Jump to content


Popular Content

Showing content with the highest reputation since 01/09/21 in all areas

  1. Hello, The posts you found are more than 5 years old. In terms of security software that means the information there is severely outdated. In the past years considerable changes have been made to our products and currently Emsisoft Anti-Malware protects against fileless malware. Fileless malware detection has nothing to do with the reputation settings you asked about; our behavior blocker routines were adapted to adequately detect and block fileless malware a few years ago.
    2 points
  2. https://blog.emsisoft.com/en/32034/how-to-remove-fileless-malware/
    1 point
  3. I doubt anyone has looked into it for at least a couple of years at this point. We know the kind of encryption it uses, and we know it isn't normally breakable.
    1 point
  4. For your own safety and security, never ask for files from people you don't know. In this case, you would have merely reinfected your computers, and run the risk of making your problems even worse. Stick with solutions from the experts, and if someone promises a "solution" then give us a chance to verify it first. Our goal is to try to thwart these criminals and keep everyone safe, and if there's anything we believe has a reasonable chance of helping you then we'll let you know.
    1 point
  5. I'm a newbie on this forum (in fact, I joined today) and besides 3rd. party anti-malware with real time protection, I'm curious what members are using for additional protection. I'll list my current protection, please feel free to comment if you feel I should add something or feel that something is not necessary. Windows Defender (Windows 10 version) MVPS Host File NordVPN SpywareBlaster WinPatrol Free CyberSight RansomStopper Malwarebytes Anti-Malware Free (for periodic manual scans) SuperAntiSpyware Free (for periodic manual scans) Browser
    1 point
  6. That won't help. Newer variants use RSA encryption, which isn't vulnerable to most forms of attacks. It would take even a supercomputer thousands of years to brute force the private key for decryption.
    0 points
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
  • Create New...