Popular Content

Showing content with the highest reputation since 01/17/18 in all areas

  1. 3 points
    Please note that Emsisoft Anti-Malware for Windows XP hasn't been updated (as in program updates) in over 2 years, and we never intended on continuing long-term database update support for it. In fact, we discontinued our own database updates for it over a year and a half ago, and those still running Emsisoft Anti-Malware on Windows XP have only been receiving BitDefender database updates. We've decided that it is time to stop redistributing those BitDefender updates for Windows XP, as all they are doing is giving those on Windows XP a false sense of security. In addition, it is extremely dangerous to continue using Windows XP. It has (for several years now) had well-known and major security vulnerabilities that Microsoft will never fix. These vulnerabilities make it trivial to infect a Windows XP system, and there is no security software in the world that is capable of preventing it. We can not, in good conscience, continue to provide any support for this version of Windows, as we announced on December 31st, 2015: https://blog.emsisoft.com/2015/12/02/why-we-believe-its-not-ethical-to-sell-antivirus-software-for-windows-xp-any-longer/ We highly recommend that you upgrade to a newer Operating System that is still supported. It doesn't matter if that's a newer version of Windows, or something free like Linux or BSD, as long as you'll be receiving security updates from whoever makes it. New vulnerabilities are discovered almost every day for every major Operating System (Windows, Linux, BSD, MacOS, Android, etc) so it is absolutely critical that you are able to receive security updates from whoever made the Operating System to help keep you and your data safe.
  2. 2 points
    Hello RodPaulo! Over the last three months, we gradually rolled out new infrastructure for our behavior blocker as part of the monthly feature updates. We decided to introduce this new tech gradually as to avoid headaches when switching everything at once. In addition, just the infrastructure on its own had major benefits like fixing several long-standing compatibility issues with products like Kaspersky, Avast, AVG and some other products, that rendered systems unusable as no process could be started on systems running both EAM and their product in real-time. The rollout itself was pretty smooth and we didn't see anything unusual in our telemetry or continuous daily testing either. However, it turned out that there was a rare race condition with certain malware obfuscators that caused some 32-bit processes to not be monitored correctly on Windows 10 64-bit systems. AV-C did report the issue to us as part of their normal report at the end of March and we fixed and released it as an update during the 2018.3 lifecycle very shortly after, but by then we already had racked up a couple of misses in the April test period as well. You may also be interested in the AV-C business test series factsheet they just published, available here: https://www.av-comparatives.org/wp-content/uploads/2018/05/avc_biz_2018_03_factsheet_en.pdf
  3. 2 points
    If you’re a regular reader, you’ve probably noticed that something has changed about our blog… That’s right: everything has changed. When we started the original blog more than a decade ago, little did we know how popular it would become. From a few hundred visits per month back in 2004 to more than 100,000 now, the Emsisoft Security blog has become a major destination for people looking for straight-talking security advice from our team of malware and online security experts. Sadly, while the actual articles have progressed in leaps and bounds since the early days, the blog page itself has received little love and was starting to feel inadequate for the breadth of content we are now offering our readers. We decided to change that and embarked on the biggest redesign of our blog ever. After lots of brainstorming and gathering feedback, we are excited to show you what we’ve been working on and hope that it will make discovering, exploring and sharing our content even better. So, go ahead and check out our redesigned security blog now, or read on about the exciting changes you can look forward to. See what’s new Without further ado, below are some key highlights from the many improvements we have made to your Emsisoft Blog experience: Home page Visitors to Emsisoft’s Blog will now be greeted by a clearly structured home page, with a prominent “Featured Article” chosen by the team to highlight the latest insights into online security. The page itself is divided into clear categories with a selection of the latest articles for each, so it’s easy to browse through each section and dive into those that you find most interesting. From the latest videos, to Protection Guides and Enterprise Security, there’s something for every security-conscious reader. Category pages All posts are now grouped into clear categories and can be accessed from any part of the blog using the new category menu. Each main category page has been designed with a clear purpose and provides an intuitive way to browse the most relevant articles. While the Emsisoft News articles are organized in a timeline, the Protection Guides are grouped by topic to allow you to find the most relevant information in one place. Go ahead, have a look around! Readability First and foremost, a blog should be a pleasure to read. Once you’ve found what you’re looking for, reading should be a pleasant, distraction-free experience. We have reduced the clutter around the actual article text and adjusted the layout and typeface, creating the feeling of reading a high-quality book, whether it’s on a desktop or on your mobile phone on the go. Quick Search Find any article in a matter of seconds with our new search function. With hundreds of online security articles published over the years, our completely new search functionality makes finding that one article about ‘ransomware payment methods’ a breeze. Simply click on the magnifying glass in the header to bring up the search box, start typing and results will appears instantly. Sharing Options To achieve our ultimate goal of a malware-free world, it’s critical to share our insights and security advice with as many people as possible. We’ve now made it easier than ever to share articles or even sections of articles via social media or email: simply click on your favorite social network on our new sharing menu on the left-hand side to share the whole article with your friends and colleagues, or select a particularly insightful sentence or paragraph and share it via the new context menu that appears. We want to hear from you This article only touches the surface of all the changes we’ve made for you in our new Emsisoft Security blog, and we plan to continue developing it over the coming months. As excited as we are about the improvements, ultimately we have made them for you, our readers and customers. Let us know what you think about the new design, the functionality and the reading experience. The post Welcome to the all-new Emsisoft Security Blog appeared first on Emsisoft | Security Blog. View the full article
  4. 2 points
    You could also use a third-party DNS service that has DNS filtering and protects against DNS security issues. A popular example is OpenDNS (although there should be others as well): https://www.opendns.com/home-internet-security/
  5. 2 points
    We had to turn off XP updates because the latest scan engine and its signatures are no longer compatible with it. Instead of pretending that we could protect you from malware (which we effectively can't because XP is full of holes and flaws that aren't gonna be fixed at all) we would rather strongly recommend you to upgrade your computer. If that is for any reason impossible and means that you can't use our software anymore at all, we're happy to issue a refund for the remaining period.
  6. 2 points
    You can see this on several programs. Service and drivers are up, but GUI hasn't caught up. It's not a problem.
  7. 2 points
    It is not the UI doing the protection, it is the service/driver, and they are the first things to be loaded during boot even before your desktop appears.
  8. 2 points
    Guten Tag, Bei Schwachstellen in einer Software ist es eigentlich immer am Besten wenn der Softwarehersteller die Schwachstelle behebt. Er ist der einzige, der Zugriff auf den Quellcode hat und diesen direkt verändern kann. Selbst der Patch von Microsoft ist ein wenig eine Krücke in diesem Sinne, da er nur den Zugriff verhindert und nicht wirklich die Schwachstelle behebt. Intel hat jedoch angekündigt innerhalb einer Woche eine Patch zu veröffentlichen und spätestens bis Ende Januar für alle zur Verfügung zu stellen. Emsisoft kann hier nicht dasselbe leiste wie Microsoft oder Intel, da wir weder den Quellcode von Windows noch für die Intelprozessoren haben. Wir werden jedoch, wie immer, unsere Verhaltensanalyse und den Dateiwächter mit allen Signaturen ausrüsten um Malware die diese Schwachstelle nutzen will zu blockieren. Besser ist es jedoch so schnell wie möglich sämtliche Sicherheitsupdates zu installieren. Ein Antivirenprogramm ist keine Alternative zu Sicherheitupdates. Mit freundlichen Grüßen Kathrin
  9. 1 point
    Well That is just Grate I depended on your program contrary to what people think there is still a whole lot of people that use xp and we have absolutely intentions of upgrading cause the new operating systems Suck...
  10. 1 point
    Hello! Thanks to the development team-in the current version (2018.3.1.8572), all the scans work without any problems!
  11. 1 point
    One of our malware analysts took a look at the copy of CerberTear that was mentioned in the Twitter post you linked to. He said it looks easily decryptable, however the only details he gave me were that the ransomware didn't transmit decryption keys back to whoever made it, so if someone were to pay the ransom they wouldn't get a working decrypter back from the criminals who made/distributed this ransomware (if the criminals responded to the victim at all). Michael Gillespie will also have access to the copy of the ransomware mentioned in the Twitter post, so he should have no trouble figuring out the encryption method.
  12. 1 point
    FYI: I've been told that the beta update to address this issue has not yet been published for EEK, and that for now you will have to either turn off Direct Disk Access or scanning for Alternative Data Streams in order for the scans to complete without issues.
  13. 1 point
    Not the famous MemCompression again
  14. 1 point
    Hi! Thanks for the answer! I have no problems with access to sites, as well as problems with blocking unreliable! I thought it was a general, global recommendation to turn off AppContainer in Chrome. p.s. Thanks, GT500, but of course I know how to create and edit rules.
  15. 1 point
    I'm sure @GT500 wouldn't mind another FRST log, it just might help pin things down.
  16. 1 point
    Yup, you're correct. OpenDNS has limited malicious/bad site blocking (they focus on long-lived stuff like botnets) and phishing protection. Quad9 uses a bunch of vendors' threat intelligence feeds to block malicious and phishing sites. Comodo is vague, but claim they use RBLs. They aren't RFC-compliant with regard to DNS TTLs. No idea whether they redirect on NXDOMAIN (I don't trust Comodo as a company, so I haven't used this svc) Norton uses their own threat intelligence feeds to block phishing, malicious sites, etc, but last I checked, they redirect instead of returning NXDOMAIN, and partner with ask.com for that monetization stuff (yuck).
  17. 1 point
    We understand that this isn't convenient, and it certainly isn't what everyone wants, but once Microsoft discontinued support for Windows XP and Vista this situation became inevitable. If we continue to provide updates for products that ran on Windows XP and Vista, and people continue using it without realizing the danger, then they could suffer serious security breaches or even lose all of their documents/pictures/videos/etc. to a ransomware infection. The only reason we kept the update feeds online as long as we did was to give everyone a reasonable amount of time to upgrade to newer and safer Operating Systems, and we don't want to put our customers at risk and lull them into a false sense of security by keeping those update feeds online any longer. As for an announcement, we did publish announcements over 2 years ago that we were ending support. We hoped that customers would understand that database updates for Operating Systems we were discontinuing support for would also end eventually.
  18. 1 point
    Yep. Good summary of the "problem". I have used lots of different anti-virus apps, and the GUI always needed some time to load. Nothing to worry about.
  19. 1 point
    The database is too large to load into memory and process quickly, so there can be a slight delay in protection showing as on when your computer first starts up. Due to the heavy system resource usage in general during startup, it might also take a minute or so for the Emsisoft Anti-Malware UI to be able to reliably communicate with the Emsisoft Protection Service and read that protection is online.
  20. 1 point
    Those files won't work for you. The decrypters that the criminals send to those who pay only work on one computer, because the ransomware generates different public/private keys for every computer it infects. On top of that, the opening poster said that the decrypter the criminals sent them didn't even work on the computer they were intended for. Those files are basically useless.
  21. 1 point
    OK, I recommend sticking to the troubleshooting steps that whoever you're in contact with on our Support or Sales team has recommended. We don't want to cause any confusion by having two or more of us sending you instructions or asking for information.
  22. 1 point
    Moin! Naja, so neu ist das nicht. Guckst du hier: https://support.emsisoft.com/topic/28985-gravierende-prozessor-sicherheitsl%C3%BCcke-kompatibilit%C3%A4t-von-eam-mit-dem-sicherheitsupdate/
  23. 1 point
    I suggest implementing an option to hide security news section on Overview screen. Another option could be to show only new news, one that have not been read yet. You can probably also check how many users actually use those links to access news and remove this option if it's not popular.
  24. 1 point
    Здравствуйте, Денис! Спасибо за информацию. Это ложное обнаружение. Мы оперативно обновили данные - сейчас браузер должен устанавливаться и запускаться без проблем и алертов. Восстановите файлы программы из карантина, а также зайдите в главное меню Защита >> Правила приложений и удалите правило для Opera, если ранее оно было автоматически создано. Не совсем. Если программа не должна быть прописана в автозапуске, но пытается это сделать, то дальнейшая её активность должна быть под вопросом. (Мы сейчас рассматриваем не конкретный случай с ложным обнаружением, а сам алгоритм действий.) Если программа надёжная и надёжный источник для скачивания, то можно обратиться в Службу поддержки напрямую с запросом (если нужен ответ) или в Лабораторию, нажав кнопку "Ложное обнаружение" во вкладке Карантин (без ответа, но информация будет обработана) или отправив письмо на [email protected] (с уведомлением). Такие вопросы решаются максимум в течение часа.
  25. 1 point
    If you want you can these samples here no problem
  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up