Jump to content

treed

Staff
  • Content Count

    1,248
  • Joined

  • Last visited

8 Followers

About treed

  • Rank
    Staff

Recent Profile Visitors

12,142 profile views
  1. Your account on this forum and your access to the iOS beta are completely unrelated. There's no connection between the two. There's nothing you could do here on the forum that would affect your access to the beta.
  2. I removed the screenshot. I don't have the ability to change your e-mail address - or, if I do, I don't know how - but @AdvancedSetup should be able to help.
  3. I'm not seeing the same problem here. The e-mails look normal in Mail on my iPhone (see below), and this is with loading of images turned off. What version of iOS are you using?
  4. For PDF files, not if you're opening them with Preview... there are no known exploits for that. Office files can contain macros, and although recent versions of Office enforce a sandbox on macros, there are some known sandbox escapes. If you allow macros in Office documents to run, then it's possible you could get infected... so, just don't let macros run. Unless you open an app or other executable file of some kind, you should be fine, and in such a case, macOS should block them if they're not signed, and recent versions of Malwarebytes will block them if they're signed with a known bad code signature ("known bad" there being a more extensive list than what Apple considers to be bad ). Again, though, I'd caution that there's always the chance of some new, previously-unknown exploit, so this advice cannot be considered to be 100% valid... but unless something changes, or you're the target of nation-state adversaries, you should be fine if you're careful.
  5. I'm not sure that I understand the problem you're having. See the following guide to activating Premium on Mac, and if that doesn't help, please provide specific details about what you're having trouble with: https://links.malwarebytes.com/support/activate_mac_tree
  6. Currently, there really haven't been any USB-based exploits on macOS, largely because macOS never supported autorunning a process from an external drive. Thus, there has never been any case to my knowledge where a Mac was infected by connecting a USB drive. That's not to say it's impossible, of course. There was, at one point, an exploit that could use the Thunderbolt port to modify the firmware: https://trmm.net/Thunderstrike This was purely theoretical, with the exception of an NSA exploit that was leaked that appeared to use this technique. And this did not involve USB. It's highly unlikely that you'd get infected just by connecting a standard USB flash drive. The only known exceptions would be USB drives with specific hardware added, such as a USB Kill device (which fries any device it's connected to) or something like a Rubber Ducky, which acts like a keyboard and injects commands via keystrokes (which is extremely obvious if you're sitting in front of the computer when you insert the drive).
  7. Please be sure to let us know if those steps don't work.
  8. Did you download from malwarebytes.com, or from somewhere else? Can you provide more details about what seemed sketchy? I'm not sure I understand what you mean when you say it "wasn't registered on the website." Can you provide details? You should definitely receive an e-mail about the purchase. Are you certain that you entered the e-mail address correctly, and have you checked your spam folder to see if it went there? That's completely normal. On recent versions of macOS, you are required by Apple to manually approve the system extension that does all active protection. You should have seen the exact sequence of steps described in steps 11 through 16 here: https://support.malwarebytes.com/docs/DOC-2634
  9. I'm not 100% well-versed in exactly what senders are used for these messages, but I know it'll no longer be from Cleverbridge in many cases. Much or most of the new purchasing has been shifted to Avangate.
  10. The only Malwarebytes software that runs on the Mac that would be capable of blocking pop-ups would be the Malwarebytes browser extension, currently in beta for Chrome and Firefox. But it doesn't do pop-up blocking directly, just blocking of ads, trackers, and malicious sites, which seems unlikely to affect your credit union's website (unless it's something like a phishing site pretending to be your credit union's site). If you are using Chrome or Firefox, and have that browser extension installed, try disabling it. If not, or if disabling it doesn't work, whatever's going on isn't related to Malwarebytes in any way. (But be sure to make sure you're actually on the correct site before disabling it!)
  11. Ahh, okay! I misunderstood. I guess that's what comes from trying to hurriedly get caught up in the morning before heading back down to day 2 of the Objective by the Sea conference.
  12. Ahh, I see that I do have such a folder... it just doesn't show up in a Spotlight search. That's not getting detected by Malwarebytes here, though, so I'd need more information about what's in the copy of that folder that is getting detected. I assume it's not getting detected for you, Al?
  13. This is not malware, and there's no need to turn off the computer for an hour. This is a legitimate feature of Chrome, being abused by that site, and you must properly remove the logineasier[.]com notification setting from Chrome. The site will ask you to allow notifications: Once you have done so, in order to remove them, you have to follow the instructions on the Google page linked to by adas: On your computer, open Chrome. At the top right, click More Settings. At the bottom, click Advanced. Under "Privacy and security," click Site settings. Click Notifications. Once you are there, you must remove it from the list of sites that have been allowed to send notifications, by clicking on the button that looks like three vertical dots to the right of the site URL and clicking Remove in the menu that appears:
  14. TotalAV is one of several clone apps made by a company who was responsible for PUP software that was found in more than 50% of all adware installers that we saw on the Mac at one point. It's definitely not something I'd advise using.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.