Jump to content

Search the Community

Showing results for tags 'false positive'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Privacy
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

  1. I ran this OCR program, which converts image files into text docs of various sorts. No false positive. I am not sure if that is good or bad. When I had Bitdefender 2016 installed, with ransomware protection enabled, ABBYY was flagged.
  2. devenv.exe, Blend.exe MWBARWFILES.zip Blend.zip devenv.zip
  3. False positive for Karen's Replicator backup program. More info about the Karen's Replicator program and to d/l for testing: http://www.majorgeeks.com/files/details/karens_replicator.html
  4. I was a litte bit suprised as Steam was detected while trying to update. I use the beta client. ->MBARWFILES.zip
  5. Malwarebytes Anti-Ransomware Beta has detected a false positive on our systems. The program it thought was ransomware is called Identity Finder. It is a software used to detect confidential information (ie. SSN, Credit Card #, Passwords, etc.) on your workstation and give you the ability to shred, scrub, or delete them. This software is used across our environment, as I am sure in other places as well. I have attached the necessary information. Thanks! IDF EXE Files Restored.zip MBARWFILES.zip
  6. Malwarebytes anti ransomware quartined file Playon.exe which is part of mymedia; subsequent restore did not repair file removed, had to re install.
  7. Dear Team, When we download our Ad blocking Software hosted on https://adstopper.com/7-day-trial-download/?ads_source=landing-page&ads_conversion=y , then Malwarebytes ANTI-MALWARE detects the file as PUP.Optional.Winsock.WnskRSTAlso, When we install the setup file on Win7 machine, Same detection PUP.Optional.Winsock.WnskRST, is detected on ADS.dll. Can you please check & fix this false detection . Please do let us know if you need any other details. Thanks
  8. Any time I want to open a *poznan.pl site there is outbound problem. Probably problem with domain. There are also problems with sites like: www.poznan.pl www.bydgoszcz.pl www.gniezno.pl www.pila.pl www.rzeszow.pl Probably there is more, but all those are Polish cities sites. Can you do something about it? I have seen similar topic here: https://forums.malwarebytes.org/index.php?/topic/175889-malborkpl/
  9. Hello, long time MBAM Free user who has mostly been happy with it until now. I'm running Windows 7 Home Premium. Yesterday I found my first Trojan while running a scan in my own LUA: a Trojan.Agent.ENM in the file 00011334.tmp. This is especially alarming since it was found in the actual Malwarebytes Anti-Malware folder in Program Files-- and even though the Scan History says it was quarantined, it is nowhere in my Quarantine list. I do not remember whether it was ever there. After a few hours searching the forums for this issue, I updated the program and databases to prepare for creating this post. (I successfully used the Administrator account after having had database/program update problems in my LUA for a few months-- I didn't know till now that running MBAM as an Administrator makes a difference.) This time the scan as Administrator only turned up the two PUPs that also came up in the previous scan that turned up the now-missing Trojan. Since the file isn't showing up in the Quarantine list to be restored and examined, I couldn't post about this issue in the False Positive board-- and by now I am too uneasy about the fact that a possible Trojan on my computer has mysteriously vanished. Logs are attached below: MBAM logs mbamscanlog-11-18-2015-1.txt Using version 2.1.8.1057. Trojan and 2 PUPs found. mbamscanlog-11-18-2015-2.txt Using version 2.2.0.1024. Which only found the PUPs. Farbar Recovery Scan Tool Addition.txt FRST.txt If you need additional information or there are formatting issues, please tell me. I'm just as concerned about what this could mean for your program as I am about my own computer. Thank you in advance for your time. FRST.txt Addition.txt mbamscanlog-11-18-2015-1.txt mbamscanlog-11-18-2015-2.txt
  10. www.malbork.pl and any started with this address (*.*.malbork.pl) is being blocked for containing malware which is false. Please remove this block.
  11. Hi I'm busy investigating a possible false positive for the following site: 41.185.13.55 hxxp://www.capewine.co.zw Below are the logs from Malwarebytes: Malwarebytes Anti-Malwarewww. malwarebytes.org Update, 2015-11-16 10:25 AM, SYSTEM, CYBERTECH, Scheduler, IP Database, 2015.11.10.1, 2015.11.13.1, Update, 2015-11-16 10:25 AM, SYSTEM, CYBERTECH, Scheduler, Rootkit Database, 2015.11.13.1, 2015.11.14.1, Update, 2015-11-16 10:25 AM, SYSTEM, CYBERTECH, Scheduler, Remediation Database, 2015.11.10.2, 2015.11.13.1, Update, 2015-11-16 10:25 AM, SYSTEM, CYBERTECH, Scheduler, Domain Database, 2015.11.12.1, 2015.11.16.1, Update, 2015-11-16 10:26 AM, SYSTEM, CYBERTECH, Scheduler, Malware Database, 2015.11.13.4, 2015.11.16.2, Protection, 2015-11-16 10:26 AM, SYSTEM, CYBERTECH, Protection, Refresh, Starting, Protection, 2015-11-16 10:26 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Stopping, Protection, 2015-11-16 10:26 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Stopped, Protection, 2015-11-16 10:47 AM, SYSTEM, CYBERTECH, Protection, Refresh, Success, Protection, 2015-11-16 10:47 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Starting, Protection, 2015-11-16 10:48 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Started, Detection, 2015-11-16 10:58 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.124, pop.capewine.co.zw, 56013, Outbound, C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE, Detection, 2015-11-16 11:14 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.55, capewine.co.zw, 56357, Outbound, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, Detection, 2015-11-16 11:42 AM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.55, ftp.capewine.co.zw, 56834, Outbound, C:\Program Files\FileZilla FTP Client\filezilla.exe, Detection, 2015-11-16 01:01 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.55, capewine.co.zw, 57689, Outbound, C:\Program Files (x86)\Mozilla Firefox\firefox.exe, Update, 2015-11-16 01:03 PM, SYSTEM, CYBERTECH, Manual, IP Database, 2015.11.13.1, 2015.11.16.1, Protection, 2015-11-16 01:03 PM, SYSTEM, CYBERTECH, Protection, Refresh, Starting, Protection, 2015-11-16 01:03 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Stopping, Protection, 2015-11-16 01:03 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Stopped, Protection, 2015-11-16 01:04 PM, SYSTEM, CYBERTECH, Protection, Refresh, Success, Protection, 2015-11-16 01:04 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Starting, Protection, 2015-11-16 01:04 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Started, Detection, 2015-11-16 01:05 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.55, ftp.capewine.co.zw, 57873, Outbound, C:\Program Files (x86)\Mozilla Firefox\firefox.exe, Detection, 2015-11-16 01:09 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.55, capewine.co.zw, 59015, Outbound, C:\Program Files (x86)\Internet Explorer\iexplore.exe, Scan, 2015-11-16 01:45 PM, SYSTEM, CYBERTECH, Manual, Start:2015-11-16 01:05 PM, Duration:40 min 41 sec, Threat Scan, Completed, 0 Malware Detections, 0 Non-Malware Detections, Detection, 2015-11-16 02:17 PM, SYSTEM, CYBERTECH, Protection, Malicious Website Protection, Domain, 41.185.13.55, capewine.co.zw, 64004, Outbound, C:\Program Files (x86)\Internet Explorer\iexplore.exe, (end) The following is what I have investigated together with my ISP: - - The traffic being blocked looks to be outbound by the logs and to ports ranging from 56xxx to 57xxx. These look to be the requests that are being sent out from your machine to the web server and from it will be queried to give the needed response. - Since you are getting the error now on mail, ftp and web, it looks like the domain name itself and not the IP is an issue. In this event we normally check if the domain name (and thus corresponding IP of the host) is blacklisted. Checking on MXToolbox, we got the following result: "Checking capewine.co.zw which resolves to 41.185.13.55 against 102 known blacklists... Listed 0 times with 0 timeouts" Thus meaning the site is not blacklisted anywhere. - Inspecting the website code displayed on the front page did not reveal anything suspicious. Please note that we are not website developers, so better hidden code will evade us. - To be sure the IP was not blocked, we tested a few websites and none of them were blocked by Malwarebytes. The conclusion I can come to after all of this is the following: - Your website may have been compromised at some stage, but there is a good chance (although not 100% positive) it is not any more. - The issue may be (or have been) with the database used by the site. - As I picked up another .co.zw domain owner asking about this while looking on the web, it may be .co.zw related (although I could not find sufficient evidence to support this claim) - A lot of sites are flagged falsely by Malwarebytes as its good security is also tied to its "better safe than sorry" approach They have a forum where one can request a delist for the domain or request more information. Unfortunately this is the only information I could come up with at the moment, as finer detail about exactly why the sites get reported are vague. No conclusive information is also given and I was unable to find a lookup for Malwarebytes blocks. From the log file there is no indication of exactly what the cause is? As you can see from the log, it detected a problem in Outlook, Chrome, FileZilla, Firefox and IE. Because of the Outbound error I ran a scan on my system and Malwarebytes detected nothing. I’m not sure what the number is after the domain in the line entry in the log but am assuming it is either an error code or a port number. Is there anywhere else I can check to see why my site is being blocked by MWB? Kind regards Robin
  12. Hello Please see attached log file. If you need the files not sure if I'm able to post them in public forums, please advise. Thanks.. malwarebytes false positives..txt
  13. Malwarebytes Anti-Malware Home (Free) "version 2.2.0.1024" just found 10 Trojans on my system. However, before running the MB scanner I ran Eset Nod 32 Antivirus 8 (latest version) and it didn't find any treats. I scan my system everyday, sometimes multiple times a day, using both programs and since these treats are marked registry I'd rather not delete them until we can confirm if they're just false positives or actual Trojans. Please help. Copy paste from the scan results: Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 19-10-2015 Scan Time: 15:43 Logfile: Malwarebytes resulsts text.txt Administrator: Yes Version: 2.2.0.1024 Malware Database: v2015.10.19.02 Rootkit Database: v2015.10.16.01 License: Free Malware Protection: Disabled Malicious Website Protection: Disabled Self-protection: Disabled OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: User Scan Type: Custom Scan Result: Completed Objects Scanned: 444254 Time Elapsed: 1 hr, 2 min, 47 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Registry Keys: 8 Trojan.FakeMS, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{C0AA878E-97A5-44df-B7EF-2E732F7B2FEC}, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\IMEPad.HWR.TCIME7, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\IMEPad.HWR.TCIME, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\WOW6432NODE\CLASSES\IMEPad.HWR.TCIME, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\WOW6432NODE\IMEPad.HWR.TCIME, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\WOW6432NODE\CLASSES\IMEPad.HWR.TCIME7, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\WOW6432NODE\IMEPad.HWR.TCIME7, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{C0AA878E-97A5-44DF-B7EF-2E732F7B2FEC}, , [19b521375e2dd5610509762120e1b14f], Registry Values: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Folders: 0 (No malicious items detected) Files: 2 Trojan.FakeMS, C:\Windows\winsxs\amd64_microsoft-windows-i..hinese-imepadapplet_31bf3856ad364e35_6.1.7600.16385_none_571e064f15300c7b\IMTCCAC.dll, , [1ab469ef4c3f8da9e12d940302ff3ec2], Trojan.FakeMS, C:\Windows\winsxs\x86_microsoft-windows-i..hinese-imepadapplet_31bf3856ad364e35_6.1.7600.16385_none_faff6acb5cd29b45\IMTCCAC.dll, , [9b33bc9c8b00dc5a0a0498ff2ad70af6], Physical Sectors: 0 (No malicious items detected) (end)
  14. I posted this on the wrong board, so I shall copy&paste my original post to here. Malwarebytes Anti-Malware Home (Free) "version 2.2.0.1024" just found 10 Trojans on my system. However, before running the MB scanner I ran Eset Nod 32 Antivirus 8 (latest version) and it didn't find any treats. I scan my system everyday, sometimes multiple times a day, using both programs and since these treats are marked registry I'd rather not delete them until we can confirm if they're just false positives or actual Trojans. Please help. Copy paste from the scan results: Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 19-10-2015 Scan Time: 15:43 Logfile: Malwarebytes resulsts text.txt Administrator: Yes Version: 2.2.0.1024 Malware Database: v2015.10.19.02 Rootkit Database: v2015.10.16.01 License: Free Malware Protection: Disabled Malicious Website Protection: Disabled Self-protection: Disabled OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: User Scan Type: Custom Scan Result: Completed Objects Scanned: 444254 Time Elapsed: 1 hr, 2 min, 47 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Registry Keys: 8 Trojan.FakeMS, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{C0AA878E-97A5-44df-B7EF-2E732F7B2FEC}, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\IMEPad.HWR.TCIME7, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\IMEPad.HWR.TCIME, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\WOW6432NODE\CLASSES\IMEPad.HWR.TCIME, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\WOW6432NODE\IMEPad.HWR.TCIME, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\WOW6432NODE\CLASSES\IMEPad.HWR.TCIME7, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\WOW6432NODE\IMEPad.HWR.TCIME7, , [19b521375e2dd5610509762120e1b14f], Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{C0AA878E-97A5-44DF-B7EF-2E732F7B2FEC}, , [19b521375e2dd5610509762120e1b14f], Registry Values: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Folders: 0 (No malicious items detected) Files: 2 Trojan.FakeMS, C:\Windows\winsxs\amd64_microsoft-windows-i..hinese-imepadapplet_31bf3856ad364e35_6.1.7600.16385_none_571e064f15300c7b\IMTCCAC.dll, , [1ab469ef4c3f8da9e12d940302ff3ec2], Trojan.FakeMS, C:\Windows\winsxs\x86_microsoft-windows-i..hinese-imepadapplet_31bf3856ad364e35_6.1.7600.16385_none_faff6acb5cd29b45\IMTCCAC.dll, , [9b33bc9c8b00dc5a0a0498ff2ad70af6], Physical Sectors: 0 (No malicious items detected) (end)
  15. Good Afternoon, I am writing because Malwarebytes is wrongly identifying all websites owned by USTechSupport as 'potentially malicous'. These include the following sites: www.ustechsupport.com, www.shop.ustechsupport.com, www.mycleanpc.com, www.shop.mycleanpc.com, www.speedcounts.com, www.cleanpcnow.com, and more. There is nothing malicious about our websites, so please let me know the reason for the blacklist and the actions we can take to get whitelisted. Thanks for your help!
  16. We are a technology company which have own servers. One of our customer reported us Malwarebytes - Antimalware detects malicious site blocking. Our research team finds out whole 192.45.171.0/24 is blocked. BUT our servers have 46.45.171.194/27 ip block and your software blocks it too. It is impossible that all of our ips have malicios software because lots of them are unused ips. It is false positive and this situation affects our company's reputation badly. Thank You. protection_log.txt
  17. Looking for a general strategy with respect to false positives from different anti-malware products... Our Web site got blocked based on a report from CleanMX, which reported trojanPSW.Bjlog in one of our files (an EXE installer file for one of our software products). MB does not flag the file (nor any file on our entire system) as having any problem, but Avast and VBA32 both do. For now, we've gotten our hosting company to un-block our Web site based on what we believe is a false positive. But what's the best way to proceed on this? We'd like to be sure. Should we submit the file here for analysis? Should we try to work it out with Avast and VBA32 support?
  18. I don't know why this site is blocked. The site is a legit site where you can download a chrome extension to enhance your experience on the TastyCat community on plug.dj. The extension is legit an I use it all the time when on TastyCat or my own community. I believe this is a false positive, please unblock it!
  19. Hi, please unblock 198.185.159.144, foreningsudviklerne.dk and mail.foreningsudviklerne.dk. Thank you,
  20. Hello! I have created the new version of NetWinProtector: http://safe-lion.com/Soft/NetWinProtector.aspx http://safe-lion.com/Storage/Soft/setup.exe The program tested popular antivirus software: Comodo, Kaspersky antivirus. No viruses. Your antivirus informed about the virus (see attach NetWinProtector.exe): Backdoor.Agent.MCR I think it's because the program contains within itself other programs and so your antivirus thinks about the virus. Could you correct mistakes in your anti-virus? Thank you. Anton http://safe-lion.com NetWinProtector.zip
  21. Malwarebytes Anti-Malwarewww.malwarebytes.org Scan Date: 4/2/2015Scan Time: 6:10 PMLogfile: l.txtAdministrator: Yes Version: 2.01.4.1018Malware Database: v2015.04.02.06Rootkit Database: v2015.03.31.01License: TrialMalware Protection: EnabledMalicious Website Protection: EnabledSelf-protection: Disabled OS: Windows 7 Service Pack 1CPU: x64File System: NTFSUser: Josh Scan Type: Threat ScanResult: CompletedObjects Scanned: 385675Time Elapsed: 34 min, 25 sec Memory: EnabledStartup: EnabledFilesystem: EnabledArchives: EnabledRootkits: DisabledHeuristics: EnabledPUP: EnabledPUM: Enabled Processes: 1PUP.Vulnerable.DellSystemDetect, C:\Users\Josh\AppData\Local\Apps\2.0\DY9YP1ZD.4QG\4K1TZ6G2.Y9Y\dell..tion_0f612f649c4a10af_0005.0009_14e1a3fbfbaf942c\DELLSYSTEMDETECT.EXE, 7696, Delete-on-Reboot, [daf4511616745ed82627b300d2318e72] Modules: 1Trojan.Agent.ED, C:\Program Files (x86)\CyberLink\PowerDVD9\CLRCEngine3.dll, Delete-on-Reboot, [8b430b5c107a38fec3be0935b74bba46], Registry Keys: 37Trojan.Agent.ED, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{D49CACC9-D3F0-46E6-AC91-66C5534EA367}, Quarantined, [8b430b5c107a38fec3be0935b74bba46], Trojan.Agent.ED, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D49CACC9-D3F0-46E6-AC91-66C5534EA367}, Quarantined, [8b430b5c107a38fec3be0935b74bba46], Highlighted is the possible false positives. Please let me know if they are or not, I've heard they are before! If they are real viruses, please tell me how I should go about removing them so I can log into my bank account again! Scan was four months ago.
  22. Hi, I'm Gabriel from Stride (stride.digital) . We develop solutions to game developers and publishers. Our software is safe and we don't do anything ilegal or unwanted. Our files are signed with our digital certificate. We are about to release our first version this week, however, we saw that one of our files is being detected as "Trojan.Agent.GNI" by Malwarebytes (v2015.07.15.07). We are open to send you more details on how our solution and software works to help your analysis, if you want to. As requested, im sending attached our .exe and the detection log. Thanks. Best regards, Gabriel malwarebytes-falsepositive.zip
  23. Hello, Although I already see several topics for this IP address, I am including mine as well to emphasize there are multiple sites affected. The site URL is: hxxp://pwncastdailyquest.com at that shared public IP. While I understand and can applaud taking active steps to protect users, I am deeply disturbed that the onus for dealing with this is on those who have done nothing wrong. Right now I have no way of knowing how many users have been turned away, and whether any of them will return after seeing such a dire warning. For sites who rely on traffic to drive ad spend on their pages, this is also financially damaging not only today but potentially into the future as well. At a very minimum for forcing legitimate web site operators to jump through this hoop, I urge you to change the alert messaging to include that the site in question may simply be using a shared IP that also is used by a malicious site. Thank you.
  24. A site I just launched, thecll dot org using the above IP and served entirely using https / SSL, has somehow been flagged by Malwarebytes as of this morning (day after launch) as a site with malware. It is a wordpress-based site and is completely clean according to a scan at sucuri.net (which is also installed as a plugin). Can you take a look and, if truly a false positive, remove it from your list? Let me know how to proceed, please, if there is anything else I need to do on my end. Best, Daniel Potter
  25. I had Symantec/Norton's Small Biz End Protection instaled on my system but quickly decided it was not worth the performance drain and had it removed today (a week later). Now I am getting a Website Blocking pop up that will not go away. The IP Address is 93.174.95.77 The Port: 5631 Type: Inbound Process: C:\Program Files (x86)\Symantec\pcAnywhere\awhost32.exe I don't know if these are residual files left from the uninstall,* false positives or a real problem. *When I tried to go in and delete the files it indicated I needed Admin rights...I hate to go back to this person that I told to remove the Symantec Program to begin with and don't know that they would respond anyway. I tried following the instructions for how to disable the website blocking pop up but it was greek to me plus I figured I should check first. I would greatly appreciate if someone could help me out. Also, please note that I am **not** a geek. I am just a confused business woman trying to get back to doing my work. What that means is, whatever you tell me must be in simplistic terms or it will be of no use to me. This is the first time I have ever been on a forum....I hope I am not getting in over my head. I just want some help. Thanks much, scrkm408
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.