Jump to content

David H. Lipman

Experts
  • Content Count

    14,285
  • Joined

  • Days Won

    1

Everything posted by David H. Lipman

  1. Please download HWinfo You can download the Portable version and run the 32bit or 64bit version accordingly. It will list parameters of your system including "Motherboard". Please go to that section and look for BIOS. It will identify the BIOS Date and Version. Please provide that. Example:
  2. There is one last suggestion I have. Are you willing to take one more step ?
  3. Some anti malware vendors may have activity maps & demographics, statistics and other information. Examples: https://cybermap.kaspersky.com/ https://threatmap.checkpoint.com/ThreatPortal/livemap.html https://www.avira.com/en/threats-landscape
  4. What do you mean "registered" like in a catalogue or encyclopedia ?
  5. I hope that whatever Engine is used is applied to Virus Total because the detections on Virus Total does not match what MBAM detects.
  6. Please completely remove the Audio Software and Driver combo from the Control Panel applet, Programs and Features and then Reboot. Then re-install the latest software https://download.lenovo.com/consumer/mobiles/bcyc05af06wg.exe Reference: Lenovo Legion Y520-15IKBN
  7. What is the Make and Model of the platform in question ?
  8. A note to my non-contrarian friend. My replacement installation was made on-top-of a pre-existing CU 508 install.
  9. One simple bug. Prior to version replacement, Context Menu item "Scan with Malwarebytes" was enabled and present. After the version replacement, Context Menu item "Scan with Malwarebytes" was enabled but was NOT present. Had to toggle the setting for the Context Menu [ Disable and then Enable ] for it to again be present.
  10. Mechanically, there will be wear and tear. Printers are mechanical devices with motors and gears and it is inevitable. Depending on the Make and Model, the printer may have a ink overflow reservoir to absorb excess ink. I had to send an Epson in for service because its pads had become saturated and it refused to even scan If you use a printer to such a degree that it requires a continuous ink feed system then this is something that one may expect and it may be a good idea to have it serviced. This would be Preventative Maintenance just to make sure gears, friction pads and other mechanical parts are not worn out as well as an ink absorbtion pads are replaced.
  11. Please reference the following on how to provide sample submissions such that Malwarebytes' Anti-Malware (MBAM) can detect targeted but presently undetected threats. Malware Hunters group Purpose of this forum This is already detected my MBAM as Trojan.Injector Reference: https://www.bleepingcomputer.com/forums/t/651855/scarab-mich78-ransomware-scarab-scorpio-mich78usacom-support-topic/
  12. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. You can enter that email address and other addresses in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputers - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email.
  13. Update Reference: Largest collection ever of breached data found Credit: @Firefox
  14. For the last year or so, there have been waves of campaigns of mass generated emails designed to goad people to pay a ransom using BitCoin over supposedly compromised systems and/or email accounts. These emails are created from lists generated through actual hack attacks ( breaches ) but are purchased by those generating the email. This Forum has multiple members who have encouraged Forum members to access https://haveibeenpwned.com/ so the email recipient can know where the email sender may have gotten some of their facts. Not from some malware installed on their PC or from a direct compromise of their email account but from a data breach. By accessing the referenced web site the public can get a better handle and understand why they can just delete the email ( and maybe changing an associated Email Account Password ) and not fall for the email ploy and not end up paying a ransom fee. The ransom email is sent based upon the sender's knowledge of the potential recipient's fear and their general lack of knowledge. Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputers - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email.
  15. Just visiting a web site will not install a standalone application. However, there are web sites that offer Add-Ons and Plug-Ins to Browsers. They too may be PUPs. Don't allow un-vetted web sites to install Browser Add-Ons and Plug-Ins.
  16. The quantity is undefined. Thus I can only provide a generality. Potentially Unwanted Software ( PUP ) is usually placed on a system via the Bundling process. You download Program A but it bundles Program B and Program C with it so when you install Program A the others are also installed. You have to make a conscious effort to not install Program B and Program C.
  17. Avoid software that bundles other software. If a particular software does bundle, never accept the default installation options. Choose the Advanced installation option and deselect the added, bundled, software.
  18. The Retail version is not designed for that. That is a Business version construct. Since databases are not a PE executable, its a moot point because MBAM does not target database files, media files, documents, text files, etc.
  19. This appears to be partially fixed. After an attachment is made and the post is Submitted, the WMV is treated as an attachment. However if you choose to place the WMV ( or other media object ) into the body of the Post, the Editor tries to render the media file creating a Media Player. That then makes using the editor, unusable. catwake-up.wmv
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.