Jump to content

Amaroq_Starwind

Honorary Members
  • Posts

    700
  • Joined

  • Last visited

Everything posted by Amaroq_Starwind

  1. Response from GlassWire after I mentioned this thread pretty much confirms your own comment, @exile360.
  2. I recently made an account on D'Wave's LEAP community forum, and I have gotten a chance to learn more about how quantum computing actually, well, computes. I was actually expecting to be disappointed, but instead I actually got even more hopeful of its capabilities, and it's given me some new ideas. I'd like to share a few of them, but I really would also like some other people to join in my brainstorming. I don't like being the only guy who has ideas. Anyways, here's my handful: 1. Troubleshooting and correcting vulnerabilities, crashes and other bugs 2. Recovering data, particularly structured data which has been heavily corrupted or encrypted, or unstructured data which is at least partly intact (assuming there's something to compare it to, like a hash of the original file) 3. Predicting multiple possible signatures from a single Malware sample, so that signature-based detection isn't completely useless and so that "block at first sight" policies can still be helpful. 4. Optimizing slow code, prioritizing critical workloads when resources are constrained, and tracking suspicious activity to its source. 5. Identifying false positives by predicting the consequences of letting a sample go.
  3. To my understanding, there shouldn't be any conflicts between GlassWire and the MalwareBytes/Binisoft WFC, but I should probably ask the GlassWire company to be sure.
  4. This is why I love the CloudFlare DNS; on top of being extremely fast, your DNS queries are encrypted. So while it isn't a true VPN, it's still just a little bit harder to snoop on and interfere with.
  5. Thanks for the links, but was expecting something a bit more subjective. Like, opinions/recommendations.
  6. Since Apple keeps aggressively shooting down cybersecurity for iDevices, is there a way that users could transition to obtaining Malwarebytes through the Enterprise Management system?
  7. Windows 10, by default, reserves Case-sensitive filenames/folders for the Linux subsystem, but there is a registry change you can make to enforce Case-sensitivity for Windows programs as well, and you can use PowerShell to set specific folders to be Case-sensitive.
  8. The MalwareBytes team could put an unrestricted version of the app inside of the MalwareBytes Windows client, and allow the user to manage the sideload that way. Since it would be through a secure channel, it wouldn't be anywhere near as dangerous as grabbing it from a website.
  9. Due to recent events, I feel a strong urge to switch over from the Home version of MalwareBytes to the Business version, but before I fork over the delicious cash or plan my budgeting, I want to know some things: 1. As a current Home user, what business-exclusive features could I reasonably expect to benefit from in everyday use? 2. When upgrading from Home to Business, which products in particular would you recommend? 3. Based on the answers to the previous two, how much more can I expect the Business-line products to cost me compared to the consumer versions that I'm already using? Thanks! 🦊
  10. Does Malwarebytes have the ability to scan case-sensitive files and directories? If not, then I strongly feel like that ability should be added, especially since Windows supports case-sensitive files and directories now, and cross-platform threats are becoming increasingly common.
  11. Sometimes, an app is just a lot more convenient. And I'm sure that there's a ton of room for optimization to minimize resource consumption, especially battery.
  12. Just out of curiosity: would analog computers be more resistant to Malware?
  13. This is why the security providers need to get their hands on the quantum computers first, and why we need to start using mesh nets.
  14. This idea is a simple one; incorporate the Android version of the MalwareBytes components within the Windows and Mac versions, and allow it to scan Android devices over USB. This would be a good way to remove Android-based threats when an Android device is no longer under the user's control, as Android threats can't target Windows. This functionality could also extend to sanitizing MicroSD cards from Android devices, or even allow you to sideload the Android version of Malwarebytes through the Windows/macOS Malwarebytes client.
  15. My proposal here is simple; an app for iOS/macOS, Android, Win32, UWP and Linux that keeps informed whenever there is a new blog post, product announcement, beta program, and so on. It could also let you access the MalwareBytes community through your forum account, manage your licenses and installed products, and more quickly and easily get in touch with support staff.
  16. 1. https://www.wired.com/2016/06/demonically-clever-backdoor-hides-inside-computer-chip/ 2. https://en.wikipedia.org/wiki/Hybrid_computer 3. https://en.wikipedia.org/wiki/Analog_computer#Resurgence 4. https://www.dwavesys.com/take-leap 5. https://spectrum.ieee.org/computing/software/mayhem-the-machine-that-finds-software-vulnerabilities-then-patches-them Here we go... Hopefully something good will actually come out of me sharing all this information.
  17. MalwareBytes Quantum. Leveraging the power of cloud-based quantum computing, MalwareBytes Quantum actively hunts for zero-day vulnerabilities around the clock to correct them on the fly, and even hunts down Malware authors to give them a taste of their own medicine.
  18. There's a system called MAYHEM, designed to hunt down vulnerabilities zero-day vulnerabilities and correct them on the fly. Combine that with a hybrid Digital/Analog/Quantum supercomputing platform, and you might have an effective defense. I know for a fact that it can be done.
  19. I really don't want to bump this, but seeing as nobody came when I specifically mentioned them... 😕 It's been exactly a year since @oblivionisinevitable made this thread, and literally nobody but myself seems to have responded in that time.
  20. It was inevitable. Some groups are just filled with horrible, horrible people.
  21. "MalwareBytes has encountered an error. Please contact support."
  22. https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/ This is the first known Malware specifically designed to kill people, as far as I can tell. I feel like there couldn't be a better time for somebody to take a more offensive approach to cybersecurity...
  23. Wait, really? That's unfortunate... I currently have a license, so I didn't even realize.
  24. What I meant by scanning scripts is to run them in an online simulation as a means of testing their threat level, and trying identify patterns in the way they're written.
  25. By Non-PE, I specifically mean things like Script files, DOS executables, Linux executables, JAR files, and so on. MalwareBytes doesn't scan those, but just because a dormant threat can't affect your current system does not mean it can't affect other systems, especially on a business or development platform, or when using peer-to-peer file sharing. I only even found out that MalwareBytes didn't try to scan DOS executables because of a file called PAPER.TXT/PAPER.EXE, a research paper (about itself) which was also an executable program. Early on in the paper, it mentioned that virus scanners may pick it up. I manually scanned it with MalwareBytes, and it didn't detect anything, but when I showed the paper to MalwareBytes staff they told me that it was because it was a DOS executable and would thus have little to no threat potential against a modern operating system. Or so they say... you can never be too careful, IMHO.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.