Jump to content

David H. Lipman

Experts
  • Content Count

    17,311
  • Joined

  • Days Won

    15

Everything posted by David H. Lipman

  1. It is addressed by Malwarebytes only to a limited extent. It is not a case of malware to be "detected" and "removed". It is a case of an exploitable bug on Dell pre-installed software. The Malwarebytes' Anti Exploitation module will help mitigate any attempt at exploiting the now known software's vulnerability. Malwarebytes' software does not address bugs in software that create a vulnerability. The full, paid-for, version of Malwarebytes software will only mitigate attempts at its exploitation. It is up to the Dell PC owner to remove the vulnerable software or patch it.
  2. RE: DSA-2021-088: Dell Client Platform Security Update
  3. When you see scam websites, give them the spam-BOT/malspam email address. The email address will get abused, sold or traded. Responding to select spam emails may increase the value of that address to malvertisers, spammers and scammers.
  4. Looks like something from the Iranian hacker group known as Helix Kitten (aka; APT34)
  5. Supreme Court limits the FTC’s authority to return money to consumers duped by deceptive business practices Statement by FTC Acting Chairwoman Rebecca Kelly Slaughter on the U.S. Supreme Court Ruling in AMG Capital Management LLC v. FTC
  6. No, sorry. MBAM has two proactive modules; anti ransomware and anti exploitation. MBAM will use these modules to block the malicious actions that older malware may perform.
  7. What you referred to is the guidelines to malicious disk file submissions. Malwarebytes is not a historical anti malware solution and uses its signatures to only target NEW, emerging, files and not old files. The "three month old" guideline is not a hard rule. A undetected file that is 4 or 5 months may still get targeted by the creation of a signature but 3 months represents a relative threshold. Therefore old files will not be accepted for signature creation consideration. Malwarebytes does not accept malware libraries of files (aka; Zoos or Collections). Note also the guidelines i
  8. So-cooooooooooooooool ! A great milestone... in getting the drone to Mars and by building it on Earth with our atmosphere destined to operate in the very thin Mars atmosphere using a semi autonomous coaxial, counter rotating, blade lift system.
  9. Cyber Stalking should remain at the Federal level as it tends to be an interstate, International, crime. Stalking in general needs to have better State-wide legislation.
  10. If it is a Wireless Mouse, auto movement may be due to a nearby user with another Wireless Mouse on the same channel. If it is a wired mouse, it may be due to the tension on the USB cable causing the mouse to physically move.
  11. I used a Proxy with various Exit Nodes. All worked. However I could not force it into a specific Country or Region. It was worth the test...
  12. @Xauma95 Check the Firefox Proxy settings to see if it is using 127.0.0.1
  13. MBAM does not target PDF and other scripted and/or Documents. It uses its anti exploitation module to block any malicious activity that may occur whiles rendering them. Please submit the PDF in; Newest Malware Threats after reading... Malware Hunters group Purpose of this forum EDIT: This is the Malwarebytes for Windows Malware Removal sub-forum so I will request this be moved to; Mac Malware Removal Help & Support
  14. Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof ** More in the article.
  15. There are Local/Group Policies that can be set to Deny Execution to a file.
  16. @Hebbbo How did you make out when you temporarily replaced your keyboard with another ?
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.