Jump to content

David H. Lipman

Experts
  • Posts

    21,068
  • Joined

  • Days Won

    251

David H. Lipman last won the day on April 17

David H. Lipman had the most liked content!

Reputation

2,818 Excellent

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

153,781 profile views
  1. I guess Normal for those 10+ Degrees difference in Latitude. One must adapt the Attitude to the Latitude. Like this....
  2. @OhNoBillS Please reference: 10 Warning Signs You’ve Received a Fake Invoice EmailPhishers send fake invoicesWarning: This scam starts with a fake invoice. It could end with crooks stealing your dataInvoice Fraud: How to Identify Fake Invoices & More
  3. "Your Protection Dashboard" message in v2.6.25 shows up every time the Three Vertical Dots is selected after re-loading the Browser (Firefox and Edge).
  4. Do you have the Web site and URL of the ZIP you downloaded and maybe a password if it was password protected? If you still have that URL, it can be submitted in; Newest IP or URL Threats after reading; READ ME: Purpose of this forum so the URL(s) can be submitted in a safe fashion and the trojan analyzed for detection.
  5. Alert Number: I-041224-PSA April 12, 2024 Smishing Scam Regarding Debt for Road Toll Services The texts claim the recipient owes money for unpaid tolls and contain almost identical language. The "outstanding toll amount" is similar among the complaints reported to the IC3. However, the link provided within the text is created to impersonate the state's toll service name, and phone numbers appear to change between states. If you receive one of these texts, the following is suggested: File a complaint with the IC3, www.ic3.gov, be sure to include: The phone number from where the text originated. The website listed within the text Check your account using the toll service's legitimate website. Contact the toll service's customer service phone number. Delete any smishing texts received. If you clicked any link or provided your information, take efforts to secure your personal information and financial accounts. Dispute any unfamiliar charges. 1Definition for Smishing: A social engineering attack using fake text messages to trick people into downloading malware, sharing sensitive information, or sending money to cybercriminals. "Smishing" combines "SMS"—or "short message service," and "phishing." "Phishing" generally pertains to attacks on the internet, email, or websites. ↩
  6. FTC Sends Refunds to Former AT&T Wireless Customers Who Were Subject to Data Throttling
  7. Mental health company Cerebral failed to protect sensitive personal data, must pay $7 million Posted: April 18, 2024 by Pieter Arntz Proposed FTC Order will Prohibit Telehealth Firm Cerebral from Using or Disclosing Sensitive Data for Advertising Purposes, and Require it to Pay $7 Million
  8. Please define what you "think" is a "virus". I request that because all viruses are malware but not all malware are viruses. Just like all Ford cars are automobiles but not all automobiles are made by Ford. There is a taxonomy to malware classification. A true virus will find it hard to evade detection because by definition a virus self replicates that is it is able to spread from file to file or PC to PC autonomously. That action alone means it can and will be detected. Additionally, viruses are relegated to a very small fraction of the malware arena. Those that exist are old and well detected. It is very rare for a new virus to emerge. Trojans are another sub-type of malware and they can hide and evade detection by being stealthy and and not making themselves known by such actions as beaconing (aka; Phoning Home) or reaching out to a Command and Control (C2) puppeteer. Malware that does this is known as a Zero Day. The subject matter is complicated but Malwarebytes has always targeted Zero Day malware. References: https://www.malwarebytes.com/zero-day https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-zero-day-attack/what-is-zero-day-malware/ https://en.wikipedia.org/wiki/Zero-day_vulnerability
  9. Please update your Browser Guard. I see no block. Support --> Check for database updates If it is still blocked Clear the Browser guard storage Support --> Clear Browser Guard storage
  10. Please provide the website where said License was obtained.
  11. Reference: TA558 group attacking legacy systems in LATAM ** Please read the full article on the Advanced Persistent Threat (APT) TA558 adversary
  12. New SteganoAmor attacks use steganography to target 320 orgs globally
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.