Jump to content

David H. Lipman

Experts
  • Content Count

    17,306
  • Joined

  • Days Won

    15

Everything posted by David H. Lipman

  1. Watch EFF Cybersecurity Director Eva Galperin's TED Talk About Stalkerware By Gennie Gebhart May 28, 2020 How to protect against stalkerware, a murky but dangerous mobile threat Posted: October 9, 2019 by Wendy Zamora Malwarebytes.
  2. I reported this Yesterday and Malwarebytes staff is aware of it and is working the issue.
  3. 169.254.169.254 Is a Auto-IP Link Local address associated with Auto IP Generation. Reference: https://en.wikipedia.org/wiki/Link-local_address
  4. It's a good discussion, but this isn't a discussion sub-forum. Its purpose is for submitting malware samples that are related to crytovirology and to Rogue software such as fake anti malware software. I am requesting the forum admin. move this thread to; General Chat Examples of malware performing cryptovirology are Ransomware such as; WannaCry, Locky, AIDS Trojan, Cerber, Gpcode and Crysis to name a few. References: Cryptovirology: The Birth, Neglect, and Explosion of Ransomware There are a few types of Rogues. They can be fake anti malware software or even hard disk dia
  5. I believe this will provide the Interface # netsh int ipv6 show interfaces netsh int ipv4 show interfaces
  6. Barnes & Noble hit by cyberattack that exposed customer data
  7. Please upload them here by placing them in a ZIP, RAR or 7zip Archive and then attaching them.
  8. That's certainly a good idea and a reminder to all. Reference: Strong Password
  9. Excellent Norwegian disaster Movie ! The Wave
  10. Ransomware Guide Ransomware Guide (Sept. 2020)
  11. The file is not malicious. https://www.virustotal.com/gui/file/08ce01259b5f63cf2913934a00a1e9ff282f54d0e887c4c4d805625e9e1e8944/detection The declaration of Malware.Exploit.Agent.Generic appears to be a False Positive.
  12. *** UPDATE *** By Brian Krebs, KrebsonSecurity Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack
  13. Methane Hydrate seeps in the Gulf, Caribbean and off the Oregon coast and possibly even more places. Interestingly enough, there is a Polychaete Worm named Hesiocaeca Methanicola that thrives on Methane Hydrate seeps.
  14. http://www.marina.gi http://www.gib-conservatives.com http://www.gibnews.net http://www.gibname.net
  15. Staples announced a Data Breach on Twitter - https://twitter.com/troyhunt/status/1305299215258542080
  16. Report: Popular Marketing Tool Exposes Dating Site Users in Massive Data Leak
  17. US Staffing Firm Artech Keeps Silent About Data Breach, Leaves Customers at Risk of Fraud for Eight Months
  18. It is now a well known fact that State Security Services and Military contract their respective country's hacker community members to assist in data and credential harvesting as well as monetary and intellectual property theft. These joint venture Advanced Persistent Threats (APT) are assigned an APT number and may also be assigned a moniker such as Fancy Bear (APT28) and Cozy Bear (APT29). Cozy Bear compromised the two US Political Party committees prior to the 2016 election. For one they released data publicly through Wikileaks to subvert that Party. The other Political Party's harve
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.