
Elise
Emsisoft Employee-
Content Count
8381 -
Joined
-
Last visited
-
Days Won
125
-
Hello, The posts you found are more than 5 years old. In terms of security software that means the information there is severely outdated. In the past years considerable changes have been made to our products and currently Emsisoft Anti-Malware protects against fileless malware. Fileless malware detection has nothing to do with the reputation settings you asked about; our behavior blocker routines were adapted to adequately detect and block fileless malware a few years ago.
-
Hello, No, Emsisoft Anti-Malware should be enough. It will detect keylogging attempts through it's behavior blocker. To be safe, especially against phishing attempts online it is recommended to also install the free Emsisoft Browser Security extension.
-
Emsisoft cant detect netwalker encoder
Elise replied to Magic_The's topic in Emsisoft Anti-Malware Home
This is the wrong place to report such issues. You already reported it in the submission topic you made which is the correct forum for most detection issues. I replied to you there a bit earlier today. To avoid confusion I will lock this topic. -
Hello, The short answer here is "no" (if no information was shared). It will depend on what they were playing on xBox, but it is possible for someone in a multiplayer game to see the IP address of other players. A simple lookup of that address will show your location. That is not an exact address, but just a general indicator (city/state). However that information does not give anyone the possibility to manipulate your internet access. Access is managed by your ISP, so if your internet was not working it probably was a coincidence. You could contact your ISP to see if they have any
-
No idea, probably a slow update connection. You could try to check if the browser is up to date via Help > About Chrome in the menu.
-
Does this happen after a restart (not standby) before you start the browser at all?
-
According to their manual you can uninstall it from Apps & Features: http://h10032.www1.hp.com/ctg/Manual/c06379792
-
This has not changed. The article also states clearly at the start:
-
RDP attacks are not really new, please see also this article from 2017: https://blog.emsisoft.com/en/28622/rdp-brute-force-attack/ As for software, I would always try out a program to see if it suits your needs, in case of brute force protection its usually the user/administrator, and not the software that makes the difference.
-
The short answer to that is: no. It can be broken by malware (as in: won't run) or blocked (a replacement is attempted but after a reboot the original bad file is back), but that is about it. That being said, malware doesn't need to manipulate it, if it can just circumvent it. If a system is infected and a replaced system file has sufficient permissions to fool Windows into thinking it is legitimate (this typically is rootkit-level), you can run SFC all you want and Windows will report everything is fine, while in fact you can have one or more infected system files. So running SFC is not
-
I will test this a bit next week, in the mean time you may want to check what the alert was for, because I highly doubt it was for 7zip and rather for the malware file(s).
-
It depends completely on how this script is executed; in a "normal" malware scenario it will be dropped or downloaded, which will lead it to be blocked.