Jump to content

Search the Community

Showing results for tags 'tracking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Privacy
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Nebula
    • Malwarebytes Nebula Modules
    • Malwarebytes Endpoint Security
    • Other Malwarebytes Business Products
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 8 results

  1. In July 2018, we introduced the Malwarebytes Browser Extension, a beta plugin for Firefox and Chrome aimed at delivering a safer, faster, and more private browsing experience. Our extension blocked tech support scams, hijackers, pop-up ads, trackers, and more to keep users secure and free from online harassment. And thanks to our loyal Malwarebytes community, we’ve been able to test and improve on this beta for more than a year. We’re pleased to release the full version, named Malwarebytes Browser Guard, which is now available in the Chrome and Firefox web stores. In this post, we’ll cover the features included in Browser Guard, its main functionality, how to whitelist preferred websites, and the difference between our extension and flagship PC and Mac software, Malwarebytes for Windows and Malwarebytes for Mac. What does Browser Guard do? Browser Guard, a free extension, blocks unwanted ads and trackers that intrude upon users’ privacy, while also protecting against clickbait and scams. The extension prevents browser hijackers, lockers, and annoying and sometimes malicious pop-ups, all known scare tactics to trap consumers in tech support scams, exposing them to unwanted content and forcing them into purchasing unnecessary, expensive technical support. Recent independent tests from AV Lab recently recognized Malwarebytes Browser Guard for having the best protection among competitive browser security offerings, blocking 98.07 percent of malware. What’s new in Browser Guard? After continuous testing of functionality with thousands of users for more than a year, the most prominent change we made from beta to final release is to the graphical user interface (GUI). While people were happy with the way the beta worked, many wished for more granular control in the settings, as well as more elaborate statistics on blocked ads, malware, scams and other items. I have Malwarebytes Premium. Do I still need Browser Guard? Browser Guard does have extra protection features, as well as benefits for privacy, including ad and tracker blocking. And of course, Malwarebytes Premium versions have anti-exploit technology, real-time malware protection, anti-ransomware, and stalkerware protections that Browser Guard does not. Where the web blocking module of Malwarebytes Premium and Browser Guard share a database of blocked IPs and domain, there is an overlap. Looking at Malwarebytes Premium, it blocks the IPs and domains for all running applications, where Browser Guard does this only for the browser the extension is installed on. On the other hand, Browser Guard blocks more than just domains and IP addresses. Not only does it recognize malicious websites based on their behavior that are not in the database (yet), it also blocks advertisements and trackers. These are not always malicious, but they usually do not improve user experience and blocking them can speed up your browsing up to four times. This gif shows a site before and after enabling Browser Guard and how much it blocked False positives Behavioral detection is prone to false positives. Of course, we do our utmost to avoid them as much as we can, but they can’t be totally avoided. Luckily, the worst that can happen is that you will be initially denied access to a website that turns out to be harmless. But that doesn’t mean you’re blocked for good. When you are sure the website is harmless, you can change the settings in Browser Guard to allow that specific site. That way, you can grant yourself access to the site without having to lower your global settings. Where some programs would require you to disable protection or lose your protection completely, our extension allows you to change site-specific settings without making your browser vulnerable on other sites. Whitelisting items for a website In Browser Guard, you can allow specific items by excluding them from certain types of protection and adding them to the “Allow list.” Here’s how to do it: In the Browser Guard GUI, click the hamburger menu icon (the three vertical dots next to the gear icon). In the dropdown menu, click Allow list. Here you can specify the site(s) that the exception will apply to in the form of a URL or an IP address. And you can choose the types of protection that you wish to disable for the site(s). These types are Ads/Trackers, Malware, Scams, and PUPs. Then click Done to confirm the exclusion. Browser Guard blocks items on Malwarebytes’ own website. How come? We do not discriminate between trackers and websites. Our own Malwarebytes website uses trackers to monitor how readers engage so that we can offer better content, design, and functionality. We do not gather any personal information. But they are trackers, nonetheless, and if you don’t want them, we feel you should have the power to disable them everywhere, even on our own website. No discrimination also means we do not take money from advertisers to allow their advertisements, like some other ad-blockers have been known to do. Permissions Malwarebytes Browser Guard needs to be able to read and change data on the websites you visit so it can remove advertisements and other unwanted elements. It also needs to be able to manage your downloads to protect you from downloading dangerous files on your system. The Chrome installer prompt also mentions that our extension can “Communicate with cooperating websites.” What does that mean? Certain sites use ad-serving techniques that are intrusive in nature, so when we block ads on those sites, it breaks the user experience. The permission “Communicate with cooperating websites” allows Browser Guard to work with sites to interactively block ads without affecting any content. This provides a better user experience than could be achieved without communication. Browser Guard use case Magecart is a group that specializes in stealing credit card information using a technique that is called skimming. They basically intercept traffic from payment sites to exfiltrate credit card information. Below you can see how Browser Guard can protect your information on a site that has been infiltrated by Magecart. Support If you need help or guidance for the install or settings of Malwarebytes Browser Guard, we are happy to refer you to our online support guide. Happy surfing, everyone!
  2. In July 2018, we introduced the Malwarebytes Browser Extension, a beta plugin for Firefox and Chrome aimed at delivering a safer, faster, and more private browsing experience. Our extension blocked tech support scams, hijackers, pop-up ads, trackers, and more to keep users secure and free from online harassment. And thanks to our loyal Malwarebytes community, we’ve been able to test and improve on this beta for more than a year. We’re pleased to release the full version, named Malwarebytes Browser Guard, which is now available in the Chrome and Firefox web stores. In this post, we’ll cover the features included in Browser Guard, its main functionality, how to whitelist preferred websites, and the difference between our extension and flagship PC and Mac software, Malwarebytes for Windows and Malwarebytes for Mac. What does Browser Guard do? Browser Guard, a free extension, blocks unwanted ads and trackers that intrude upon users’ privacy, while also protecting against clickbait and scams. The extension prevents browser hijackers, lockers, and annoying and sometimes malicious pop-ups, all known scare tactics to trap consumers in tech support scams, exposing them to unwanted content and forcing them into purchasing unnecessary, expensive technical support. Recent independent tests from AV Lab recently recognized Malwarebytes Browser Guard for having the best protection among competitive browser security offerings, blocking 98.07 percent of malware. What’s new in Browser Guard? After continuous testing of functionality with thousands of users for more than a year, the most prominent change we made from beta to final release is to the graphical user interface (GUI). While people were happy with the way the beta worked, many wished for more granular control in the settings, as well as more elaborate statistics on blocked ads, malware, scams and other items. I have Malwarebytes Premium. Do I still need Browser Guard? Browser Guard does have extra protection features, as well as benefits for privacy, including ad and tracker blocking. And of course, Malwarebytes Premium versions have anti-exploit technology, real-time malware protection, anti-ransomware, and stalkerware protections that Browser Guard does not. Where the web blocking module of Malwarebytes Premium and Browser Guard share a database of blocked IPs and domain, there is an overlap. Looking at Malwarebytes Premium, it blocks the IPs and domains for all running applications, where Browser Guard does this only for the browser the extension is installed on. On the other hand, Browser Guard blocks more than just domains and IP addresses. Not only does it recognize malicious websites based on their behavior that are not in the database (yet), it also blocks advertisements and trackers. These are not always malicious, but they usually do not improve user experience and blocking them can speed up your browsing up to four times. This gif shows a site before and after enabling Browser Guard and how much it blocked False positives Behavioral detection is prone to false positives. Of course, we do our utmost to avoid them as much as we can, but they can’t be totally avoided. Luckily, the worst that can happen is that you will be initially denied access to a website that turns out to be harmless. But that doesn’t mean you’re blocked for good. When you are sure the website is harmless, you can change the settings in Browser Guard to allow that specific site. That way, you can grant yourself access to the site without having to lower your global settings. Where some programs would require you to disable protection or lose your protection completely, our extension allows you to change site-specific settings without making your browser vulnerable on other sites. Whitelisting items for a website In Browser Guard, you can allow specific items by excluding them from certain types of protection and adding them to the “Allow list.” Here’s how to do it: In the Browser Guard GUI, click the hamburger menu icon (the three vertical dots next to the gear icon). In the dropdown menu, click Allow list. Here you can specify the site(s) that the exception will apply to in the form of a URL or an IP address. And you can choose the types of protection that you wish to disable for the site(s). These types are Ads/Trackers, Malware, Scams, and PUPs. Then click Done to confirm the exclusion. Browser Guard blocks items on Malwarebytes’ own website. How come? We do not discriminate between trackers and websites. Our own Malwarebytes website uses trackers to monitor how readers engage so that we can offer better content, design, and functionality. We do not gather any personal information. But they are trackers, nonetheless, and if you don’t want them, we feel you should have the power to disable them everywhere, even on our own website. No discrimination also means we do not take money from advertisers to allow their advertisements, like some other ad-blockers have been known to do. Permissions Malwarebytes Browser Guard needs to be able to read and change data on the websites you visit so it can remove advertisements and other unwanted elements. It also needs to be able to manage your downloads to protect you from downloading dangerous files on your system. The Chrome installer prompt also mentions that our extension can “Communicate with cooperating websites.” What does that mean? Certain sites use ad-serving techniques that are intrusive in nature, so when we block ads on those sites, it breaks the user experience. The permission “Communicate with cooperating websites” allows Browser Guard to work with sites to interactively block ads without affecting any content. This provides a better user experience than could be achieved without communication. Browser Guard use case Magecart is a group that specializes in stealing credit card information using a technique that is called skimming. They basically intercept traffic from payment sites to exfiltrate credit card information. Below you can see how Browser Guard can protect your information on a site that has been infiltrated by Magecart. Support If you need help or guidance for the install or settings of Malwarebytes Browser Guard, we are happy to refer you to our Malwarebytes Browser Guard guide. Happy surfing, everyone!
  3. Hey guys, I noticed a strange folder in my temp folder called BCLTMP containing subfolders with the names of my browsers. Inside of these folders are files that contain my saved favourites, visited urls and searches. After deletion of the BCLTMP folder it appears again after a while, sometimes after a day, a week or a month. After scanning my PC with all the tools I have (which didn't find much and didn't stop the folder appearing) I decided it might be normal.. Then I bought a new laptop which showed the same behavior within the same week I bought it. Nothing was installed on the laptop, no usb used, it had only been connected to my router. I have connected other laptops to my network in the past which showed the same behavior. Could this BCLTMP folder which seems to track my browser history be spyware/malware? No one else seems to have the folder. I am using Windows 10 pro on both devices. I tried scanning with malwarebytes, roguekiller, adwcleaner, eset sysrescue, exterminate it, spydllremover (which reports hidden rootkit, with processID, hidden), superantispyware. tdsskiller won't boot (redownloaded, same result) and comodo CCE crashes the computer and then refuses to boot. Note that the laptop with the BCLTMP folder is a clean windows 10 install with no installed software. My router reports synflood attacks from within and outside of my network, and it's firmware has been reinstalled by the isp just to be sure. Not much else to see there. How can I figure out what is happening to my devices, and what this folder is for?
  4. It would be really good if the updating of the consul, and therefore subsequent updating of the Clients was much easier. I have to frequently check the download link to see if I have downloaded the patch, but recently there was a situation where the download file name didn't change albeit that there was new content. It is hard enough to keep Virus protection up to date, but when you don't know there are updates it is more difficult and potentially more risky for the users.
  5. Hello all, I have a very weird case to submit. I went to remove some adwares poping up on a pc for a cousin. It is a notebook Toshiba (I don't have the model right now on my hand), but it is running under vista 32bit home connected by wifi. On his network there are 2 others computers: 1 on ethernet,another on wifi and 2phones. And none of them seemed infected. (no threat found by any of the software I used bellow.) and not ads. To removes the ads, I used all these different tools: -malwarebytes, full scan (including rootkit), hundreds of infections -adwcleaner, many infections too -Junkware removing tool, like 20 infections -eset nod online scanner. 12 infections -TDSSKiller (using rkill before all of them) All found some different elements including some usual stuff like optimizer pro and other regular infections. (TDSSKiller found none) I cleaned all of them, rebooted the computer everytime. -After this I used ccleaner to clean perform a clean of the system and registry. -Then I reseted the web browsers. -I rebooted many times and the computer was working just fine after that. But it only lasted 2 weeks. During this time nothing has been installed on the computer. Then he calls me back to say the ads are back. This time to clean his computer we used teamviewer that I installed on a standart live usb of GNU/Linux mint 17.1 cinnamon 32 bit. I spent almost the night running all these utilities I used two weeks ago but it was keeping coming back every reboot, whether it was firefox, google chrome or internet explore + at the end I used Rogue Killer. Rogue killer showed me in the antispyware tab that there were 2 oranges IRP Hook. It also opens a page explaining how the agents works. The software does not have the function to remove it. Only informations I got typing IRP hook on google was showing almost only fake blogs, fakes articles, fake websites, and many leading to a software called SPYHUNTER. All theses pages looks almost normal appart all the ads for fake anti malwares and spyware tools. I say to my cousin i will later format his computer to be sure. But BIG PROBLEM here. I shutdown the computer with the live usb i used for teamviewer (which i have to install every boot). Also because I am a bit paranoiac and also because there is my personnal computer that was also on the same network the whole night. I decide to reboot my internet box and acquire new ip, using the web interface. ==>This point maybe be important for further interpretation of the malware/virus whatever. I am not 100% sure that it rebooted my ip. But I disconneted from my ISP, and reconnected via web interface. Now is the big point. The day after this teamviewer session I start the pc I use for testing live usb of linux distro and also for teamviewer (the one i used the night before). I precise that on this computer there is 1 harddrive with dual boot windows xp/ubuntu studio and that is is never connected on internet appart from live usb. (I only plug ethernet cabble for this purpose) I started it on the same usb I used the night before (GNU/Linux Mint 17.1 Cinnamon 32bit), and because I am curious I think I could maybe give a go for other scanning on his pc. So I type on firefox on the live usb "www.google.fr" to get to teamviewer, but it does not open google!! what pops up are the tabs of same type of ads that were installed on the computer of my cousin!!!! I could not believe it from my eyes. I got ads poping when I typed www.google.fr. And the whole night I spent on teamviewer for my cousin's computer it was on this liveusb on which i was surfing all the time to try to find information about this type of viruse/malware that where found in the scan result with the software installed on HIS COMPUTER. 0 ad have poped during that time on firefox from my usb stick. It is only the day after all has been shot down, computer (which means removing usb stick for shutdown, and repluging it after shutdown) and theorically ip reset through web interface of the router. So how did i got contamined from teamviewer, because I check the md5 of the usb key which seems "perfectly" fine. Why only the computer I used for teamviewer received ads, no even the other computers of my domestic network neither the ones of my cousin's network. Is it using MAC adress? or router cache for each computer to trace back? Or is it abble to hide on hidden parts of UNMOUNTED hard drive . I do not mount the drives on my liveusb linux usb, at least it is my understanding but it can be wrong: it does not automount them unless you try to open it on a file explorer of mint cinamon, (maybe i'm wrong on this point.) I'm not a tech expert at all. But it would mean the software through teamviewer can cross from windows to linux and changes some DNS stuff or either installed itslef on any hard drive? I have no clue on how this happened. What i can say, after that is that i have turned of my router (remove electric plug), plug it back, then turned on my computer and the add did not appear this time when I typed www.google.fr on my live mint. But will it appear again later? Will it trace back? I can really not be sure about it. Other detail: -When the ads poped on my usb stick the day after the teamviewer session were only displayed once at the first time I opened firefox and type google.fr. I am not even sure if I pressed enter before the ads poped. After I closed the two adds it was "working alright" when I was typing google. But I turned of the computer straight after the few tries so as the router. I scared me a lot. -My motherboard (Asus P5K) neither his motherboard have EFI bios. My observations of the adware/malware/virus: -It display ads often when typing an adresse. Often it is adverstising for software for pc fix. (unfortunatly it was late and I don't remember the name of software and different ads domain appart I think www.first.com or something like that. -When opening a webpage of trust like bleeping computer, it will put ads everywhere, which for instance fake video that cannot load due "to a plugin missing, click here to install" sort of trap. -Other windows or tabs will opens with advertisings. For instance if the word "download" without a link to it appears on a sentence, it will put hyperlink to other crapware or advertisings on this word like any words that could logically lead to a hyperlink which is very tricky. - Toggle many downloads buttons which looks safe. -Doing research on google display lot of false results and normal results can only be found in the middle of all these fakes. -Typing the name of the domain of the one of these ads +virus or +threat +malware or +adware etc.. on google only led me to fake virus information webpages/blog/articles or nothing related by recognized antivirus/malwarebytes or other official well known software. Many of them recommanding spyhunter or giving manual steps which seems suspicious. (like removing UAC..) - I only found one topic on a italian forum relating to this problem but with no solution. -The only good tools I know did not get completly rid of it. (only for two weeks) -The computer of my cousin has all the .txt from some of the scan I performed on this computer. - It crossed through teamviewer on my computer while I was on a usb stick of Mint Cinnamon 17.1 - It looks very powerfull, and very well hidden. - I never heard anywhere on this threat, but maybe it is already know. I am willing to find an answer, and also a solution to this very powerfull virus/adware/malware: -Therefore I prefer to mention that I will also post this message to Kaspersky and Nod32 forums see if they can help as well. -The computer of my cousin is now shutdown, if you are interested in finding more, it has not be formated yet (not even sure this will get rid of it if it is related to network card), and if someone of you guys want to check to teamviewer , my cousin completly agrees to provide access to his computer if you guys want to check about this new threat on which I never heard, but seems to me as exremly powerfull. - I also performed a frst.exe scan and the reports are on his computer as well. Honestly I am to scared and I don't want anymore to connect myself to his computer. I don't have the competence neither the knowledge on these matters. Thanks you for reading this, and thank you in advance for any advices, but also for your free software which in so many cases solve problems for uncountable beings on this planet.
  6. Just found out MB is blocking a legitimate site of mail tracking of the Hong Kong Post Office IP address 202.64.61.206. The address is http://app3.hongkongpost.hk/CGI/mt/enquiry.jsp Can this be taken off your blocked database. Thanks
  7. Hi, Do anyone know this excellent site ? Have a look... http://www.flightradar24.com/ How does it work ? http://www.flightradar24.com/how-it-works I love aircraft spotting, tracking. Additionally you can listen to some communications for some airports (not all thought) http://www.liveatc.net/ Here is for Istanbul Ataturk airport (big traffic out there) http://www.liveatc.net/search/?icao=IST Hope you'll enjoy
  8. Having searched this Forum for the term, Google +privacy, and the Search function having reported No results, I will venture to raise a question. Whereas, Google's new and threatening "privacy" policy (or, rather, "anti-privacy" policy) is in effect now! And, whereas, the malwarebytes.org's home webpage and others on malwarebytes.org website have been calling scripts ( and possibly other content) from Google-analytics.com and Googleusercontent.com, Now, therefore, let malwarebytes.org declare whether the org will take steps to protect the org's users and customers from the probability that the GOOG will aggregate and track and sell user-identifiable data perhaps with a plausible claim to inadvertency, and the possibility/probability that said data product of the GOOG might be acquired by a party that could adversely influence an employment or a credit situation or a service opportunity ot the detriment of any of malwarebytes.org's Customers or users. It is hoped that the ORG will act in the best interests of its users and Customers. Best wishes, from your friend, RxDdude
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.