Jump to content

treed

Staff
  • Content Count

    1,453
  • Joined

  • Last visited

12 Followers

About treed

  • Rank
    Staff

Recent Profile Visitors

14,404 profile views
  1. The About Malwarebytes window is opened from the Malwarebytes menu in the menu bar, shown here: For the database (aka, protection) version, click on Detection History (anywhere in that square "card"), then click on Reports, and look for something like this: I don't recommend getting too worked up about the protection version, though. It'll update automatically before every scan, if necessary, and the number itself won't really give you any useful information.
  2. The problem was fixed today, as I see you've already noticed.
  3. Yup, that's definitely within a normal range. For more information, see: https://support.malwarebytes.com/hc/en-us/articles/360038524054-Why-Malwarebytes-scans-so-fast-on-Mac-devices
  4. Malwarebytes for Mac does NOT actually use a System Extension yet. Work on that is underway, and has been for some time, but it is not ready yet. Also, to clarify some other things... 1) Apple has not, strictly speaking, changed anything regarding deprecation of kexts. Technically, the KAUTH and other APIs used by kexts have been deprecated for some time. Deprecation does not mean they no longer work, just that they are in danger of not working in the future. Because there were no other options, historically, most companies that have software that relied on KAUTH continued to use it anyway. 2) Nothing is changing regarding the availability of these APIs in macOS 10.15.4. 3) We know that things will change in macOS 10.16, but it's still not entirely certain how they will change. We'd really rather not find out, and are planning to have a System Extension before then. 4) As far as I can tell, the only change in 10.15.4 appears to be that the warning message that is displayed when the software tries to activate the kext has changed from this: to this:
  5. It's only important for Catalina (and beyond, for future readers). The only thing a lack of full disk access impedes us from removing on Mojave is adware in the form of old-style Safari extensions, which no longer run in Mojave anyway. That said, it certainly isn't going to hurt to give access on Mojave, either.
  6. What you are describing sounds like it's probably not malware. It is not necessary for malware to install hundreds of apps to get a backdoor into your computer; all it takes is one, and installing hundreds would do nothing but increase the chances of the user discovering the infection. I suspect that you are looking at legitimate parts of the system, but cannot be sure without more information. If you can post some screenshots, as adas requested, that would be helpful.
  7. Please note that this does not mean that apps from the App Store are safe. There have been cases of apps engaging in malware-like activity, such as theft of user data or scamming users out of money, on the App Store. Just because an app is on the App Store does not mean there's any guarantee that it's legitimate.
  8. Please note that if you're still using Malwarebytes Anti-Malware, all versions of that are outdated. We're still delivering rule updates to Malwarebytes Anti-Malware 1.3.1, but it is no longer compatible with the latest versions of macOS. We would recommend uninstalling it and using the latest version of Malwarebytes for Mac instead. https://support.malwarebytes.com/hc/en-us/articles/360038479294-Download-and-install-Malwarebytes-for-Mac-v4
  9. Even if someone were to do that, locking the setting manually is still of dubious utility. It only prevents someone with access to the computer from changing those settings... but if someone malicious has access to your computer, you have way bigger problems to deal with. The possibility of fiddling with full disk access settings is the least of your concerns in such a case, and no security system in the world can protect you against an adversary who has physical access to your logged-in computer.
  10. That's not actually correct. Unlocking a pane in System Preferences is purely temporary. Try it for yourself... unlock a pane, leave it unlocked, and quit System Preferences. Then reopen System Preferences and go back to that pane. You will see that it is locked again.
  11. These error messages appear to be "normal." I see them on a system here that does not have Endpoint Protection installed, and many others have reported them as well: https://stackoverflow.com/questions/58321114/why-i-get-the-console-warning-process-kill-returned-unexpected-error-1-when
  12. It's very unlikely that that page could have caused such a problem, or infected your system in any way. I won't say impossible, especially since you're using an extremely old system and an extremely old version of Chrome, just unlikely. (There's really not much profit for a hacker to target such old systems & software, as there are a vanishingly small number of people running them, but they also will have known vulnerabilities that would make attacking them easier.) Most likely these issues are just the result of using such old software. There have been general issues with Safari on the newer Mavericks (10.9) system accessing web pages, so it's not surprising to see issues on Mountain Lion.
  13. Thanks for reporting that! I'm guessing that's a copy-paste error, but I'll report it so it can get fixed ASAP.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.