Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 10/21/2020 in all areas

  1. I'm not in a position to know about staffing details, but it seems obvious to me that it's the same as it is for the volunteers here. There aren't nearly as many Mac users as their are Windows subscribers. That means the number of customers needing support are significant fewer and the profits from Mac subscriptions are similarly much lower in total. But the protection provided to us is much closer to that provided to Windows users and increasing over time, so why shouldn't the price be the same? It's simply the way profitable service companies operate.
    3 points
  2. Windows Build 202xx is only for those who elected to be in the Windows Insider DEV Channel . That is still a beta version. 20236, 20242 is one of those for the 21H1 version of Windows for the year 2021. Not for everyday regular end-user. I think we need to make that clear for casual readers.
    3 points
  3. I do know that fake Flash installers, something common in the Windows world as well, are targeted by Malwarebytes and typically categorized as PUP (Potentially Unwanted Programs) as they're usually some kind of adware in disguise, so if that's what these are as well, then I would expect Malwarebytes to target them the same way. That's just my hypothesis though, so either a staff member would need to confirm or someone would need to scan the apps in question to see.
    2 points
  4. I would have to guess we are protected to an equal amount as we are for most any zero-day. In this case, Apple was quick to revoke their notarization, so it was short lived. Malwarebytes does watch for certain behavior patterns that are common to Mac malware, so perhaps would have picked these up immediately.
    2 points
  5. While we wait for staff. A note on Website blocked due to a suspicious top level domain (TLD) Non-standard TLD's (biz/cc/info/xyz/online and so on) are commonly used for malicious purposes. Malwarebytes err on the side of caution to assure that we are protecting our users. If our users encounter a block, they report it (as you did), it gets tested, and if it is determined to be safe, it gets whitelisted. Here are some of the reasons why it's safer to block by default and remove the block if found to be safe. https://cybersecurityventures.com/investigative-cybersecurit
    2 points
  6. Yes, actually, most users aren't seeing these issues. The way that adas has been handling this, both here and on our support system, is appropriate. The data you sent in shows that you've got multiple Chrome extensions installed across multiple different users, and having a large number of browser extensions is known to cause increased scan times (which could also cause increased CPU usage by the daemon). We generally recommend NOT having large numbers of browser extensions installed, as each extension increases your attack surface through your most vulnerable point of attack: your web br
    2 points
  7. Thanks @adas, I changed my setting by turning off the beta updates now that this problem is resolved. I am on 4.6.11. Thanks again!
    1 point
  8. I just tested/replicated your results and I see the same. I might be a safeguard to keep those settings from being enabled by a user and causing issues.
    1 point
  9. You're quite welcome. Take care and stay safe out there. The closing speech will include a link with information to help you better protect your data and privacy. I would recommend you bookmark and read as you have time. If you have questions please come back and make a new post and let us know. Cheers
    1 point
  10. The logs look good overall. Unless there is something else we should be done here and the computer should be running better now.
    1 point
  11. Hello, thanks for bringing this to our attention. We've reviewed the IP, this was not a domain block, and have determined it no longer warrants being blocked so we've removed it from our database. Removal should be reflected in the next database update going out in a few hours or so.
    1 point
  12. Black Friday is soon isn't it, November 27 ? There's probably going to be a good deal for that and the free trial should get you close to that deal.
    1 point
  13. We do already have protection in place for this family of adware. The notarization is an interesting detail, but the adware itself is not new.
    1 point
  14. Yes. How many computers do you have?
    1 point
  15. The way Malwarebytes has always been designed, It does not work like a traditional AV. Malwarebytes continues to work to be able to co exist with AV programs with a few exceptions and sometimes exclusions.
    1 point
  16. It may have been due to an update to one of the applications on the system or to MBEP itself. What VPN are the clients using? I see some VPN related items listed among the WFP entries. The most recent builds of Malwarebytes do tend to conflict with many common VPN apps, so that might be the cause. You can test by disabling or removing the VPN, assuming disabling it removes/disables the WFP filter used by the VPN.
    1 point
  17. Sorry about that. Now I can report that the beta has solved the problem. Thanks to all involved.
    1 point
  18. https://us-cert.cisa.gov/ncas/current-activity/2020/10/26/microsoft-releases-security-update-edge
    1 point
  19. The site has been whitelisted. Please allow 15-30 minutes for changes to take effect.
    1 point
  20. That's great news, thank you for the update
    1 point
  21. I installed 4.6.11 on October 16, it has been over 9 days now with no RTProtectionDaemon crashes! I think it's fixed!! Thanks!
    1 point
  22. Yes for sure. I have all of my Malwarebytes premium clients using the Defender MB combo. I use it as well.
    1 point
  23. It works fine with Defender. Keep in mind the free version offers no real time protection. It is scan and clean only.
    1 point
  24. Not only that, but penetration testing is a specialized activity utilizing specific types of applications and procedures; detecting pen testing attacks is not a function for protecting the system from any actual threats and it is likely deliberately more aggressive (and therefore more prone to FPs) than actual shields/protections.
    1 point
  25. Three couples check into a hotel for their honeymoons. The man at the front desk has a game he likes to play. When the first couple checked in, he asked the bride what her job was. She said she was a maid. The man thought to himself "Maids are hot. This guy's going to have a fun honeymoon." When the next couple checked in, he asked the bride the same question. She told him she was a nurse. The man at the front desk thought "nurses are even sexier. This guy's going to get sex." The third couple checked in right after. The same question was asked. The bride said she was a hi
    1 point
  26. Hello bekogns and welcome to Malwarebytes, Continue with the following: Open Malwarebytes, select > "settings" > "protection tab" Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on.... Go back to "DashBoard" select the Blue "Scan Now" tab...... When the scan completes quarantine any found entries... To get the log from Malwarebytes do the following: Click on the Detection History tab > from main interface. Then click on "History" that wil
    1 point
  27. Good afternoon. I hope you are doing well. How are things ?
    1 point
  28. Your computer keyboard should have a Windows-logo key that you can press to see the Windows Start menu. Please try that. ( my apologies if you already know that.) The Start menu is how we look for and start programs. That is what you should be using. You also should be able to use keyboard shortcut keys to get to the Start Menu. Press and hold the CTRL ( control key) and then tap the ESC ( escape ) key to see the Start menu. That is CTRL + ESCape key. Please use that on the keyboard. There are several resources online that you can use to see a list of Windows keyboard
    1 point
  29. I found myself with the same problem today. I followed the instructions that Porthos provided (THANK YOU!), and that appears to have resolved the problem.
    1 point
  30. Thanks for the reports. This pc does have the latest current Version 20H2 of Windows 10. That is a very good thing to have. I notice that the Windows Update service happens to need to be set to Automatic ( to be active when Windows starts up). We'll take care of that in this next script fix. This system happens to have a few applications; but shows left-over traces of some programs that had been removed. Those leftover traces may be at the source of the odd behaviors you have seen. These are leftover "context menu handlers". And there is also 2 Windows tasks to invoked
    1 point
  31. I also had this issue on 20236 and 20241. I was able to get past the GSOD if I entered the login PIN "very" quickly after the login prompt appeared. The problem was also solved by disabling Web Protection. I am now online here on 20241 with all MWB protection fully enabled - after following exile360's comments. I had a clean boot with no GSOD issues. Apparently I am one of those for who this approach does work. Although, it is worth noting that other than MWB and Windows Defender, my 20241 installation is "plain vanilla" with no other system tweaking and no other security software.
    1 point
  32. Block gone for me too. Locking ticket to keep the "me toos" away.
    1 point
  33. This should be fixed now. Thanks for reporting.
    1 point
  34. Hello, Welcome to Malwarebytes. I'm nasdaq and will be helping you. If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed. === Remove this program in bold using the Control Panel > Programs > Programs and Features... FLV.com FLV Converter 7.8 (HKLM-x32\...\{1a413f37-ed88-4fec-9666-997AF4905D9C}) (Version: 7.8 - GreenTree Applications SRL) <<<>>> Please download the attached Fixlist.txt file to the same folder where the Farbar tool is running from. T
    1 point
  35. Thank you for that log-report. The run was very good. The Windows 10 System File Checker result was all fine & perfect. Same with the Windows 10 DISM. You may do a Quick scan with the Windows 10 Microsoft Defender Antivirus just as one additional check. At this point, I would like for you to do one new scan with Microsoft Windows' Windows Defender. Click the Windows Start menu button on the Taskbar, select Settings icon. Then choose Update and Security. In Windows Settings >>> click on Windows Security from the left side list. Next, In Windows Se
    1 point
  36. Hold off on doing a "reformat". While yes it is do-able, it is a measure of way way last resort. Before even getting to that, Windows 10 has 2 or 3 avenues of getting Windows 10 back in good shape. We should just hold off on that at this point. However, having a backup of the system ( all your stuff) is always a good idea. Backup is your best friend. . Thanks for the scan reports. The Microsoft Safety scanner tool found no malware. It is a basic type tool to check for viruses; though the result is excellent. The ESET Online scanner result is very very excellent. T
    1 point
  37. Hello, thanks for bringing this to our attention. We've reviewed the site again and have determined it no longer warrants being blocked so we've removed it from our database. Removal should be reflected in the next database update going out in a few hours or so.
    1 point
  38. It could be some malicious browser addon, Trojan, or some other threat, or it could be an issue with the browser itself or something on the system interacting with it. They should be able to help determine the cause in the malware removal area and hopefully get the issues fixed for you.
    1 point
  39. Watch EFF Cybersecurity Director Eva Galperin's TED Talk About Stalkerware By Gennie Gebhart May 28, 2020 How to protect against stalkerware, a murky but dangerous mobile threat Posted: October 9, 2019 by Wendy Zamora Malwarebytes.
    1 point
  40. This issue is likely resolved in the latest Malwarebytes Beta. If you wish to give the beta a try please refer to this post for details about the beta and instructions on installing it, otherwise you may wait for the new version to be released once beta testing is completed with the release expected to be a week from now.
    1 point
  41. Greetings, It sounds like a false positive. Please post a copy of the report from Malwarebytes showing the detection and we'll be able to help. To do so, open Malwarebytes and click the Detection History card on the main page of the UI, then select the History tab and hover your mouse over one of the entries showing that the file was detected and click on the small icon that looks like an eye, then in the report that pops up click on Export on the lower left and select Copy to clipboard and then paste the info into your next reply or you may export it as a text file and attach it to you
    1 point
  42. Yeah just saw that. Will update and test but might need one more build or two for fix. 😁
    1 point
  43. 4.2.2 Just came thru the beta channel.
    1 point
  44. I am sorry, You must fully uninstall 360 and restart. I suggest using Windows Defender in conjunction with Malwarebytes. To use Defender, Turn off the following settings in Malwarebytes.
    1 point
  45. Hello @tagger101 I was able to get someone to assist you. Please deactivate your license and reactivate it and it should show correct now. Thank you
    1 point
  46. Hello @tagger101 I found your ticket: 3232660 I will send an email to see if I can get anyone to review any sooner but it can still possibly take a couple of days. Thank you
    1 point
  47. Good morning @DoberMom ( Ron pls forgive my momentary nosing in.) To DoberMom: Advice for your family member ( or any other potential reader): The screen-image showing a alleged "stop bsod" is an elaborate ruse. Microsoft Security has a substantial article about these tech support scams. https://www.microsoft.com/security/blog/2017/04/03/tech-support-scams-persist-with-increasingly-crafty-techniques/ The Minnesota State Attorney General has a very to-the-point document about scams like the one in the image you relayed https://www.ag.state.mn.us/Office/Initiativ
    1 point
  48. This is not malware. It's a JavaScript file that an ad being delivered through Google's advertising system is trying to load, but it's downloading instead. As GuruGuy mentioned, use an ad blocker to block the offending ads and forget about it. This is merely an annoyance, not a threat.
    1 point
  49. I got a similar report on an email list I monitor. OP was browsing the Guardian web site. @Jazzbro77what website are you seeing this on?
    1 point
  50. Posted on dslreports a few days ago too. Per the comment there, a good ad blocker will stop the behavior. https://www.dslreports.com/forum/r32884093-Safari-Download-Message
    1 point
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.