Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. The Forum used to recognize BBCodes for various Fonts. Now NONE are recognized and Forum Updates are no longer even posted. [font=courier] The Quick Brown Fox [/font] [font=arial] The Quick Brown Fox [/font] [font=arial black] The Quick Brown Fox [/font] [font=impact] The Quick Brown Fox [/font] [font=verdana] The Quick Brown Fox [/font] [font=times new roman] The Quick Brown Fox [/font] [font=georgia] The Quick Brown Fox [/font] [font=andale mono] The Quick Brown Fox [/font] [font=trebuchet ms] The Quick Brown Fox [/font] [font=comic sans ms] The Quick Brown Fox [/font] [font=courier] The Quick Brown Fox [/font] [font=arial] The Quick Brown Fox [/font] [font=arial black] The Quick Brown Fox [/font] [font=impact] The Quick Brown Fox [/font] [font=verdana] The Quick Brown Fox [/font] [font=times new roman] The Quick Brown Fox [/font] [font=georgia] The Quick Brown Fox [/font] [font=andale mono] The Quick Brown Fox [/font] [font=trebuchet ms] The Quick Brown Fox [/font] [font=comic sans ms] The Quick Brown Fox [/font]
  2. Yes. One can expect a relatively long time delay between a breach event and the use of the data that had been harvested.
  3. It's legitimate. I have Opted-In for the settlement. RE: Yahoo! Data Breach Settlement - Yahoo account 2012 through 2016
  4. @Tetsuki Did you get a chance to check your email address(s) at https://haveibeenpwned.com/ to see what sites they were associated with a breach event ?
  5. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. This is most likely how they obtained the password and used it in the email to lend credulity to the scam. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Blackmail Scam still current
  6. Is is a justified detection... https://www.virustotal.com/gui/file/2268e0f59b605ff74656c553658e5c17b3e046370f6ca3032764caaacb582934/detection Download FileZilla here at; https://filezilla-project.org/download.php?show_all=1 to download non-sponsored installers that do NOT include Adware.
  7. The above indicates " You need to sign in to see this page. " Please directly attach and not use 3rd party sites.
  8. @cdu4 This thread is over four years old. You need to take that up with Trend Micro.
  9. @Phuc There are Malwarebytes staff that perform this. If one feels that a Web site is falsely blocked in the Malwarebytes Anti Malware product, each and all URLs should be submitted in; Website Blocking after reading; Please read before posting a FP If one feels that a Web site is falsely blocked by the Malwarebytes Browser Guard plug-in then they should be submitted there in the respective Browser related sub-forum under; Malwarebytes Browser Guard
  10. Monster.com says a third party exposed user data but didn’t tell anyone "An exposed web server storing résumés of job seekers — including from recruitment site Monster — has been found online. The server contained résumés and CVs for job applicants spanning 2014 and 2017, many of which included private information like phone numbers and home addresses, but also email addresses and a person’s prior work experience. Of the documents we reviewed, most users were located in the United States. It’s not known exactly how many files were exposed, but thousands of résumés were found in a single folder dated May 2017. Other files found on the exposed server included immigration documentation for work, which Monster does not collect. A company statement attributed to Monster’s chief privacy officer Michael Jones said the server was owned by an unnamed recruitment customer, with which it no longer works. When pressed, the company declined to name the recruitment customer. “The Monster Security Team was made aware of a possible exposure and notified the recruitment company of the issue,” the company said, adding the exposed server was secured shortly after it was reported in August. Although the data is no longer accessible directly from the exposed web server, hundreds of résumés and other documents can be found in results cached by search engines. But Monster did not warn users of the exposure, and only admitted user data was exposed after the security researcher alerted TechCrunch to the matter. “Customers that purchase access to Monster’s data — candidate résumés and CVs — become the owners of the data and are responsible for maintaining its security,” the company said. “Because customers are the owners of this data, they are solely responsible for notifications to affected parties in the event of a breach of a customer’s database.” Under local data breach notification laws, companies are obliged to inform state attorneys general where large numbers of users in their states are affected. Although Monster is not duty bound to disclose the exposure to regulators, some companies proactively warn their users even when third parties are involved. It’s not uncommon for companies to warn their users of a third-party breach. Earlier this year after hackers siphoned off millions of credit cards from third-party payments processor American Medical Collection Agency, its customers — LabCorp and Quest Diagnostics — admitted to the security lapse. Monster said that because the exposure happened on a customer system, Monster is “not in a position” to identify or confirm affected users."
  11. Did you enter your email address(es) in the following site to check to see if that email address was associated with a known breach? That is most likely how they obtained your password and then used it in the cited email. https://haveibeenpwned.com/
  12. Yes, through the anti exploitation module and the ability to scan the Windows Registry.
  13. The question is not which is better but, whom do you TRUST ! Presumably, if you have a good AV/AM keylogging is not an issue and thus a moot point. However if you are on a corporate network that enabled and whitelists a Keylogger ( which is legal in the US ) then it is possible that when you data is decrypted from the credential store it may be harvested. However that points to the fact that one should NOT be doing personal business on the employer provided equipment.
  14. Besides what Porthos has indicated, you have it backwards @renatows You posted in the False Positive section. This is the area to report a situation where Malwarebytes detects a legitimate file incorrectly ( falsely ) making it a False Positive detection. When Malwarebytes doesn't detect a targeted file type that is malicious, that a False Negative. False negatives require a submission in; Newest Malware Threats after reviewing the following on how to provide sample submissions such that Malwarebytes' Anti-Malware (MBAM) can detect targeted but presently undetected threats. Malware Hunters group Purpose of this forum
  15. I don't know what "posts" you refer to but the legitimately named "CPU-Z" utility is not malicious. Note that there is a lot of misinformation on the 'net and any malware can be renamed to masquerade as any legitimate file. In fact, it is a common practice to evade and "hide in plain site" and that is why I stated This is also why you always get software and utilities directly from their source and not third parties that may host files.
  16. If obtained from the maker, https://www.cpuid.com/softwares/cpu-z.html, Yes, it is safe,
  17. These are classed as malicious advertisements or malvertisements. As such it is not about what software is on your PC but about what web sites you visit and one's browsing habits. For example there are certain porn sites that have a greater propensity to exhibit a FakeAlert. If you are on Windows, a Microsoft FakeAlert. If you are on an Apple iPhone or MAC, you will see an Apple FakeAlert. Then there are sites that don't care who they do business with when it comes to advertisement revenue. Or when one marketing company outsources to another. Then the malvertisement may be rotated in or randomly displayed. As I have explained in other discussions I have seen fake Mozilla Firefox malvertisements emanating from the Weather Channel web site. There was a case where members visited AllMusic.com and on rare occasions they got a Microsoft FakeAlert. The reports were few and reproducing it was difficult but finally I was able to coax a Microsoft FakeAlert from a visitation. It was all discussed in This Thread. Reference: Post #20
  18. @iggy22 If you are getting malvertisements in your Browser such as the FakeAlert shown in Post #1 then you need to look at what web sites your are visiting when this happens and your browsing habits. If it is happening on eBay then try to avoid these "standard elements" as there are way too many unscrupulous resellers on eBay as well as Fake eBay sites.
  19. Microsoft .NET Framework 4 (Web Installer) https://www.microsoft.com/en-us/download/details.aspx?id=17851
  20. There are some low-balled crap out that there that are being sold Windows 10/64 bit systems with 2GB RAM and 32GB SSD. To me, they are unfit for merchantability.
  21. That's not Situational Awareness. That's the "Insider Threat". An Insider Threat is someone inside the enclave that has physical access to to the device, equipment and data and for various reasons can be a source of compromise of that device, equipment and/or data. The objective is taking evasive and preventative action. Situational Awareness is about keeping ones wits about them them by understanding current threats, keeping their attention to their physical or virtual environment, by staying on guard and having reactionary plans at hand. Its all about one's relationship to their environmental space and location in time. Situational awareness could be as simple as not looking at a cell phone while walking down a street where their attention to their phone can leave them open to a slip and fall, being hit by a vehicle or even being the object of an assault or robbery. It could also be not eating while driving or playing with their digital dashboard of the vehicle while in motion. It could also be learning about the physical attributes of threats in the virtual world of the Internet and one's interaction in that environment. While there are overlaps in all types of threats it is important to understand the distinction between them and the intricacies of each.
  22. Yahoo! Data Breach Settlement https://yahoodatabreachsettlement.com If you had a Yahoo account anytime in 2012 through 2016, a pending class action settlement may affect you. A Class Action Settlement has been proposed in litigation against Yahoo! Inc. (“Yahoo”) and Aabaco Small Business, LLC (together, called “Defendants” in this notice), relating to data breaches (malicious actors got into system and personal data was taken) occurring in 2013 through 2016, as well as to data security intrusions (malicious actors got into system but no data appears to have been taken) occurring in early 2012 (collectively, the “Data Breaches”). 2012 Data Security Intrusions: From at least January through April 2012, at least two different malicious actors accessed Yahoo’s internal systems. The available evidence, however, does not reveal that user credentials, email accounts, or the contents of emails were taken out of Yahoo’s systems. 2013 Data Breach: In August 2013, malicious actors were able to gain access to Yahoo’s user database and took records for all existing Yahoo accounts—approximately three billion accounts worldwide. The records taken included the names, email addresses, telephone numbers, birth dates, passwords, and security questions and answers of Yahoo account holders. As a result, the actors may have also gained access to the contents of breached Yahoo accounts and, thus, any private information contained within users’ emails, calendars, and contacts. 2014 Data Breach: In November 2014, malicious actors were able to gain access to Yahoo’s user database and take records of approximately 500 million user accounts worldwide. The records taken included the names, email addresses, telephone numbers, birth dates, passwords, and security questions and answers of Yahoo account holders, and, as a result, the actors may have also gained access to the contents of breached Yahoo accounts, and thus, any private information contained within users’ emails, calendars, and contacts. 2015 and 2016 Data Breach: From 2015 to September 2016, malicious actors were able to use cookies instead of a password to gain access into approximately 32 million Yahoo email accounts. Plaintiffs claim that Defendants failed to adequately protect their Personal Information and that they were injured as a result. Defendants deny any wrongdoing, and no court has made any ruling in these matters. Who’s Included? If you received a Notice about the Data Breaches, or if you had a Yahoo account at any time between January 1, 2012 and December 31, 2016, and are a resident of the United States or Israel, you are a “Settlement Class Member.” What does the Settlement provide? Yahoo has enhanced, or, through its sucessor in interest, Oath Holdings Inc. (“Oath”), continues to enhance security of its customers’ Personal Information stored on its databases. Defendants will also pay for a Settlement Fund of $117,500,000. The Settlement Fund will provide: a minimum of two years of Credit Monitoring Services to protect Settlement Class Members from future harm, or Alternative Compensation instead of credit monitoring for Class Members who already have Credit Monitoring Services (subject to verification and documentation); Out-of-Pocket Costs for losses related to the Data Breaches; and reimbursement of some costs for those who paid for Yahoo premium or small business services. The Settlement Fund will also be used to pay for attorneys’ fees, costs, and expenses, and Service Awards for the Settlement Class Representatives. These are only a summary of the benefits. For complete information, dates, and details on the benefits, visit the Settlement Website www.YahooDataBreachSettlement.com. What are my options? In order to receive any benefits, you must file a claim online or by mail by July 20, 2020. If you want to keep your right to sue the Defendants yourself, you must exclude yourself from the Settlement Class by March 6, 2020. If you exclude yourself you will not receive any credit monitoring or monetary relief from the Settlement. If you stay in the Settlement Class, you may object to the Settlement, and/or the amount of attorneys’ fees, costs, and expenses, and/or the amount of Class Representative Service Awards by March 6, 2020. If you do nothing, you will not receive any credit monitoring or monetary benefits but you will still be bound by the Court’s decisions. Complete information and instructions on Filing a Claim, excluding oneself from the Settlement, or Objecting are available on the Settlement Website at www.YahooDataBreachSettlement.com . The Court has scheduled a hearing in this case at 1:30 pm on April 2, 2020, in Courtroom 8 of the U.S Courthouse, 280 South 1st Street, 4th Floor, San Jose, CA 95113, to consider: whether to approve the Settlement; any objections; a request for Class Representatives’ Service Awards; and attorneys’ fees, costs, and expenses for investigating the facts, litigating the case, and negotiating the settlement. The motion for attorney fees, costs, and expenses will be posted on on the date it is filed or as quickly thereafter as practicable. You may ask to appear at the hearing but you do not have to. This is only a summary. For complete information and to file a claim for benefits, visit the Settlement Website, www.YahooDataBreachSettlement.com, email info@YahooDataBreachSettlement.com or call 844-702-2788 (1-80-9344112 for residents of Israel). Click here to go to the Documents page of the website. Haga clic aquí para ir a la página de Documentos del sitio web. לחץ כאן למעבר לעמוד המסמכים של האתר. Нажмите здесь, чтобы перейти на страницу «Документы» веб-сайта.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.