email that has been sent out can be seen below. Our team also went through the process of helping users identify these scams here.


Is Your Internet Service Provider Giving You Enough Bandwidth?
Internet Speed Analysis Methodology
PC Pitstop has offered free internet speed bandwidth testing for years. Also, the speed tests are part of our PC Matic product which scans PCs internet performance settings. Basically the test measures how long it takes to download a specific sized test data. It then captures the speed in Mbps and also the IP address for each PC. The IP address is a means to identify which ISP the tested PC is using to access the internet. Our analysis is based on approximately 1.9 million download speed test records across 252,000 unique PCs that were performed during the month of January 2017.ISP Bandwidth Results
Our initial analysis shows the top 10 most popular ISP based on the number of unique PCs that ran our internet speed tests. The data shows a fairly pronounced separation of 5 ISP with average download speeds greater than 30 Mbps and the other 5 with less than half of that speed. This type of analysis shows the average level of throughput each ISP provides. However, it is limited in the insight it provides.


PC Monitor Display Sizes Continues to Grow
Average Desktop and Portable PC Monitor Display Size

Average PC Monitor Display Sizes
Popularity of Monitor Sizes
Over the pass seven years, larger desktop monitor sizes continues to be the trend. Our data shows that in 2016, over half of all desktop PCs are 20 inches or larger. Large screen LED and LCD monitor prices continue to decline. Another driving force of the larger monitor display size is a reflection of how PCs usage has become more focused on entertainment. Larger screens are often desired for tasks such as streaming video, displaying photographs and playing action games.

Windows Operating Systems Life Cycle - End of Extended Support Coming for Another Windows Product
End of Support for Microsoft Windows Products - What does it mean?
Windows Operating Systems life cycle report, which Microsoft maintains, provides end-of-support dates for each of Microsoft's Windows products. Based on the report, support for Windows Vista happens in April of 2017.
Source: Windows Lifecycle Fact Sheet - Dec 2016
The life cycle report contains specific information which users need to understand. Terms included in the report, such as End of Mainstream Support and End of Extended Support, can be confusing. Per a Networkworld.com article : "Ending mainstream support for a product means Microsoft will no longer be enhancing that product. What it does NOT mean is there will no longer be fixes for security and reliability issues." The article goes on to say, "When extended support ends, you can no longer count on any security patches or reliability patches."Microsoft Windows Vista - Extended Support Ending April 2017
Many Windows users remember the end of extended support for Windows XP in April 2014. Likewise, Windows Vista is scheduled to meet its life cycle end in April of 2017. The Vista operating system has an interesting life span. Its introduction, in early 2007 was designed to replace the popular Windows XP. Vista design included improvements in graphics, networking and security over its predecessor. However, it drew criticism for its heavy resource requirements, restrictions for the copying of protected digital media, longer boot times as well as other issues. As as result, its satisfaction and initial adoption rates were lower than those of Windows XP. Our analysis shows the current installed base percentages for each of the major Microsoft Windows operating systems. Vista usage represents a fairly small percentage, 4%, of the total Windows installed base.
Source: PC Pitstop - 2016
What should you do if you have Windows Vista?
If you are still using Vista, you don't have to do anything. Just as the Windows XP end of extended support came and went in 2014, your Vista operating system will continue to work after April 2017. Be aware that Microsoft won't be generating any updates or security patches after support is discontinued. If you are a satisfied Vista user, continue to use it. PC Pitstop recommends that you have a good security product (like PC Matic's SuperShield) and that you maintain proper backups. However, if you are ready for an OS update take a look at Windows 10. You may like it.Cloud Based File Synchronization Software - What are you Waiting for?
What is Cloud Based File Synchronization?
Cloud based file synchronization represents the storage and access of electronic data or media files via the "Cloud". In simpler terms, it just means saving and maintaining your PC files use cloud storage. Cloud storage is just another way of saying a hard drive found on an internet server. Storing data in the Cloud generally provides a safe and remote place for housing your digital files. This internet access means users can retrieve the files from a variety of devices such as PCs or other portable devices. This assumes that those devices have internet access and contain the required software or applications for accessing the data. Synchronization means that when a person adds or changes files on their device, the additions and changes are also saved in the cloud. For example, a smart phone can have a synchronization app that automatically places a copy of each picture taken into the Cloud. The synchronization software also allows collaboration with others users. Most synchronization software have a feature which allows the owner of the data to share access with others. The synchronization function insures that users have access to the most up-to-date version of the file. Most software contains features that allow others to make changes to shared data and for those changes to be updated to the Cloud file. Synchronization software generally requires an owner registration process for creating the personalized cloud storage. Most software provides a specific amount of free storage. As a person's storage needs expands, additional storage is usually available for a cost. The amount of free storage and additional storage pricing depends on the individual software's policy.Popular Cloud Based File Synchronization Software
Our analysis of PCs shows that Apple's iCloud software leads the pack in popularity. Other popular cloud based file synchronization software includes Drop Box, Google Drive and Microsoft's OneDrive.
PCs Installed Base by Manufacturer - Have Brand Loyalty Rules Changed?
PCs Installed Base
HP appears to be the beneficiary of brand choice for both the desktop and portables PC branded systems.

Brand Loyalty - Have the rules changed?
As the maturity phase of the PC industry continues, consumer behaviors also change. Brand loyalty is a consumer behavior that often changes as an industry matures. An argument can be made that with the increased availability of online reviews and ratings, some folks might rely less on their past experiences. Online reviews and ratings always need to be scrutinized for honesty and reliability. However these reviews often give the consumers a wonderful resource for making educated purchases.36,619 total views, 2 views today