Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. Sorry, screenshots have little value. To determine what this is requires the email in raw format ( full header and body ). Otherwise it is just another leaf on a Fall's day. If you want to deal with this, we can move this thread to; Newest IP or URL Threats where you can take the raw format email, place it it a ZIP file an attach it for analysis.
  2. It was labeled a Rogue by Malwarebytes 9 years ago, but suffers from having a high False Positive rate Today.
  3. It is known for having a high False Positive result on a regular basis. NOTE: In the past, it was labeled as a Rogue by Malwarebytes.
  4. There are also use once Credit Card numbers. You do realize that you have to sign-up for 1privacy.com which means having another account that requires providing PII and they too can be the subject of breach. Plus it may add an additional 1 ~ 3% of overhead cost. There is also the trust factor with them. They are an unknown entity who uses a Whois Proxy out of Panama and used NameCheap as their Registrar. Namecheap is well known for being the preferred Registrar of web sites used for malicious activity. Can you trust them with your PII ? But, it really does not answer the question... So I'll put you on the spot Amaroq_Starwind... What can a person do to help mitigate the possibility of being caught up in a Data Breach and mitigate their effects ? 1 - privacy.com - 154 Grand Street, New York, 10013 https://www.wework.com/buildings/154-grand-st--new-york-city--NY
  5. If your are viewing images or reading text, you are "rendering" the content of a website. It is not one or the other, it is the fact you have visited that web site and thus rendered the content and if that web site is malicious, it may perform some malicious action. There are many kinds of malicious actions and not all of them mean instantaneous infection on your part. It is a possibility but of low occurrence. A web site can be considered malicious not by its actions but by the contents the site purports. The following are examples of HTML.FakeAlerts and none have any components of infecting a computer. Rather they are all about Social Engineering which is a human exploitation. They are about portraying a fraudulent event and in that portrayal will try to convince you to shell-out money. FakeAlert-Screens.pdf / Flash Version Malwarebytes will do what it can to block any site that has been shown to be malicious or is part of a malicious scheme. Of course Malwarebytes must have some knowledge of that site to block it and since they can't know everything, some site may not be blocked and may exhibit some form of malicious activity. But, most don't mean just visiting them means instantaneous infection. If you maintain the computer properly and install Windows Updates and software updates, that possibility of instantaneous infection gets lowered substantially. I mentioned Social Engineering which is the Human Exploit. Software updates mitigate Software Vulnerabilities that a malicious web site may try to exploit. Thus anti malware software, education, situational awareness, understanding and maintaining the system will all minimize the risks presented when visiting a possibly malicious web site.
  6. Yes. You were blocked from accessing the site so end of story.
  7. Which brings up another point. Trust in the VPN provider. When you use a VPN connection you shift that trust from your ISP to the VPN provider. Can you trust them MORE than you trust your ISP ?
  8. Breaches are attacks on a site where data is exfiltrated. Possibly YOUR data. A VPN is nothing but a secure tunnel between you and the VPN provider. Because it only has to do with you it has no effect on any given site and the security measures they may or may not exhibit on that site. There is little or nothing a person can do in consideration of sites that may get hacked except limit your exposure to these sites. Do not give into the hype about online data storage and free online tools and free accounts. Create online accounts for only those constructs you must have and on those sites minimize the data that may exist there. For example some online stores ask you to save your credit card information in your account. Don't. When you make a purchase at that site, enter the credit card information each time you make a purchase. There are many entities that may have a service you want. That service may have an Internet account associated with it. Resist the urge to create that account unless it is 100% necessary. Take a doctor's office. It is a physical service that is between you and that doctor but they may request you to create an online account. Can you trust their application of security measures ? If you have five doctors, are you going to create five accounts ? In short, limit your exposure and always READ the Terms of Service ( ToS ), Authorized Use Policy ( AUP ) and Privacy statements associated with that site. However there are many cases where your information may be kept and you have no control over it. I know, I have been in a few MAJOR breaches. As a side note, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/
  9. Since you opened; Windows 10 Possible Malware issue please stick with that topic until it is deemed resolved.
  10. Thanx for reminding us of the Divinyls Michael ! Good Stuff !!!
  11. Malwarebytes Condoms { 'Cause Malwarebytes is always trying to stay ahead of Trojans }
  12. The way to do this is not use Webmail ( access email via a HTTP or HTTPS web site ) but to use an email client. This is software that resides on your PC. That email client software ( MS Outlook, Pegasus Mail, Thunderbird, etc ) should connect to the POP/IMAP server over TLS/SSL as well as via SMTP over TLS/SSL. One should also make sure they use a Strong Password. To increase the level of privacy, choose an email provider you pay for ( not a free account ) or is included as part of your ISP package. Look carefully at their Privacy statement(s) on the protections of your Personally Identifiable Information ( PII ) as well as the content of your email. NOTE: An email client brings many more benefits to the table such as; email archiving, enhanced Rules, filtering, better print and viewing, email templates and more.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.