Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. Windows Live Mail went EoL about the same time as Windows Vista. Chances are the Windows Live Mail "Rules" for moving and identifying email as "Junk Email" is out of date causing a false Negative on legitimate Malwarebytes' email. I think the Windows Live Mail Rules for Junk Mail should be disabled .
  2. If MBAM is detecting something in the files - Yes. Please reference: Please read before reporting a false positive
  3. Web site False Positives are submitted in; Website Blocking File related False Positives are submitted in; File Detections
  4. As I noted, this is a website, and thus emanates from the Internet. There is nothing for MBAM to "detect", MBAM can block the web site if the site is known and added to the MBAM blocked sites database.
  5. Yes, VLC Player by VideoLAN is excellent and can play and transform numerous video and audio formats. If "iRULU have been making this type of thing for some time" then they should be hosting the software on their own web site and should update their software for Windows 10. As a standalone product it may not be obsolete. However, one would thing the manufacturer would want to keep it up-to-date with or without a new Publisher's Certificate.
  6. I would question a new product being sold that has not had its software updated in ~6 years. Since the software hasn't been updated after October 2013 and it specifically states " This driver only for the Win7 system ", this may be an obsolete product. EDIT: I have further reservations of this product as the iRULU HiFi MP3 F20 USB DAC Driver is not hosted on irulu.com but is hosted on mega.nz.
  7. That one site, yes. Note that there are hundreds of sites created daily.
  8. FakeAlerts are a type of malvertisement. Presumably the graphic and/or the "the bold face print" fronts a Link to a malvertiser who then redirected the Browser to the FakeAlert. Therefore it is the Link behind that "the bold face print" that can lead to the malvertiser. The Browser History will hold the actual link of the FakeAlert but, I am not going to ask you to go through the trouble of looking in the Browser's History around the time of said event to obtain the FakeAlert URL.
  9. Sorry, that graphic reveals no cognitive information.
  10. You posted in the Malware Removal sections which is for requesting help in such actions. As it was not about being infected and a request for malware removal assistance, your post was moved to; General Windows PC Help where the subject matter is much more apropos. Let me understand your request. Do you want the paper to be 2' 8" ( 2 ft 8 in or 32 in ) or the words “IT IS YOUR BIRTHDAY" with a height of 5" ( 5in ) ? To create a banner that is at least 32 inches long you either have to have a printer that uses rolled paper or you will have to use standard flat paper and physically join them together. For example if you use standard paper which is 8.5" x 11" you would orient the paper in Landscape such that the length is 11 inches. That would require 3 sheets to be a total combined length of 33 inches. In MS Word you would set the document to be Landscape and set the Top, Bottom, Right and Left margins to be small. Such as 0.2" The next would be to format the characters. The "text" contains 19 characters. There are two type of fonts in question here. Fixed and Proportional fonts. Fixed fonts have a fixed width so a thin letter like "I" would have the same width as a wide letter such as "M". A proportional font means the width varies with the letter's proportions so the letter 'I" would take up less horizontal space as the letter "M". If we start with the assumption that each character is 2" wide then 2 x 19 = 38" which is greater than 3 feet long and will take 4 sheets of 8.5" x 11" paper but, a two inch character will not be 5" tall unless the aspect ratio of each character was greatly exaggerated. So there is the conundrum. Do you want it to be a 1 line banner that is much longer that 32" so the characters are 5" tall a two line banner that is 32" long, etc. ? When dealing with such banners, you start to leave the capabilities of MS Word and move into the realm of MS Publisher, Adobe Illustrator or LibreOffice Impress or LibreOffice Draw ( LibreOffice is free ) where you can create a virtual banner paper and use text and fonts as needed to fit the paper.
  11. Similar to these ? I have created a 1series of videos generated from these kinds of fraud sites for the purposes of recognition and education. They are all videos from real web sites. ALL are FRAUDS. All these have one thing in common and they have nothing to do with any software on your PC. They are all nefarious web sites meant to defraud you of money. The objective is to, falsely, goad you to make the phone call and pay for some service contract for an incident that never happened. From there they may continue to charge your Credit Card for other services, remote into your computer and do real damage and/or exfiltrate your personal data and they may use the information they obtain from you to commit additional frauds. MalwareScam.wmv MalwareScam-1.wmv MalwareScam-2.wmv MalwareScam-3.wmv MalwareScam-4.wmv MalwareScam-5.wmv MalwareScam-6.wmv I have also created a PDF ScreenShow of a myriad of FakeAlert screens - FakeAlert-Screens.pdf / Flash Version Malwarebytes and Norton AV did not block the site because they did not know the site. You can help by submitting the FakeAlert web site to Malwarebytes in; Newest IP or URL Threats after reading; READ ME: Purpose of this forum This way the site can be blocked and others would not fall prey to it. Reference: US FBI PSA - Tech Support Fraud US FTC Consumer Information - Tech Support Scams US FTC - Tech Support Operators Agree to Settle Charges by FTC and the State of Ohio US FTC - FTC and Federal, State and International Partners Announce Major Crackdown on Tech Support Scams Malwarebytes' Blog - Search on - "tech support scams" Malwarebytes' Blog - "Tech support scams: help and resource page" 1. Also located at "My Online Security" - Some videos of typical tech support scams
  12. Your research brought you to a faux conclusion. While Amazon and Cloudfront may host sub-domains that have been malicious, they are not themselves malicious. The preponderance of Amazon and Cloudfront hosted sites are not malicious. Could they do better at handling malicious activity performed via their services ? DEFINITELY - Yes !!
  13. Play 'em this audio track instead FakeAlert-SoundTrack2.mp3 FakeAlert-SoundTrack2.mp3
  14. FTC Crackdown Stops Operations Responsible for Billions of Illegal Robocalls NetDotSolutions (James Christiano) Higher Goals Marketing Veterans of America Pointbreak Media
  15. Office Depot and Tech Support Firm Will Pay $35 Million to Settle FTC Allegations That They Tricked Consumers into Buying Costly Computer Repair Services
  16. You have gotten well ahead of yourself.
  17. @Amaroq_Starwind I have provided specific targeting information to you in the past. The EICAR string does not represent a PE file and thus it will not be detected by MBAM. MBAM is not a historical anti malware solution so it is not going to target 16bit COM and Win16 EXE files. Now that we have come full circle and you have recommended every suggestion that you can think of, it it high time to stop questioning what MBAM can and can't do and start your own anti malware project. Then you can incorporate all your thoughts into a tangible product and you can put your thumb print on. You can target ELF and MVS files, 16bit DOS, CP/M, Commodore 64 Apple II and even main frames. You can target the NYB and FORM and file infectors like the Jerusalem and Virut. Malwarebytes' Anti-Malware is what it is targeting Win32 and Win64 files that are infecting Today's computers and in ways not perceived of when DOS ( DR/PC/MS-DOS ) was prevalent. Malwarebytes' Anti-Malware is going to shift from static signature based detections and work on actions malware takes. The Malwarebytes' team will not concentrate on one threat or one threat actor. They will look at the overarching concepts of malicious activities and the role software plays. It is now time to stop bringing up any and every subject and for you to take the time to study and concentrate on one subject at a time until you understand that subject matter at-length and create your own product the way you'd like it to be.
  18. Dank je @pondus for posting this.
  19. Amaroq_Starwind: It is a not Phishing nor a data harvesting venture. Its a multi-point generated, mass email broadcast venture exploiting people's worries, fears and anxieties about their Internet activity. Hoping that a few scant recipients who are not well informed and don't follow current events will take the bait and pay the suggested price using crypto currencies. Its nothing more that a cheap man's get rich scheme.
  20. https://en.wikipedia.org/wiki/Patent_troll
  21. A few simple steps... Disable acceptance of ICMP Pings Change the Default Router password using a Strong Password Use a Strong WiFi password on WPA2 using AES encryption Disable Remote Management Is the Router Firmware up-to-date ? Specifically set Firewall rules to BLOCK; TCP and UDP ports 135 ~ 139 and 445
  22. I have noted the continuance of the bug as well and I will see if things have been fixed. Thank you Ron.
  23. I doubt that Malwarebytes supports the Tor network.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.