Jump to content

David H. Lipman

Experts
  • Posts

    21,036
  • Joined

  • Days Won

    250

David H. Lipman last won the day on April 15

David H. Lipman had the most liked content!

Reputation

2,788 Excellent

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

153,481 profile views
  1. Please repost the attachment. It was lost in an accidental double-post.
  2. I'm very happy you now have an updated version of Malwarebytes that is fully supported. Best 'O Luck !
  3. That's a function of Malwarebytes' Staff. Please be patient for a Staff member to pop this topic off the queue.
  4. Not every problem is Malware related. Please try another keyboard - (Occam's razor).
  5. Top 10 Digital Commerce Account Risks & How to Mitigate Them
  6. If you still have that URL, it can be submitted in; Newest IP or URL Threats after reading; READ ME: Purpose of this forum so the URL(s) can be submitted in a safe fashion and the trojan analyzed for detection.
  7. @JLStew Please reference: 10 Warning Signs You’ve Received a Fake Invoice EmailPhishers send fake invoicesWarning: This scam starts with a fake invoice. It could end with crooks stealing your dataInvoice Fraud: How to Identify Fake Invoices & More
  8. I have it on Win7 and Win11 Example: Win7 - v4.8.3761.0 - C:\Windows\Microsoft.NET\Framework\v4.0.30319 Win11- Multiple versions, C:\windows\Microsoft.NET\Framework
  9. If there are no lights on the PC that are "On" and you have shut down the PC, you can unplug it. Store it in a place where there are no excessive temperature swings and where the temperature and humidity are kept relatively the same over the time it takes to replace the spindle hard disk with a Solid State disk.
  10. Roku hit with second major breach of 2024, this time affecting 576,000 users
  11. @sophie707 For an anti malware company to know about malware means they will detect it. Think about it! Also, don't get caught up on individual "well publicized" malware. One must think about computer security and malware protection in an overarching holistic view. If you have situational awareness, understand the threat landscape, take precaution, install anti malware, and take other active measures the you don't have to think about individual "well publicized" malware. You are protecting yourself from ALL malware. Remember that the weakest link in the malware protection chain is the Human. All the software in the world won't protect oneself if they don't practice Safe Hex or easily fall prey to Social Engineering ploys and tactics.
  12. @Vladimireth This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. This is how the passwords are most often obtained and used in this ploy. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam Bitcoin - Bitcoin Abuse Database BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes' Blog - Warning: Victims' faces placed on explicit images in sextortion scam Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Blackmail Scam still current
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.