Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Posts posted by David H. Lipman

  1. Below is the header for this Virus Total Report.

    I have placed a box around two areas.  One that indicates when the last scan was performed.
    The other, when chosen, requests Virus Total to re-scan the file in that report.  



    ** Please note that this is not a "Malware removal" thread so an Admin may move this thread to a more appropriate area of the Forum.


  2. Chances are it is a False Positive. 
    When you posted the Virus Total report URL, the last time the file was scanned was on 5/20 with 5 detections.  I instigated Virus Total to re-scan the file and five days later that detection has dropped to four detections and two of them are the same so there are only 3 detections now.

  3. Its isn't about a VPN Exit node to a be in a specific location, it is about not emanating from your ISP GeoIP. 
    Additionally it is for creating an encrypted pipe for when one hops onto a Public Network such as provided by a Restaurant or Hotel WiFi so you are not snooped-on by other patrons.

  4. GoDaddy Confirms Data Breach - 28,000 Customers Affected

    "GoDaddy, one of the world’s largest domain registrar and a web hosting company that provides services to roughly 19 million customers around the world, has confirmed a data breach.

    According to a BleepingComputer report, GoDaddy notified notified some of its customers that an unauthorized party used their web hosting account credentials to connect to their hosting account via SSH. GoDaddy claims the breach took place on October 19, 2019 and was discovered on April 23, 2020, after the company's security team discovered an altered SSH file in GoDaddy's hosting environment and suspicious activity on a subset of GoDaddy's servers.

    GoDaddy's Vice President for Corporate Communications later told BleepingComputer in an official statement that roughly 28,000 customers' hosting accounts were affected in the incident: "On April 23, 2020, we identified SSH usernames and passwords had been compromised through an altered SSH file in our hosting environment. This affected approximately 28,000 customers. We immediately reset these usernames and passwords, removed the offending SSH file from our platform, and have no indication the threat actor used our customers’ credentials or modified any customer hosting accounts. To be clear, the threat actor did not have access to customers’ main GoDaddy accounts."


  5. Nintendo Breach Affects 160,000 User Accounts

    "Nintendo has begun restricting log-ins and resetting affected passwords after admitting that as many as 160,000 accounts may have been illegally accessed by hackers.

    The Japanese gaming giant said it was disabling access to accounts via the legacy Nintendo Network ID (NNID), which was associated with its now-defunct Nintendo 3DS handsets and Wii U consoles.

    That’s because, since the beginning of April, hackers have been using NNIDs “obtained illegally by some means other than our service” to access user accounts and buy digital items using stored cards.

    Unauthorized third parties may also have been able to view personal information including name, date of birth, gender, country/region and email address.

    Aside from doing away with NNID log-ins to Nintendo accounts, Nintendo is resetting passwords that may have been used illegally."


  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.