Jump to content

David H. Lipman

Experts
  • Content Count

    17,304
  • Joined

  • Days Won

    15

Everything posted by David H. Lipman

  1. When you see scam websites, give them the spam-BOT/malspam email address. The email address will get abused, sold or traded. Responding to select spam emails may increase the value of that address to malvertisers, spammers and scammers.
  2. Looks like something from the Iranian hacker group known as Helix Kitten (aka; APT34)
  3. Supreme Court limits the FTC’s authority to return money to consumers duped by deceptive business practices Statement by FTC Acting Chairwoman Rebecca Kelly Slaughter on the U.S. Supreme Court Ruling in AMG Capital Management LLC v. FTC
  4. No, sorry. MBAM has two proactive modules; anti ransomware and anti exploitation. MBAM will use these modules to block the malicious actions that older malware may perform.
  5. What you referred to is the guidelines to malicious disk file submissions. Malwarebytes is not a historical anti malware solution and uses its signatures to only target NEW, emerging, files and not old files. The "three month old" guideline is not a hard rule. A undetected file that is 4 or 5 months may still get targeted by the creation of a signature but 3 months represents a relative threshold. Therefore old files will not be accepted for signature creation consideration. Malwarebytes does not accept malware libraries of files (aka; Zoos or Collections). Note also the guidelines i
  6. So-cooooooooooooooool ! A great milestone... in getting the drone to Mars and by building it on Earth with our atmosphere destined to operate in the very thin Mars atmosphere using a semi autonomous coaxial, counter rotating, blade lift system.
  7. Cyber Stalking should remain at the Federal level as it tends to be an interstate, International, crime. Stalking in general needs to have better State-wide legislation.
  8. If it is a Wireless Mouse, auto movement may be due to a nearby user with another Wireless Mouse on the same channel. If it is a wired mouse, it may be due to the tension on the USB cable causing the mouse to physically move.
  9. I used a Proxy with various Exit Nodes. All worked. However I could not force it into a specific Country or Region. It was worth the test...
  10. @Xauma95 Check the Firefox Proxy settings to see if it is using 127.0.0.1
  11. MBAM does not target PDF and other scripted and/or Documents. It uses its anti exploitation module to block any malicious activity that may occur whiles rendering them. Please submit the PDF in; Newest Malware Threats after reading... Malware Hunters group Purpose of this forum EDIT: This is the Malwarebytes for Windows Malware Removal sub-forum so I will request this be moved to; Mac Malware Removal Help & Support
  12. Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof ** More in the article.
  13. There are Local/Group Policies that can be set to Deny Execution to a file.
  14. @Hebbbo How did you make out when you temporarily replaced your keyboard with another ?
  15. The functionality of a BAT file is based upon the Windows Command Interpreter which is limited in its functionality. The functions implemented in a BAT file can do damage to the PC's OS, the file structure and can cause OS degradation. However it won't "infect". That is a BAT file has a greatly diminished capability to create a windows malicious process or structure that will remain performing malicious activity after one logs-off or reboots. More advanced scripting interpreters like Visual Basic, JavaScript and PowerShell scripts are not as limited and can "infect" a host.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.