Emsisoft Employee
  • Content Count

  • Joined

  • Last visited

  • Days Won


Elise last won the day on December 11

Elise had the most liked content!

Community Reputation

252 Excellent


About Elise

Profile Information

  • Gender
  • Location

Recent Profile Visitors

31288 profile views
  1. Hello, Participating in independent lab tests is very important to us to ensure that we’re delivering only the best protection that’s on par (or even exceeds) with industry standards. We currently participate in Virus Bulletin (VB100) and AV-Lab tests. Emsisoft Anti-Malware was recently certified by the latest VB100 test (see here) and received excellent reviews from AV-Lab’s recent online banking protection test (see here). We’re currently evaluating our participation in the AV-Comparatives tests and are also actively looking for testing opportunities with other reputable independent testing organizations. Additionally, when it comes to choosing security software I'd recommend always to use a trial as well (which most products offer for a short period, typically 30 days) to see if the product suits you.
  2. Hello, Thank you for contacting us. However Emsisoft has nothing to do with ESET's products. You will have to contact ESET in order to see what's going on.
  3. Hello, This is legitimate. You can read more about it here: https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
  4. PUP behavior typically does not include password stealing (that would move it straight into the malware category). These are considered PUPs because the way they are distributed, however if you would like to install it because you think it's useful there's nothing wrong with it. It is possible that Tampermonkey is bundled in a third-party download wrapper that also may distribute adware/malware, however if you download it from the official website it should be fine.
  5. I've never used it, so I can't really comment on the functionality, only that it is safe and not malicious.
  6. Hello, This application is safe. If you can go to Logs and double click the entry where the file was flagged, you can copy the alert message and paste it here and I can whitelist the executable for you.
  7. Hello, None of these keys are inherently dangerous, but it depends on what installed them. This can happen if you installed a program of Asian origin for example. I'd check the content of each key to be sure (you can export them by right clicking the key name and then selecting Export and post or attach the content here).
  8. It depends of course on personal preferences, but for your computer's security Emsisoft Anti-Malware in combination with the Windows inbuild firewall really is enough.
  9. Yes, when I checked it, it was taken down already (at least good that the hoster acted so quickly :)).
  10. Thank you, I'll check it and detection will be added if necessary.
  11. Please stop accusing people of saying things they did not. Everyone is entitled to their own opinion and terms related to criminal behavior can certainly be discussed, but this forum is not the right place for that. Since your original question has already been answered, I am locking this topic.
  12. I think it was just an example used here. Law enforcement won't typically want to investigate any computer without there being a reasonable suspicion of something illegal going on.
  13. Yes, I was referring to the content of the file, not any database file obviously. Logging itself is not bad, logging private information is another thing.
  14. Your computer is full with more or less personal data, if it's searched by law enforcement they'll be able to find personal data no matter what. The article talks about Avast that leaves an easily readable file containing browser data. This is not the same as having system logs that show when the AV was updated, what files or urls were blocked and such. In other words, no matter if you use incognito mode or browse normally, the only URL or files showing up in our logging database are those that are detected. It is impossible to use that database to track your browsing history.
  15. That file is not used nor collected by us, for that reason this simply doesn't apply.