Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. Besides what Porthos has indicated, you have it backwards @renatows You posted in the False Positive section. This is the area to report a situation where Malwarebytes detects a legitimate file incorrectly ( falsely ) making it a False Positive detection. When Malwarebytes doesn't detect a targeted file type that is malicious, that a False Negative. False negatives require a submission in; Newest Malware Threats after reviewing the following on how to provide sample submissions such that Malwarebytes' Anti-Malware (MBAM) can detect targeted but presently undetected threats.
  2. I don't know what "posts" you refer to but the legitimately named "CPU-Z" utility is not malicious. Note that there is a lot of misinformation on the 'net and any malware can be renamed to masquerade as any legitimate file. In fact, it is a common practice to evade and "hide in plain site" and that is why I stated This is also why you always get software and utilities directly from their source and not third parties that may host files.
  3. If obtained from the maker, https://www.cpuid.com/softwares/cpu-z.html, Yes, it is safe,
  4. These are classed as malicious advertisements or malvertisements. As such it is not about what software is on your PC but about what web sites you visit and one's browsing habits. For example there are certain porn sites that have a greater propensity to exhibit a FakeAlert. If you are on Windows, a Microsoft FakeAlert. If you are on an Apple iPhone or MAC, you will see an Apple FakeAlert. Then there are sites that don't care who they do business with when it comes to advertisement revenue. Or when one marketing company outsources to another. Then the malvertisement may be rotated i
  5. @iggy22 If you are getting malvertisements in your Browser such as the FakeAlert shown in Post #1 then you need to look at what web sites your are visiting when this happens and your browsing habits. If it is happening on eBay then try to avoid these "standard elements" as there are way too many unscrupulous resellers on eBay as well as Fake eBay sites.
  6. Microsoft .NET Framework 4 (Web Installer) https://www.microsoft.com/en-us/download/details.aspx?id=17851
  7. There are some low-balled crap out that there that are being sold Windows 10/64 bit systems with 2GB RAM and 32GB SSD. To me, they are unfit for merchantability.
  8. That's not Situational Awareness. That's the "Insider Threat". An Insider Threat is someone inside the enclave that has physical access to to the device, equipment and data and for various reasons can be a source of compromise of that device, equipment and/or data. The objective is taking evasive and preventative action. Situational Awareness is about keeping ones wits about them them by understanding current threats, keeping their attention to their physical or virtual environment, by staying on guard and having reactionary plans at hand. Its all about one's relationship to their
  9. Yahoo! Data Breach Settlement https://yahoodatabreachsettlement.com If you had a Yahoo account anytime in 2012 through 2016, a pending class action settlement may affect you. A Class Action Settlement has been proposed in litigation against Yahoo! Inc. (“Yahoo”) and Aabaco Small Business, LLC (together, called “Defendants” in this notice), relating to data breaches (malicious actors got into system an
  10. They just keep coming... Hi, how you doing ? We see nothing mischievous in pleasing yourself from once in a while. Certain things must be kept private, and if your relatives and friends are confronted by it, this will be something to worry about. Something anyone would be badly put out by. This will strongly influence your personal life and wellbeing. For a certain period of time, we have been tracking your PC activity via a trojan virus that you had caught and that had infected your PC. You had been infected after clicking on an poster on one of our virus-infected pornographi
  11. The term malware is the overarching concept of Malicious Software and is a derivation of parts of those words concatenated together. All viruses are malware but not all malware are viruses. There is a taxonomy to malware just like there is in the animal kingdom or even vehicles. Just like all Fords are automobiles not all automobiles are Fords. There are three basic sub-types of malware; Viruses, Trojans and Exploit code Viruses - A subset of malware that is capable of self replicating and spreading autonomously. That means viruses are able to spread from computer to
  12. Hind-sight is 20/20 and through the lens of time, we learn more. It also is a reminder of how Pakistani A.Q. Khan proliferated Nuclear technology and while Qadafi gave up on nuclear technology, Iran never did. Dank je @pondus
  13. As always I suggest creating a password encrypted ( enhanced RSA and AES ) Excel Spreadsheet using highbit encryption with a Strong Password. For added security, that password encrypted Excel Spreadsheet can be stored within a password protected ZIP file using a Strong Password. Thus making the data enclosed within a double wrapped secured container.
  14. I can see two different sub-forums as they are programmed differently and will have different bugs and errors. As one can see the Chrome extension is live but the Firefox version has been temporarily pulled. This demonstrates that division. I can see one False Positive reporting sub-forum in the Malwarebytes Browser Guard for both Chrome and Firefox so as to clearly identify and separate F/P Reporting for them
  15. They are both malvertisements. The first is for a software update that purports to be Adobe Flash but it is not. It will install Adware or some Potentially unwanted software or actual malware. The second is an Apple FakeAlert for some product. They have nothing to do with any software on your PC. Examples: FakeAlert-Screens.pdf / Flash Version Here are videos demonstrating Apple FakeAlerts used to goad Apple device users to download Advanced MAC Cleaner and MyMobileSecure VPN solution. Apple FakeAlert leads to Advanced MAC Cleaner Rogue AV software Apple FakeAlert l
  16. Yes. I have repeated it because the problem gets re-posted over and over and the answer doesn't change. I will try to update the text as things change though.
  17. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. This is the way they know the password. Through a data breach where the harvested data is then sold or bartered. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using R
  18. Email clients aren't a vulnerability. Yes, certain email client software may fall to a software vulnerability that may be exploitable but they are few and far between and there is a myriad of email clients. The true vulnerability is the email recipient themselves. Many forms of malicious emails use Social Engineering which is the human exploit. The vulnerability is falling for a Phishing email or, what we were previously discussing, a sextortion email. The vulnerability is the susceptibility for falling for Social Engineering ploys.
  19. The email headers are forged and thus... pointless.
  20. Yes. Many frauds are created, placed in a template and are subsequently sold or bartered.
  21. Very, very, conditional. The sending email client can mark the email to receive a "Delivery Notification" and/or a "Read Receipt". The email system and the email client may act on them or they may not. By default the email recipient client software will deny "Read Receipt" and depending on the email client the recipient may get a message to the effect of (paraphrased ) "The sender has requested a Read Receipt, do you accept?". It is totally up to the system of the email recipient if a "Delivery Notification" is generated or not. Most do not.
  22. I have downgraded and lost nothing. Try deleting the ShortCut and then recreating it.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.