Jump to content

exile360

Experts
  • Content Count

    23,928
  • Joined

  • Last visited

Everything posted by exile360

  1. If that is the case, then the solution is simply to follow the instructions in this support article then to follow the instructions in this support article and the issue should be resolved. Once you are ready to install the new version, simply launch Malwarebytes and go to Settings>Application and click on the Install Application Updates button and allow the program to download and install the new version.
  2. In that case, unfortunately your only option will be to wait on Malwarebytes Support to respond to you via email for your support ticket. I will notify a member of the staff to look into why you haven't received a response yet. In the meantime, please provide the ticket number so that he will be able to look it up. @AdvancedSetup would you please check the status of this user's ticket?
  3. Greetings, Yes, it should take you to the appropriate page of the help document, however if it does not, then you may still navigate it using the menu items on the left side of the online help guide as sown below: That said, there does appear to be an issue with the images failing to load. I will report this to the Website team so that they may correct the issue. In the meantime, all the written documentation for the guide is still visible describing each feature and function and how they work. I hope this helps and if there is anything else we might assist you with please let us know. Thanks
  4. You might also try creating an account using your current email address (instructions on signing up can be found in this support article), then try adding your license key manually to your account as documented in this support article. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  5. Do you know which product specifically you purchased a license for? There really isn't a 'Malwarebytes Corporate' product any longer to my knowledge, however there are various business products that do include the Malwarebytes 1.8 client, however the included features depend largely on the type of license/product that you purchased. You'll find examples on the right side of this page under Business Solutions as well as this page.
  6. While we have no bot for that purpose, a member of the Malwarebytes staff does regularly create a new pinned topic this area whenever a new version is released. For example, on the day that version 3.8.3 was published they created this topic. They generally post the new version number along with a brief description of the changes, bug-fixes and new features. Additionally, you may find the release history for Malwarebytes for Windows on the right side of this page. Just click on the Release History item on the right and it will expand to reveal the list of releases, though generally speaking the forums here are generally updated with a new pinned topic more quickly (as mentioned, on the same day as the release). I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  7. My credit's so bad, anyone trying to pull any sort of credit scam/loan scam using my info would likely find that they'd be better off just being honest and using their own, but if any wealthy criminals feel like taking on my debts and paying them for me, they're more than welcome to it
  8. By the way, the official press release from Capital One about this incident can be found here.
  9. Yep, agreed, but it'll never happen, at least not in the US thanks to lobbyists who fight to represent these companies' financial and legal interests. It's the same reason net neutrality died/was overturned and why the likes of Microsoft, Google, Yahoo, Facebook etc. were all called out over PRISM, yet every single one of them had almost the exact same response, nearly word-for-word (curious, isn't it?) when speaking publicly about the allegations made in the leaked document provided by Edward Snowden. All this data collection is a great tool for governments, marketing folks, and pretty much anyone who has the means to take advantage of such massive data sets; something that is becoming increasingly accessible via modern hardware and AI/Machine Learning, with powerful GPUs to process all that data becoming more powerful and more widely available every year. Unfortunately it will not be long before the bad guys begin taking advantage of AI as well, and when they do, the cyber-security industry is going to have a massive issue on its hands in trying to keep things secure.
  10. Greetings, I'm sorry that you have experienced these issues with ADWCleaner, but hopefully we can assist you in getting the problems corrected. If you would, please provide a Process Monitor log while replicating the issues you are reporting above (the issues creating exclusions) so that the Developers may take a look at what the program is doing and hopefully fix the issue: Keep AdwCleaner in its current blocked state, Download Procmon from here: https://download.sysinternals.com/files/ProcessMonitor.zip Extract the zip archive to your Desktop Run Procmon.exe Procmon should start logging, click on the `Save` icon: In the prompt dialog, be sure to select "All Events", and save the file with a PML format. Attach this .pml file to your next answer. Additionally, it may help to provide details about your system configuration so please do the following: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply Thanks
  11. Greetings, This was a false positive and has been corrected. Please update your Malwarebytes databases if you haven't done so already and the issue should be resolved. Please let us know if there is anything else we might assist you with. Thanks
  12. I'm really tired of hearing about these. As security conscious users, we take measures (sometimes extreme measures in the cases of the more paranoid among us such as myself) to secure our systems and our data, yet it seems none of us is safe from being violated, but not through any fault of our own, but instead by third parties who are responsible for our data because we are in their databases. This time it's Capital One that had their systems infiltrated, but thankfully the culprit has been caught, however at this point no one knows if the guilty party shared (or sold on the black market; a common ploy by hackers seeking quick profits) any of the stolen information that was exfiltrated from Capital One's servers, but the issue is being investigated by authorities. You can learn more about this incident here. The article claims that this is one of the largest financial service breaches in history, apparently dwarfing the recently reported Equifax incident; you can read more about that incident on the Malwarebytes Labs blog here if you aren't familiar with it. One of the issues I find most frustrating is that in spite of these near constant breaches, large companies continue to seek more and more information about their customers (and anyone who uses their services/sites/software etc.), and while the amount of information these organizations have on people is only increasing exponentially, the number of breaches exposing all of that information is also increasing. I am not claiming that there is any sort of correlation; obviously there is not, however it is disturbing that these organizations are so eager to gather so much personal data and information when it's been proven time and time again each time an incident like this gets reported, that they cannot keep that information secure and out of the hands of malicious third parties such as hackers and criminal organizations. That doesn't even take into account the potential for a malicious actor within such an organization such as a rogue employee who might be secretly stealing data to profit from it on the black market or through credit fraud.
  13. In the scheduler for either a Threat scan or Custom scan you can enable rootkit scanning; just click the Advanced button in the editor and then check the box for rootkit scanning. As for why it is disabled by default, it is because it typically takes much longer to scan when rootkit scanning is enabled and in most cases it isn't necessary as most threats are not rootkits.
  14. You have to exclude the individual executables using the same Exclude an Application that Connects to the Internet setting you used for excluding Outlook.exe, otherwise it does not exclude them from Web Protection (it only prevents them from being detected as threats by Malware Protection).
  15. Thanks, and how about if you also exclude BD's process(es) as Web Exclusions the same way you did for Outlook? Does that help? I'm hoping we can find a way to eliminate the issue without fully disabling Web Protection.
  16. Very good, I'm glad to hear it If there's anything else we might assist you with or if you have any other issues with ADWCleaner please let us know. Thanks
  17. Greetings, The easiest way to exclude these items would likely be to simply perform a scan, and once the scan completes and you see these items listed in the scan results, right-click on each and select the option to always ignore and they will be added to your exclusions so that they are no longer detected. This is much easier than trying to exclude the items manually via the Exclusions screen. I hope this helps, and please let us know if you still have any trouble or if there is anything else we might assist you with. Thanks
  18. Greetings, I see that you have a thread in the malware removal area where you are being assisted by AdvancedSetup. Please stick with that topic for now to get that issue resolved, and if you still require assistance after you are done there, then please return to this section of the forums and create a new topic to continue working on that issue. If you have any trouble following any of his instructions, simply ask him to clarify and I am certain he will be able to walk you through the steps that need to be done. Thanks
  19. Greetings, By default Malwarebytes will allow you to keep Windows Defender active alongside Malwarebytes so that you benefit from both protections, however you can disable Windows Defender if you wish. To do so, open Malwarebytes and navigate to Settings>Application and under the option for Action Center set it to Always register Malwarebytes in the Windows Action Center and then disable Windows Defender using one of the methods described in this article. I hope this helps and if there is anything else we might assist you with please let us know. Thanks
  20. You can toggle the option to notify you about protection components being off under Settings>Application in Malwarebytes; that will keep it from showing that notification when it is disabled.
  21. You're welcome, I'm just sorry I couldn't do more to help.
  22. That's a real bummer, I'm sorry to hear that. My GMail account is usually pretty good about filtering most of the junk out, but admittedly I do give out my GMail address as little as possible, and usually either use a bogus address if it's required (and assuming they don't require verification; though unfortunately most sites/services do these days), or I'll use my Yahoo address instead which seems to also be pretty good about catching the unwanted junk/spam. If you can determine the source of the spam that could definitely help you to avoid it in the future. Basically try and determine around when it started coming in and figure out what the most recent site/service etc. you signed up for using that account was at the time or who you gave the address to (it could also be that someone you know was infected with malware and your address was snagged from their address book and the bad guys are now spamming everyone whose address they've retrieved that way). Of course another possibility is that one of the countless data breaches that have taken place over the past several years resulted in the bad guys getting your address among the others that were stored in one of the online databases they stole and that's where it's coming from. Either way, I hope that you are successful in avoiding the spam in the future; I know how frustrating it can be when you just want to read your messages only to be greeted with an inbox full of spam.
  23. Yes, that likely is the offending module. It is likely using a similar method to Malwarebytes for blocking malicious websites and servers (it's likely hooked directly into the network stack via the WFP APIs the same as Web Protection in Malwarebytes is). Please let us know how the testing goes and what you come up with. Once we discover which options work and which ones don't, then we can try and determine which is the least risk for resolving the situation while retaining as much protection as possible.
  24. That's my suspicion as well. I can't recall any cases where Malwarebytes scanning killed a drive. It's also possible (though far less likely) that there was some kind of power issue during the night that corrupted the drive. Either way I'd suggest unplugging the drive until you are ready to attempt data recovery on it if you need to retrieve the data. I'm not sure how good the recovery tools that are available to consumers are, but professional data recovery services are quite expensive so if the files on that drive aren't too important and/or you have them backed up elsewhere then it would probably not be worth going that route.
  25. What kind of data was on this drive? I'm just curious because some types of files are scanned much more quickly than others (for example media files such as images, audio and video files as well as documents; archives and executables take the longest).
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.