Jump to content

David H. Lipman

Experts
  • Content Count

    17,303
  • Joined

  • Days Won

    15

Everything posted by David H. Lipman

  1. Web sites exist on the 'net. The malvertiser was blocked and you were protected. Files get quarantined, not web sites.
  2. Do you have a Smart Phone ? Amazon Kindle ?
  3. Do you have a Android based Cell/Smart Phone ? Maybe the "Android Debug Bridge" ? https://www.androidauthority.com/about-android-debug-bridge-adb-21510/ EDIT: https://www.xspdf.com/resolution/59131356.html
  4. References: https://www.engadget.com/hackers-are-already-targeting-macs-with-apples-m-1-chip-170440569.html https://www.wired.com/story/apple-m1-malware/ @treed is on it ! EDIT: Attribution: @AdvancedSetup
  5. In regards to; The 30 day security summary pop-up interferes with a Right-Click context scan of a file or folder. MBAM generates errors while trying to conduct scan until the dialogue is cleared.
  6. You can try VLC Player from VideoLAN. Start VLC Player and then choose; Media --> choose "Convert / Save" Choose "Add" and add the MKV file that you want to save as MP4. Then click the Down Arrow icon next to the Convert / Save button and choose Convert. From the drop-down list of format Profiles choose MP4
  7. What file formats and why can't you author the video in the intended format ?
  8. I believe that when scanning an Archive file, MBAM will go only X layers deep and MBAM will not count files in the Archive and just display a scan of 1 file representing the Archive [ ZIP, RAR, 7zip, CAB and MSI ].
  9. The simple answer -- No. I'll compare it to having a bully in your neighbourhood. You write poetry, sonnets and stories in notebooks. That bully has gotten a hold of some of your writings. Replacing the notebooks with new ones won't mitigate the issue. You'd have to change your habits of how you store and move those notebooks around as well as any/all interactions with that bully. In your case understanding mitigating cyber threats and how you interact with technology is the key to your solution. It begins with understanding what is a computer "virus" is and how it compares and
  10. I'm sorry, you have misinterpreted what has transpired. I did not ban you. If you were presently banned, you would not be here. Based upon your initial post, I brought your post to the attention of the Forum Administrator .. Who is not just the Forum Administrator but is also a Malwarebytes' Employee. He has the ability to deal with such issues and he has not been online during this time frame. Please have patience for him to look into your issue.
  11. I have been in deep cogitation over this all night. Just because of the Human manifestation of pareidolia, I don't want you to give up on the belief of having a Guardian Angel. There are two kinds of Angels that I know of. The first kind walk among us. They are those who run towards danger whilst the vast majority of people are running away from it. They are the people who are confronted with a complex situation that is forked with an easy and not so righteous solution and the other more difficult path that is righteous. They take the difficult path even though it is hard but bec
  12. Thank you @brad03 but I definitely am not. The sentiments are appreciated though.
  13. Explanation: Humans are hard wired to recognize faces and thus Humans have the tendency to see faces in all sorts of inanimate objects. pareidolia - https://en.wikipedia.org/wiki/Pareidolia
  14. Does your "About Me" mean you still use a CRT Monitor ?

    computer-attack.gif.24d3e568c73018f4c7419b57cc1409ee.gif

    1. B-boy/StyLe/

      B-boy/StyLe/

      No, this picture shows that I like pizza a lot. 🤣

  15. Malwarebytes Hueristics detection; Malware.Heuristic.1001 WMVSDECD.zip
  16. If you do not open data files from email you are not expecting, you are safe. If someone sends you email with an attachment or a link to a document and you do not know them, delete the email. If someone sends you email with an attachment or a link to a document and you do know them and were not expecting a document or a link to a document, do NOT open the document. Send them an email asking if they sent the email, why and what's in the document. As a cautionary rule... Always corroborate information before you act. Don't just act upon it.
  17. Achy fakey heart By: Jim Kreidler,Consumer Education Specialist, FTC "You’ve heard of romance scams. But do you know how they happen? They start when scammers create fake profiles on dating apps or social media. Then, those scammers strike up a relationship with their targets and work to build trust. Sometime later, they make up a story and ask for money. So how do you spot a romance scammer? Here are some things to watch for: Any love interest who asks you to give them money on a gift card, by money transfer, or cryptocurrency is a scammer. Peri
  18. These are classed as malicious advertisements or malvertisements. They can be on specific web sites or are generated as a Push Notification If you are on an Apple iPhone or MAC, you will see a malvertisement geared for Apple. It could be an Apple FakeAlert or a Safari software update. The malvertiser may use your IP address and push some content associated with your ISP such as a fake survey of that ISP's service. If you are on a Windows PC it may use the User-Agent to push a fake Firefox update or a Microsoft FakeAlert. Web sites want revenue. They may contract to a legitimate
  19. Thank you. This is not a case of Phishing. It is a variation of a Tech Support scam in the name of Malwarebytes. Numerous forum members have posted about this scam. Please Reference: have received 3 scam emails about Malwarebytes account chargesFake Receipt?Your subscription for “Malware bytes Security” has been renewed.Phishing scam using malwarebytes subscription (cares@usorderreceipt02.co) Phishing is a process masquerading as a known entity where a web site, a PDF or other document uses content that emulates that entity and tries to get the victim to provide login creden
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.