Jump to content

David H. Lipman

Experts
  • Content Count

    13,741
  • Joined

  • Last visited

  • Days Won

    1

About David H. Lipman

  • Rank
    Dave

Contact Methods

  • Website URL
    http://multi-av.thespykiller.co.uk

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

102,507 profile views
  1. This is the authoritative URL on this ransomware, please read it... https://www.bleepingcomputer.com/news/security/djvu-ransomware-spreading-new-tro-variant-through-cracks-and-adware-bundles/ ** If you are not @zabio please do not respond to this thread. Reference: Groups authorized to help with malware removal logs
  2. David H. Lipman

    Just got a ransomware e-mail

    This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. You can enter that email address and other addresses in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputers - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email.
  3. David H. Lipman

    My Data Breached

    Update Reference: Largest collection ever of breached data found Credit: @Firefox
  4. David H. Lipman

    My Data Breached

    For the last year or so, there have been waves of campaigns of mass generated emails designed to goad people to pay a ransom using BitCoin over supposedly compromised systems and/or email accounts. These emails are created from lists generated through actual hack attacks ( breaches ) but are purchased by those generating the email. This Forum has multiple members who have encouraged Forum members to access https://haveibeenpwned.com/ so the email recipient can know where the email sender may have gotten some of their facts. Not from some malware installed on their PC or from a direct compromise of their email account but from a data breach. By accessing the referenced web site the public can get a better handle and understand why they can just delete the email ( and maybe changing an associated Email Account Password ) and not fall for the email ploy and not end up paying a ransom fee. The ransom email is sent based upon the sender's knowledge of the potential recipient's fear and their general lack of knowledge. Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputers - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email.
  5. David H. Lipman

    How do you prevent PUPs?

    Just visiting a web site will not install a standalone application. However, there are web sites that offer Add-Ons and Plug-Ins to Browsers. They too may be PUPs. Don't allow un-vetted web sites to install Browser Add-Ons and Plug-Ins.
  6. David H. Lipman

    How do you prevent PUPs?

    The quantity is undefined. Thus I can only provide a generality. Potentially Unwanted Software ( PUP ) is usually placed on a system via the Bundling process. You download Program A but it bundles Program B and Program C with it so when you install Program A the others are also installed. You have to make a conscious effort to not install Program B and Program C.
  7. David H. Lipman

    How do you prevent PUPs?

    Avoid software that bundles other software. If a particular software does bundle, never accept the default installation options. Choose the Advanced installation option and deselect the added, bundled, software.
  8. David H. Lipman

    protection of network share on a NAS

    The Retail version is not designed for that. That is a Business version construct. Since databases are not a PE executable, its a moot point because MBAM does not target database files, media files, documents, text files, etc.
  9. David H. Lipman

    What are you watching ?

  10. David H. Lipman

    Forum Editor issues with WMV attachments

    This appears to be partially fixed. After an attachment is made and the post is Submitted, the WMV is treated as an attachment. However if you choose to place the WMV ( or other media object ) into the body of the Post, the Editor tries to render the media file creating a Media Player. That then makes using the editor, unusable. catwake-up.wmv
  11. David H. Lipman

    Walmart Gift Card Pop Up

    Clear the cache of the browser and look at your browsing habits and what sites you visit that lead to such malvertisements. As a type of advertisement it is not something you have that you can get rid of. Its like driving down a particular road that has lots of billboards that you find are annoying so you drive a different route.
  12. David H. Lipman

    Walmart Gift Card Pop Up

    This isn't malware related. Its an advertisement than leans towards being a scam. This is is type of malicious advertisement ( aka; malvertisement ) and is not caused by software on your PC. It is an artifact of browsing the Internet Today. While you are browsing the internet, you may hit a malvertiser URL ( a URL that almost certainly will redirect one to a malvertisement ) and thus experience this type of scam.
×

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.