Jump to content

David H. Lipman

Experts
  • Posts

    21,146
  • Joined

  • Days Won

    255

David H. Lipman last won the day on April 25

David H. Lipman had the most liked content!

Reputation

2,858 Excellent

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

155,792 profile views
  1. I have not heard of URLscore before but it seems OK. EDIT: It does not seem worth a subscription.
  2. Anything connected through a compromised WiFi network has the propensity of being targeted and being compromised. However by shear definition a RAT is not a virus. A RAT is the acronym for Remote Access Trojan. Just like a Chevrolet is not a Ford, a virus is not a trojan. All Chevrolets and Fords are automobiles just like all viruses and trojans are malware. Some notes on WiFi security Disable acceptance of ICMP PingsChange the Default Router password using a Strong PasswordUse a Strong WiFi password on WPA2 using AES encryption or Enable WPA3 if it is an option.Disable Remote ManagementCreate separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another.Change the network name (SSID). Do not use your; Name, Postal address or other personal information. Make it unique or whimsical and known to your family/group.Is the Router Firmware up-to-date ? Updating the firmware mitigates exploitable vulnerabilities.Specifically set Firewall rules to BLOCK; TCP and UDP ports 135 ~ 139, 445, 1234, 3389, 5555 and 9034Many Routers support Saving and Restoring settings from a file. It is suggested to make a backup by saving your Router's settings once it has been configured.Document passwords created and store them in a safe but accessible location.
  3. You received a reply so I will close this thread.
  4. Thank you. @Porthos will be by in a little while and will assist you in gathering logs to help determine why you can't successfully upgrade to v5.x
  5. Please try; Malwarebytes v5.x Offline It will download the full offline installer and update the product to the latest version.
  6. I submitted the Web Site and the executable for Malwarebytes' action. Thank you.
  7. Please try disabling MBG's "Block suspicious top Level domains..." setting.
  8. It may have been moved to protect any data that was captured in the logs, for privacy sake? @Porthos would have to answer. I originally moved this from from; File Detections to Website Blocking
  9. Yes, it could be a Malicious Advertisement (aka; Malvertisement) A ScreenShot of the message would help ID this object.
  10. Thank you @ZeroGee I totally understand your concerns. You have described a scary scenario indeed. The question is was that a one-off case or was there a serial marauder on the loose? Unfortunately if one stands out as easy prey, and does not have Situational Awareness, they can become victimized. Both in the physical world and in Cyber space. Obtaining an Air Tag or similar device, external to a Smart Phone, may be work in a both an innocuous and inconspicuous fashion and give you the piece of mind you seek.
  11. I am sorry you feel that way @keith_thfc , but it is not and can not be considered spam. Not even nagware. It is merely an overaggressive conglomeration of products into one unified user interface. I too do not use VPN and thus I find the in your face VPN section obtrusive. But to call is spam, is misrepresenting and overstating the issue.
  12. Since it was most likely a Phish, merely "clicking" on the URL will not infect your PC. It is a Social Engineering ploy to get you provide credentials like to email or at a Bank. Thus, unless you reached the content and provided your credentials, I wouldn't worry about this. Example: Microsoft Phish
  13. What looks like it would have been a Phish, has been taken down. When posting malicious, suspicious and/or nefarious URLs, please place them in Code Tags such that they are not posted as "clickable" Live Links.
  14. Unless one of the couple suffers from some sort of dementia, I can't see a salient reason to to know exactly where one spouse is all the time. If you both carry Smart Phones, the data is there via GPS and Cellular Triangulation data, just in case. Do you really need Real-Time knowledge ? Such software that is keeps track is a kind of Stalkerware and Malwarebytes has taken a strong stance against Stalkerware. Please reference; How to protect against stalkerware, a murky but dangerous mobile threat BTW: Did you check your your email addresses at HIBP ?
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.