Jump to content

exile360

Experts
  • Posts

    31,301
  • Joined

  • Last visited

  • Days Won

    41

Everything posted by exile360

  1. Very true, but for those of us who also use additional defenses like large HOSTS files (such as the one provided by Malwarebytes' own hpHosts/Hosts-File.net) it's a no-go unfortunately since it requires that the DNS Client service remain active (the service must be disabled when using a large HOSTS file, and its functionality is rendered moot by configuring a local loopback/null address/sever on the system which actually makes DNS lookups even faster than with the service enabled/active). I like to offer options because of that, and also just because there are and have been a lot of good, free options available since WFP was first implemented in Windows Vista with a wide range of features and capabilities.
  2. You're welcome Yes, it's a very good article with some fascinating info. By the way, just in case you were curious at all, you can learn more about how the individual components/layers in Malwarebytes Premium work to protect systems by thwarting malware/attacks at various phases of the kill chain/attack chain by reviewing the diagram and info on this page. It also illustrates how nearly all of Malwarebytes' protection features work prior to the payload analysis phase that most AV/malware tests are centered around (things like blocking the source with Web Protection and defeating the exploits/malicious scripting etc. that attempt to download/execute malicious payloads to begin with through Exploit Protection etc.). In that diagram, the only layers that actually go into action after the malware executable/payload/file has been downloaded are Anomaly Detection (the signature-less anomaly detection component which includes the cloud analysis/detection component), Payload Analysis (the Malware Protection component), and Behavior Monitoring (Ransomware Protection etc.) (and of course Remediation Engine, which is Malwarebytes' advanced threat removal technology such as DoR (Delete on Reboot) that kicks in once a threat has been detected along with the scan engine).
  3. The point of the ad is to notify Premium customers about the new feature, which itself was a long time in the making and highly requested over the years by many Premium customers, so that they will be aware of this new addition to their Premium product. It's not like it's an advertisement for some separate application/product or some add-on feature that must be purchased separately/in addition to your existing subscription. That said, it does look like/give the impression of an ad so I totally get why you see it as undesirable and I'd have personally probably done things differently were it up to me, perhaps with some info in the upgrade installer or even just a simple tray notification immediately following the upgrade install to inform users of the new feature with something like a 'click here to learn more' or 'click here to access this new feature now' link that takes the user to the setting in the main UI so that those who would get use out of it can jump right into it while other users may simply dismiss it and be done with it.
  4. Greetings, It seems in your case that the issue may be the same one mentioned in this thread. If you would, please provide a scan log from ADWCleaner showing the detection along with a registry export of the key being detected in your next reply (you may refer to the instructions provided in the thread I linked to above if you require them for exporting and attaching the key).
  5. Perhaps, but since users typically have their email set to notify them on their smartphones this would seem to be a rather superfluous feature. That said, I think this would be a good thing for the Product/Marketing team to do a survey on or focus group around to determine if such a thing would be viable and desirable for most users. I personally think it's redundant, especially since most users would likely want notifications about all their interests/products they're fans of/security resources if that's their field of focus, and resources like YouTube, social media channels and general security/tech websites/blogs would likely be much more useful than anything focused specifically on Malwarebytes, especially since they could likely just feed their Malwarebytes subscriptions and emails into their more generalized RSS readers/email applications/browsers to integrate along with all the other info from the other sources rather than using a dedicated app just for the Malwarebytes-specific stuff. As an example, while there is a cloud based management console for many Malwarebytes business products, they also offer email notifications/alerts for detection events and critical issues that the user/sysadmin may configure to their liking, enabling them to monitor status and receive alerts on their other devices when issues arise on any of the endpoints/networks they manage/administer because this is far more convenient and flexible than keeping the cloud application open constantly to alert them (and in fact, before it was implemented, email notifications was by far one of the top requested features on the business side, likely for this very reason).
  6. But what does case sensitivity actually do? Does it allow you to place two files or two folders in the same directory with the same name as long as the case differs between them, or is it just a cosmetic thing which they're using to differentiate Linux filesystem objects? I ask because I can currently name files upper, lower or mixed case in Windows 7 (and any other Windows version) and it makes absolutely no difference as far as other programs reading/parsing them/their names. How is 10 different in that regard?
  7. Greetings, Unfortunately the integrated version of Malwarebytes that works with Untangle is the Malwarebytes Cloud Platform which is part of Malwarebytes Endpoint Protection which is exclusively a business product so you'd have to purchase business licensing to be able to use it. The consumer version doesn't include the cloud management console used in the business products as it is a separate application. That said, as an Untangle subscriber they may provide a way to access it so I would definitely recommend checking with them if you haven't already, otherwise if you're still interested you may refer to the pricing which is available here or enquire with the Malwarebytes Sales team via the form on this page to determine what solution would best suit your environment and learn what pricing options are available.
  8. Excellent, I'm glad you were finally able to edit it, however that is odd that the Dashboard is showing 'None'. What does your Scan Schedule tab show? Is the scan you created listed there? If so, please try right-clicking the Malwarebytes tray icon and selecting Quit Malwarebytes then click Yes if prompted by User Account Control and then open Malwarebytes again to see if the issue is resolved. It may have been an issue with synchronization between the UI and config files after editing/adding your scheduled scan (though that would likely be a bug if that were the case). If the issue still persists then please follow my previous instructions above for creating/posting the Malwarebytes Support Tool diagnostic ZIP archive so that we may take a look at your installation and settings to determine what might be causing the issue.
  9. Hello again It depends on the type of scan, however if you're referring to a Threat scan executed manually (either by clicking the Scan Now button on the Dashboard tab or by selecting the first/default option in the Scan tab) then you simply need to enable the Scan for rootkits option under Settings>Protection in the Scan Options section as illustrated below: If the scan being performed is a Custom scan then you need to enable the following option when configuring it: Now, with all of that said, if the scan you are performing is a manual scan initiated via the right-click context menu in Windows Explorer by right-clicking on a file, folder or drive then there is no way to have rootkit scanning active for those types of scans as they are just flat file scans and do not perform the same advanced scan techniques used for the standard scan types (like the Threat scan) as the rootkit scan engine is very specific in the locations that it checks (such as the drivers directory, system folders and boot files/MBR/VBR etc.). EDIT: I just realized that you were most likely still referring to the scheduled scan that you mentioned in your previous thread (which I responded to previously, which is why I didn't mention scheduled scanning in this thread as I thought you were referring to a different scan type as I saw that the other thread was resolved). Oh well, it's good info nonetheless, so I'll leave it here in case you or anyone else is curious about how these other scan options and functions work.
  10. Unless there have been new developments in Windows 10 that I'm unaware of, paths cannot be identical with the only difference being case (the same is true for the registry last I checked), however it's moot anyways since Malwarebytes will scan the locations and items it always scans regardless of case/filename, so I'm not sure what it is exactly that is being requested here. For example, Malwarebytes wouldn't skip a file or folder just because its name is all lowercase or uppercase if that's what you're referring to.
  11. Greetings, You should be able to click in the date box and see a calendar pop up where you may select the starting date then fill in the time in the time field as shown below: If you aren't seeing the date pop-up then click Cancel and try adding your scheduled scan again to see if that alleviates the issue. If it does not then please do the following so that we may take a look at what's going on with your Malwarebytes installation: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply Please let us know how it goes and if necessary, provide the requested ZIP archive. Thanks
  12. It doesn't matter who gets what 'first' because in the end the other side will always catch up and likely eventually leap ahead at some point resulting in a stalemate or loss (especially since the bad guys are ALWAYS better financed than the good guys, even the largest of good guys like Microsoft and Symantec, as the bad guys are financed by rogue governments, wealthy criminals and organized crime). No idea, not my area of expertise. But I'd imagine any device can be hacked/made to run 'bad code' (the original hackers used analog phones to hack systems/networks through audio tones over phone lines).
  13. While there is no dedicated app (and I honestly doubt too many users would be interested in such an application consuming resources on their devices just for Malwarebytes stuff, especially on mobile platforms where battery life and CPU cycles are at a premium), you can subscribe to feeds and newsletters and configure custom notification settings for the forums to be notified when new posts occur in specific areas if you want, and of course there is My.Malwarebytes.com for managing licenses/devices/subscriptions.
  14. Greetings, I'm not sure why ESET is claiming there's a problem with the site's cert, I just tried the normal download from Toolslib and had no issues, though I'm not using ESET (but I still would have received a warning from my browser had the site's security certificate expired or been revoked since it is configured to always check/verify certs and warn me if an expiration or revocation has occurred). You might also check your system date and time settings to verify that they are accurate, as that could cause ESET/your system to believe that the site's certificate is invalid/expired as well (a common problem I've experienced myself in the past). Otherwise, it could actually be an infection which has altered the certificates store on your system resulting in some security sites and products being blocked; a known malware tactic which has been used by several threats over the past few years. If you believe this to be the case and you require assistance in checking and cleaning your system then please read and follow the instructions in this topic and then create a new topic in the malware removal area including the requested logs and information by clicking here and one of our malware removal specialists will assist you as soon as one becomes available. Good luck, and if there is anything else we might assist you with please let us know. Thanks EDIT: alternate URL removed.
  15. Yep, I was already familiar with most of that, but again, I'm referring to real, true, actual "thinking" AI, not just complex math and branching algorithms (which is literally all that exists right now). Think of it like a super genius controlling one or many machines trying to hack into a network while another genius of equal measure attempts to thwart their efforts. Eventually a stalemate will occur as the system(s) and/or infrastructure being used/attacked run out of hardware resources to feed their efforts so ultimately in the end you get a successful Denial Of Service (DoS) attack whether that was the intent or not. As for current AI techniques (which aren't true Artificial Intelligence at all, just complex algorithms/math, not real 'thought' in any sense of the word): https://www.techrepublic.com/article/ai-vs-ai-new-algorithm-automatically-bypasses-your-best-cybersecurity-defenses/ https://securityaffairs.co/wordpress/75206/malware/deeplocker-ai-powered-malware.html https://techbeacon.com/security/how-ai-will-help-fight-against-malware https://blog.trendmicro.com/artificial-intelligence-could-remake-cyber-security-and-malware/ https://gizmodo.com/the-malware-of-the-future-will-have-ai-superpowers-1830678865 https://securityintelligence.com/anti-i-the-future-of-ai-generated-malware/ https://www.techrepublic.com/article/using-ai-enhanced-malware-researchers-disrupt-algorithms-used-in-antimalware/ https://www.dailydot.com/debug/ai-malware/
  16. Yes, they do send out a notification email before the auto-renewal occurs. You'll also likely see notifications in Malwarebytes itself when the subscription period is nearing its end. Yes, you can do it that way if you want (just buy a new 2 year license).
  17. Cool, not too bad then. Yep, no harm in waiting since they may run a promotion or something between now and then allowing you to get a better price. Yes, if you're signed up for auto-renewal (which all subscriptions are by default, though you may opt-out if you wish of course) then it will happen automatically when the time comes.
  18. That's exactly the kind of tech I'm talking about (though much earlier in development/dumber compared to the kind of true AI I was referring to). The issue is, that once it comes down to AI vs AI everyone loses because then it's just like a conflict between two AVs on the same system; resource usage escalates and eventually the system crashes or freezes due to a race condition. Imagine that on a scale that impacts entire sectors of the internet's backbone/infrastructure. We'd live in a world at constant risk of being attacked and/or used by AIs for their botnets and roaming blackouts of major portions of the web on a regular basis potentially becoming an everyday occurrence. Not a pretty sight.
  19. This is only the beginning. Once true AI comes online we'll see automated attacks the likes of which the world has never known which discover and exploit 0-hour vulnerabilities in real-time and build threats and attacks on the fly to counter any security measures and crash through any barricades in their path with startling speed and efficiency with both brute force and machine learning heuristics as well as (potentially) evolutionary cognitive adaptation to develop and push their malicious code and have their way with devices and systems, short-circuiting anything not equally equipped with 'good' AI to counter the threats (and even then, a race condition or 'tie' between such systems could easily result in a drastic drain on resources and infrastructure resulting in DoS of varying scope anywhere from the endpoint under attack to parts of the internet's infrastructure as the machines use distributed networks to pool resources and bring 'troops' into the battle to attack one another). It sounds like sci-fi, but much of what we've seen over the past decade was once thought impossible in the field of computing and technology, and I assure you, this will happen. It's only a matter of time.
  20. Greetings, You should be fine as long as you aren't doing any browsing while gaming/streaming, and you could also try adding exclusions for some of your trusted applications in Malwarebytes to see if that helps (for example, Defender, along with your games' executables and your streaming app(s)), but yeah, you should be relatively safe as long as you aren't doing any browsing with it disabled or opening any emails. As long as you are just gaming/streaming when it's off then it should be just fine. It also may help to try disabling just the Ransomware Protection component as that one tends to be more resource intensive with apps that do a lot of writing to disk as your streaming app no doubt does as it caches the streaming content. That particular protection layer isn't actually nearly as proactive as the other layers of defense in Malwarebytes since it really just watches existing threads/processes in memory for ransomware behavior (deleting backups/restore points, encrypting data etc.).
  21. Oops, stoopid clipboard didn't copy the link. Fixed.
  22. I previously voiced my concern over the future of the Malwarebytes browser extension after learning of Google's plans to change and drastically limit what browser extensions in Chrome can do, which was reportedly going to render many existing ad blocking extensions non-functional for the browser, and while I was assured that Malwarebytes already had a plan to address the upcoming change, I've now learned that Google has decided to back off its previous stance on this issue following all the negative backlash they received from avid ad block users and extension developers. You can read more about this exciting development in this article.
  23. Oh woe to the privacy advocate, woe to the internet-aware, woe to anyone who deems privacy as a real concern and believes it to be a right rather than a worthless commodity to be traded for convenience! It looks like that champion of user privacy, Google, is at it again, and this time the US Senate is demanding a response. Apparently they included an undisclosed 'feature' in their Nest smart home security devices which users only became aware of once Google introduced new smart Assistant features to the device in a recent update in the form of a built in microphone which apparently had no other use and supposedly wasn't ever turned on until this late added feature was introduced. How altruistic of Google to include a free mic with no purpose in the devices at their own cost just in case it might later become useful! Well, it looks like some aren't seeing this undisclosed component in such a beneficial light and have a few questions for Google's CEO about this component's undisclosed inclusion. Read more at the article below for the details: The Senate Commerce Committee is demanding answers from Google CEO Sundar Pichai about the company's failure to disclose a microphone inside Nest home security devices - Business Insider
  24. That still does you no good (read the article if you haven't already as it addresses this very thing) because what is written can be modified, encrypted or even built/written using a completely proprietary language/formatting that is only understood/interpreted by the malware overseeing the attack (like a binary/in-memory thread that interprets commands from the script and executes them, for example in cases like file-less malware that use Powershell and the like or threats that drop encrypted non-PE script files as .DAT and other nonsense formats that only they can read in temp folders etc. to slip under the radar of AV/AM engines that use traditional detection methods). Sandboxing/simulation isn't a bad idea, but Malwarebytes Research already has these capabilities on the cloud side of things and they develop signatures and augment MB3's protection layers based on the results so it's already well covered (they parse out all the connections, databases, exploits, scripts, install patterns etc. that a threat/attack will use and harvest that data for enhancing their signatures, block lists and protection components to target anything they missed).
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.