Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


About David H. Lipman

  • Rank

Contact Methods

  • Website URL

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

107,988 profile views
  1. Secure Email does not equate to spam. "Secure" relates to; using SSL/TLS, privacy of email contents and the ability to encrypt individual emails between parties. As noted, MBAM does nor process email, All email works with MBAM. The *BEST* email experience will always be with an email client such as Microsoft Outlook, Thunderbird and others and not by using a Web Browser ( such as Chrome and Firefox ) to access a HTTPS WebMail server ( such as https://mail.aol.com/ ) . Using an email client is more secure and allows better processing of spam through Rules and Regular Expressions as well as better ability for viewing attachments and printing. One can use a third party spam filter in conjunction with an email client for increased spam and content filtering. I personally use Pegasus mail ( now in its 30th year of being a free email client ) and it has Regular Expressions and with it I can can filter out spam sources by IP address ranges. My suggestion is to use Thunderbird for its ease of use, capabilities, Add-Ons and spam filtering. Of course limiting spam means NOT providing your email address everywhere, specifically indicating top sources to not send you marketing and promotional emails, to indicate that you prohibit the sharing of your email address and also perform US Can Spam Opt-Out on spam. Please reference: https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business 6. Honor opt-out requests promptly. Any opt-out mechanism you offer must be able to process opt-out requests for at least 30 days after you send your message. You must honor a recipient’s opt-out request within 10 business days. You can’t charge a fee, require the recipient to give you any personally identifying information beyond an email address, or make the recipient take any step other than sending a reply email or visiting a single page on an Internet website as a condition for honoring an opt-out request. Once people have told you they don’t want to receive more messages from you, you can’t sell or transfer their email addresses, even in the form of a mailing list. The only exception is that you may transfer the addresses to a company you’ve hired to help you comply with the CAN-SPAM Act. Look for that Opt-Out mechanism in the email and choose to Opt-Out. Not taking any action means implicit acceptance of spam. Taking action means that legitimate email marketers will cease sending you spam and ultimately reduce the volume of spam.
  2. MBAM does nor process email and does not look at Transport Layer Security and Secure Sockets Layer ( TLS and SSL ) protocols. TLS and SSL protocols encrypt the data stream from email client to email server and from email server to email server. It has nothing to do with the content of the email. TLS and SSL protocols are used like a bus carrying passengers from one bus station to another or to a bus stop. They do not care about the individual passengers or what they are carrying on their persons. MBAM will block any malicious and/or nefarious site in the Malwarebytes' Black List.
  3. Windows 7 OS specific updates - Yes. But; Dot Net, Visual C++, Microsoft Security Essentials, MS Office, etc, still are getting updates.
  4. It depends on your desire to be warned and other factors. For example. One may download a MP3 that is a Wimad trojan. A traditional anti virus application will detect that as a malicious file being a a Wimad trojan. That would give one a Red Flag on the source of the MP3 as well as the file itself. MBAM's anti exploitation module will only act to prevent the the software that renders the MP3 to act maliciously on the trojan's behalf.
  5. I'm sorry Malwarebytes doesn't supply information like that. Regular members can not access malware samples that are submitted by other members as well., To gain that level of privilege, one would have to submit quality malware samples inline with the provided submission guidelines. If the submissions are quality, Malwarebytes personnel, who are Malware Researchers, may choose to elevate that member to "Malware Hunters" status. Once a member is in the group Malware Hunters, the member can then download samples that other members have submitted.
  6. Just to bring this back on-track... Physical security of eScooters, 16-Year-Old Scooter Rider Killed by Tow Truck in New Jersey "A 16-year-old boy became the first person killed while riding a shared electric scooter in New Jersey when he collided with a tow truck in Elizabeth on Wednesday night. The boy, identified by a city official as Nelson Miranda Gomez, was riding one of 150 Lime scooters that were made available for public rental in Elizabeth just three weeks ago, according to the city’s mayor, J. Christian Bollwage. The mayor said a large tow truck was making a right turn from Elizabeth Avenue onto Spring Street at about 8:05 p.m. when it struck the boy, a local resident, who died shortly after the collision. The driver, who stayed at the scene and called for help, has not been charged, a city official said."
  7. Corona Virus perspective to a Pandemic that occurred ~100 yrs ago. Post WW1 HiN1 Pandemic ~675,000 dead in the USA alone. That's more than the ~620,000 who died in the US Civil war. https://www.cdc.gov/flu/pandemic-resources/1918-pandemic-h1n1.html "The 1918 influenza pandemic was the most severe pandemic in recent history. It was caused by an H1N1 virus with genes of avian origin. Although there is not universal consensus regarding where the virus originated, it spread worldwide during 1918-1919. In the United States, it was first identified in military personnel in spring 1918. It is estimated that about 500 million people or one-third of the world’s population became infected with this virus. The number of deaths was estimated to be at least 50 million worldwide with about 675,000 occurring in the United States. " https://www.worldwar1centennial.org/index.php/communicate/press-media/wwi-centennial-news/3978-flu-killed-more-world-war-i-troops-than-any-battle.html "The second flu wave of 1918 coincided with the Meuse-Argonne Campaign of World War I, according to the National Institute of Health. Over 1 million U.S. troops participated, and it was our largest front-line commitment of the war. Statistics vary, but the National Institute of Health reports 26,277 American soldiers died during this campaign, the deadliest World War I battle for U.S. troops. Influenza victims crowd into an emergency hospital near Fort Riley, Kansas in 1918. The 1918 Spanish Flu pandemic killed at least 20 million people worldwide.However, the flu killed more U.S. soldiers than did any Great War battle. The flu was equal opportunity. At least 14,000 German troops died from the flu. Call it the Spanish Flu if you wish, as coined by the French — perhaps because the Spanish King Alphonso XIII caught the flu. From that logic, Wilsonian Flu would have worked. President Woodrow Wilson was also a flu victim. The flu killed 15,849 U.S. soldiers in France and another 30,000 in stateside camps. That’s 45,849 killed by the flu versus 26,277 killed at Meuse-Argonne — documenting that the flu was by far our most deadly battle."
  8. It isn't revoked. It is available til ‎Thursday, ‎November ‎19, ‎2037.
  9. Third party hosting sites are not needed for graphics. All graphics can be attached and embedded within your post. I nave a an AOL Root Certificate in my Certificate Store as well. It's normal. So what is the problem ?
  10. I think you are coming to faux conclusions from a lack of understanding of the subject matter.
  11. Verification is made by a query to an Online Certificate Status Protocol server ( OCSP ). Certificate Authorities (CA) do n't infect systems. There merely issue Root and Intermediate Certificates for purposes of publishing, encryption, non-repudiation and other security related systems that use a unique high-bit security certificate. Queries to an OCSP may contain such a request for a Certificate Revocation List (CRL).
  12. https://geminiadvisory.io/breached-wawa-payment-card-records-reach-dark-web/ Breached Wawa Payment Card Records Reach Dark Web "By Stas Alforov and Christopher Thomas Key Findings The Joker’s Stash marketplace, one of the largest and most notorious dark web marketplaces for buying stolen payment card data, began uploading records from its latest major breach on January 27. The breach was titled “BIGBADABOOM-III.” Gemini determined that the point of compromise for BIGBADABOOM-III is Wawa, an East Coast-based convenience store and gas station. The company first discovered the breach on December 10, 2019. Since the breach may have affected over 850 stores and potentially exposed 30 million sets of payment records, it ranks among the largest payment card breaches of 2019, and of all time. Major breaches of this type often have low demand in the dark web. This may be due to the breached merchant’s public statement or to security researchers’ quick identification of the point of compromise. However, JokerStash uses the media coverage of major breaches such as these to bolster their credibility as the most notorious vendor of compromised payment cards."
  13. zpr.io is a URL shortening site [ by Zapier Integrations ] and thus what may be blocked is the site being redirected.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.