Jump to content

Hydruis

Members
  • Content Count

    79
  • Joined

  • Last visited

About Hydruis

  • Rank
    Regular Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I understand what you are saying but look at no petya/petyawrap at first people believed it was ransomware however soon after people concluded it was a "wiper" to cause destruction on mass scale to peoples data although some people got a double whammy and paid bitcoins to the ransom note address even though their was no chance of getting their files back? So whats to say someone couldn't create a bios level type of malware that could prevent access to the operating system or access to data user data on the machine then leave a ransom note under the false pretenses hoping someone would pay up? I mean sure like if you have a dell optiplex 780 that has bios level malware that cannot be resolved take the HDD out of it and destroy it or try to extract the files from it. (To be noted though not everyone feels comfortable opening their computer case) However if it was an expensive computer (costly to replace) or maybe even an organisation that has 1000's of computers it wouldn't be so easy (think of the downtime)?
  2. (I wasn't really sure where to post this thread so ill take a guess a post it here as i felt it didn't fit into any of the other forum categories.) Why has no one yet created a bios level ransomware or locker surely it would be that much harder to remove for average users. Now i am by no means a programmer but i just don't quiet understand why the bad people haven't jumped on this scary thought yet I mean from my understanding currently you have three types of ransomware screenlockers, ransomware that encrypts personal files in user folders, then ransomware that encrypts the MBR or changes the MFT so you cant boot into windows. But what if someone created a piece of ransomware/locker that corrupted the bios so your system is screwed unless you clear CMOS i mean most people wont know how to clear the CMOS or even worse the malware could cause a corruption so severe you cant reset the bios? Other possible malicious methods could be to lock the bios and disable the cmos reset ability. Maybe i am speaking completely hypothetically here but i am just curious as to why the "evil people" haven't ventured this path? Also it's not like people actively update their bios/uefi that could also lead to vulnerabilities.
  3. Thanks for the reply's you have put my mind at rest i can live with it i guess while still enjoying the game.
  4. So i just installed a steam game called "war thunder" i am a little concerned however i noticed one the top negative comments was trying to complain about malware they seem to suggest that an auto updater called GJAGENT.EXE is potenially malicious doing a few google searches came up with a few results. i mean call me naive but i don't really see an auto updater as malicious for a game maybe a pup at most? (even then it's on steam and seems to be very popular) it could be some disheartened rage quitters who like to take their fury to the comments section nothing new if that's the case. Just a concerned gamer who doesn't want to infect his beloved gaming PC however at the same times whats to get the most out of it!
  5. I recently purchased a hp 22 er monitor for some odd reason when I load a youtube video and or refresh the page (youtube.com/whatevervideohere) the screen goes black for like 1 second (whole screen) then it goes back to normal and the video plays this is also when youtube is not even on full screen just in the browser mode. The whole monitor screen goes black for a fraction of a second it only happens on youtube other streaming sites like Netflix works BBC Iplayer works fine just youtube seems to be being difficult even when I play full-screen games I seem to be getting no issues? the screen goes black always before the video actually starts while it's buffering to load the monitor will go completely black sometimes once or maybe twice but once the video has loaded no more issues until the next video is played then again before it has loaded it will black screen once or twice then the video plays any help would be welcomed as I am not sure my eyes can take it much longer
  6. Thank you for linking that thread @Aura answered all my questions cheers!
  7. Does malwarebytes 3.0 offer keylogger protection or to put it anotherway do keyloggers come under the malware bracket that malwarebytes protects against? I found this on forums but it's a little old to say the least has anything changed since then?
  8. So i was reading your blog here https://blog.malwarebytes.com/cybercrime/2017/06/petya-esque-ransomware-is-spreading-across-the-world/ And i noticed in the blog it mentioned malwarebytes users protected by zero hour protection. How does this work exactly? If i was to take a shot in the dark lets say ugh victim 1 PC gets infected then that user has malwarebytes installed they do a threat scan then that malicious object gets uploaded to malwarebytes cloud infrastructure and analyzed by a set of algorithms then analyzed manually by a security researcher then once confirmed a new threat a updated malwarebytes threat definition patch is released. Would you say that's mildly accurate explanation? Just a curious malwarebytes user-
  9. Disabling the layers of protection malwarebytes offers would reduce its capacity to block threats people are putting themselves at risk whether they do it at no fault of there own (Eg system incompatible with one of the layers) i think that's just common sense. Malwarebytes free (After the 14 day trial) is what i would argue a reactive program rather than proactive it is designed to cleanup an infected system not prevent threats whereas Malwarebytes premium proactively blocks threats and cleans the remnants up. (Feel free to correct me if i am wrong) As for how the protection works i have found this (Not all videos granted) : https://www.malwarebytes.com/webinars/ Also you have their blog: https://blog.malwarebytes.com/ I would say some stuff on their blog and webinars is not very noob friendly although props to whoever does the infographics make it a lot easier to understand for people like me. Also to note stuff on the malwarebytes blog/webinars and youtube channel may not be orientated to the casual/noob internet user. Actually speaking on that point this as a possible suggestion: maybe videos on the malwarebytes youtube channel showing malwarebytes blocking the latest and greatest threats out their today in cyberspace. I understand my term used "latest and greatest" may be a cop out but malware that has been in the news recently and or trending that's what consumers are talking and worried about they see something in the news start panicking am i affected and then they want a solution to it by showing in a video you block it people are reassured and i would argue more likely to be a user. Videos are a great way to get a message across. I would rather watch a video than read a wall of text but then again i probably don't represent the average internet user.
  10. I don't know a lot about ransomware but surely as other people have stated on this thread to have a fair review you would at-least have all modules activated as malwarebytes is from what i hear meant to be a layered defense. I also get peoples gripe when they say these are simply not real world scenarios nobody wakes up in the morning and is like "awe yeah gonna add some cryptolocker to my bowl of fruit loops this morning" In other words most people download malware by accident. And i also noted that what is the point of these tests you cannot even relate to them? You don't choose what malware will be placed on your system it's up to what malware these hosts choose to deploy. There is always that age old argument of bias which is challenging one since most antivirus/antimalware opinions are controversial and tempers can get quite heated. "Remember guys the reviewer is always right" Until you find out he/she is getting has a financial interest and or is of a biased mindset.
  11. Hackers will target anything with PII attached to it. If you are struggling to remember complicated passwords you should be using a password manager make sure you use a reputable company/software.
  12. I believe every time you scan with Malawarebytes 3 it automatically checks for updated malware definitions before the scan starts free or not. If i am wrong feel free to correct me.
  13. No wait don't leave this thread i know the title is as repulsive as i am and however bare with-me I keep hearing this term on most techy places on the web from howtogeek, malawarebytes, bleeping computer, IGN, gamespot, steam and to many others to mention i get what it means but why just why lol... out of all the things in the world it had to be snake oil didn't it just defies belief haha... trending terms these days well i never... where did this term come from does it have some history behind it?
  14. So i saw this setting in mbam what does it do i thought most if not all antimalware/antiviruses by default use a signature system how does signature-less work i am confused Like for example in windows defender you can update definitions which i presume is another word for signatures right? If for security reasons you cant go into too much detail i understand
  15. I got a warning from MBAM telling me it blocked an outgoing connection for GTA5 (I still can play though ) just thought i would give you guys the heads up just in case this an error. A couple of things is this a false positive, why was it blocked and should i need to take any further action regarding my computer. Just a concerned MBAM user that's all Here is the report: Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 5/15/17 Protection Event Time: 6:39 PM Log File: Administrator: Yes -Software Information- Version: 3.1.2.1733 Components Version: 1.0.122 Update Package Version: 1.0.1945 License: Trial -System Information- OS: Windows 10 CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , , Blocked, [-1], [-1],0.0.0 -Website Data- Domain: IP Address: 185.53.35.37 Port: [6672] Type: Outbound File: D:\Programs\Steam\steamapps\common\Grand Theft Auto V\GTA5.exe (end)
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.