Jump to content

David H. Lipman

Experts
  • Posts

    17,468
  • Joined

  • Days Won

    20

Everything posted by David H. Lipman

  1. OK. If you Toggle the setting a few times and finally choose to Disable (remove it) and the Context Menu item is still there, something else going on. Is there only one account on the PC or are there multiple accounts ? If there are multiple accounts on the PC, can you Logoff and Logon as a different User and test this construct under that account ?
  2. Open Malwarebytes --> Choose the Configuration Cogged Wheel Under the "General" tab --> Find; "Windows Explorer Settings." Either Enable it or toggle to Disable and then Re-Enable it again and the MBAM Context Menu item should be there once again.
  3. Combating Spoofed Robocalls with Caller ID Authentication Reference: STIR/SHAKEN: What is it and why does it matter?
  4. From your log... 'Inbound' means communication is emanating from the POV of the Internet and is attempting ingress 'Port: 3389' - Is the Remote Desktop Protocol (RDP) 'IP Address: 94.232.43.67' - is the internet address using TCP Port 3389 and the Remote Desktop Protocol to access and CONTROL your PC. TCP and UDP Ports are like doors. That door can be open, closed or locked. Your TCP Port 3389 'door' is open and Malwarebytes is blocking the ingress from Internet sites trying to enter that TCP Port 3389 door. If you do not know what Remote Desktop Protocol 'is' then you want that door locked. Think of your computer like a house. It has a Front Door and doors to individual rooms. The Front Door, which leads to the street, has a lock on it. Individual doors within the house may or may not have locks on them. The Internet is like a street in front of your house and your Internet Router is that Front Door. Depending on the Make and Model of the Router, it may have a Firewall implementation or Firewall constructs that will allow the user to lock that door (aka; BLOCK TCP Port 3389). If the Router does not have minimal Firewall constructs the Windows PC has a Firewall that can be used to BLOCK TCP Port 3389. The idea is that all those warnings of MBAM performing the blocking action can be annoying. If you block TCP Port 3389 on the Internet Router, the Windows PC will never see that activity and MBAM will not have anything to block on TCP Port 3389.
  5. DIR-3040 :: Rev. Ax :: FW v1.13B03 :: CVE-2021-21816 / CVE-2021-21817 / CVE-2021-21818 / CVE-2021-21819 / CVE-2021-21820 -Multiple Vulnerabilities
  6. FTC Takes Action against Septic Tank Cleaning Company that Made Millions of Illegal Robocalls to Consumers Nationwide
  7. That is now Legal in New Jersey
  8. Change the WiFi password and then using that new Password only authenticate from authorized devices. Then look at the IP Assignment on the Router and Network nodes. Some WiFi notes: Disable acceptance of ICMP PingsChange the Default Router password using a Strong PasswordUse a Strong WiFi password on WPA2 using AES encryption or Enable WPA3 if it is an option.Disable Remote ManagementCreate separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another.Change the network name (SSID). Do not use your; Name, Postal address or other personal information. Make it unique or whimsical and known to your family/group.Is the Router Firmware up-to-date ? Updating the firmware mitigates exploitable vulnerabilities.Specifically set Firewall rules to BLOCK; TCP and UDP ports 135 ~ 139, 445, 1234, 3389 and 5555Document passwords created and store them in a safe but accessible location.
  9. Yes, I do see "Author" on the Right at the top. The label of Thread Starter (or other text) was on the left pane.
  10. Thanx @AlexSmith Another bug is the Thread Starter identification. There used to be a flag on the account that started a thread noting that person as a Thread Starter (or other verbiage) and that no longer is the case.
  11. Once again Invision has messed-up the Forum interface. Now when I view the "Who's Online" list, I can no longer see what a user is accessing. Before I could hover over a member and it would show what they are viewing. That's gone. Additionally, before it would show myself logged in anonymously. Now it doesn't list me online at all. Example: The following shows @AdvancedSetup is "Online now" but no longer shows what he is viewing. As one can see, it no longer shows me logged-in... Previously it would show that I am logged-in and displayed a "eye" type logo next to my Forum Name indicating I am logged-in anonymously.
  12. Its a fake notification and is a type of Tech Support scam. This is not malware. Malwarebytes has created new Browser Add-Ons called Malwarebytes Browser Guard for Chrome and Firefox to mitigate FakeAlerts and other frauds. Browser Add-On references: Malwarebytes Browser Guard Malwarebytes Browser Guard Extension for Chrome Malwarebytes Browser Guard Extension for Firefox Reference: US FBI PSA - Tech Support Fraud US FTC Consumer Information - Tech Support Scams US FTC - Tech Support Operators Agree to Settle Charges by FTC and the State of Ohio US FTC - FTC and Federal, State and International Partners Announce Major Crackdown on Tech Support Scams Malwarebytes' Blog - Search on - "tech support scams" Malwarebytes' Blog - "Tech support scams: help and resource page"
  13. Roses also have nasty thorns and some have allergic reactions to the scratches they occur from them. @AdvancedSetup must be bored to take a picture of a lone Rose.
  14. Recommended Security Measures for WD My Book Live and WD My Book Live Duo
  15. Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground EDIT: Malwarebytes - Second colossal LinkedIn “breach” in 3 months, almost all users affected
  16. STIR/SHAKEN: What is it and why does it matter? The FCC has adopted rules requiring service providers to deploy a STIR/SHAKEN solution by June 30, 2021. Reference: https://en.wikipedia.org/wiki/STIR/SHAKEN EDIT: US FCC - STIR/SHAKEN Broadly Implemented Starting Today
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.