Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 02/22/2021 in all areas

  1. https://threatpost.com/tdos-attacks-emergency-first-responder/164176/
    2 points
  2. As mentioned by Red Canary, Malwarebytes provided detection data to Red Canary for their article. We collaborated with them on this, and were already detecting it before the news was released.
    2 points
  3. iObit is a Chinese company that long ago stole our database for use in their Advanced SystemCare product. I personally don't see the need to use a 3rd party tool for uninstall unless you're specifically having an issue where a product will not remove itself and the company does not provide a method or support to do so. Most vendors supply other means to remove their software. Whether you keep or use iObit is up to you
    1 point
  4. Well, I couldn't figure out how to literally uninstall just Browser Guard, but I removed it as an add-on and re-added it. Not sure if that's what you meant for me to do, but it worked. Thanks!
    1 point
  5. HURRAY!!!! That did it! Thank you so much!
    1 point
  6. Uninstall and reinstall Browser Guard
    1 point
  7. Hello again Malwarebytes Beta community, Hoping you are all safe and calm, we want to let you know we have just released a new Beta of your product, version 4.3.0.98 component package 1.0.1191 If you currently have the Beta Updates Setting turned on it means you have signed up for our Beta Updates Program and you will get the new Beta as an update. As usual if you don't want to wait for the 'Update Available' notification, go right ahead and retrieve the update manually by clicking "Check for updates" in Settings > General. What’s New in this 1.0.1191 Beta: Enh
    1 point
  8. Hello @cohelfer We believe the BSOD you are seeing should be addressed with a new Component update we will be releasing shortly. I will send you a note once we release the Beta for you to try it out. In the meanwhile you can disable Web Protection and Install Malwarebytes Browser Guard. https://www.malwarebytes.com/browserguard/ Thank you.
    1 point
  9. Hello, thanks for bringing this to our attention. We've reviewed the site again and have determined it no longer warrants being blocked so we've removed it from our database. Removal should be reflected in the next database update going out in a few hours or so.
    1 point
  10. I'm not sure why you assumed that nobody listened to your request. I simply explained that this is not currently present, and why, but rest assured that I heard what you said. That said, what specific problem are you trying to solve with a "deep scan" feature? Keep in mind that different antivirus engines work differently and what could be called a "deep scan" in one engine may not be called the same thing - or may not even be necessary - in another engine. Rather than talking about requests for specific features, it's best to talk about the root problem.
    1 point
  11. How is the computer running now? Any obvious issues or concerns still? Please review the following and clean up and clear your Opera Browser https://www.opera.com/case-studies/clean-browser-and-remove-trackers Look at cleaning or resetting your other browsers too https://www.howtogeek.com/171924/how-to-reset-your-web-browser-to-its-default-settings/ https://kb.iu.edu/d/ahic https://kinsta.com/knowledgebase/how-to-clear-browser-cache/
    1 point
  12. Hello @Sron The developer did go through the dump file. We have a Beta update coming out in a day or 2 and this might solve the issue. I will send you a message when the new Beta is out. Thank you for your patience and we are sorry you have been experiencing the BSOD issues.
    1 point
  13. Do you have the following setting on?
    1 point
  14. Please address the following issues. It looks like you may have both the new and older version of Python installed. Unless you need the old one you may want to consider uninstalling it. ___________________________________________________________________________ Windows 10(6.3.18363) (x64) Professional Release: 1909 Lang: Spanish(0C0A) Installation date OS: 09.06.2019 23:17:43 LicenseStatus: Office 16, Office16O365ProPlusR_Subscription1 edition Timebased activation will expire :24477 minutes --------------------------- [ OtherUtilities ] ---------------------
    1 point
  15. You left off the beginning of that statement, which was really about two different scenarios. Any malware developer that compiles their code using the current version of Xcode will automatically get Apple Silicon code that runs natively on M1 Macs. So the fact that there are at least two such malware samples out there today shouldn't really surprise us. Also, anybody with an M1 Mac that tries to run an app or process that was compiled for use on an Intel Mac only will be offered the opportunity to download an Apple process known as Rosetta 2. That process will add Apple Silicon code
    1 point
  16. Thank you @cohelfer I will send a request to @nikhils and see if he's able to download these logs. Cheers
    1 point
  17. Great, glad to hear. Please run the following for me SecurityCheck by glax24 I would like you to run a tool named SecurityCheck to inquire about the current-security-update status of some applications. Download SecurityCheck by glax24 from here https://tools.safezone.cc/glax24/SecurityCheck/SecurityCheck.exe and save the tool on the desktop. If Windows's SmartScreen block that with a message-window, then Click on the MORE INFO spot and over-ride that and allow it to proceed. This tool is safe. Smartscreen is overly sensitive.
    1 point
  18. Same for me. They have an affiliate link and receive a commission on every sale of Malwarebytes sold from their link. 🙂
    1 point
  19. It occurs to me to mention this. Why go to Majorgeeks in the first place? When your pc already has the Malwarebytes for Windows, all you need to do is simply do a one time manual "Check for Updates" in the program. Further, look at the top pinned posts at the top of this section of the forum. Erix always has a post about the latest Update.
    1 point
  20. Hello jklcpa and welcome to Malwarebytes, Thanks for those logs, continue: Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from. NOTE. It's important that both files, FRST or FRSTEnglish, and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone. Run FRST or FRST64 and press the Fix button just once and
    1 point
  21. The site has been whitelisted. Please allow 15-30 minutes for changes to take effect.
    1 point
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.