Elise

Emsisoft Employee
  • Content Count

    7328
  • Joined

  • Last visited

  • Days Won

    110

Everything posted by Elise

  1. Elise

    Address has been blocked

    Hello, Thank you for contacting us. However Emsisoft has nothing to do with ESET's products. You will have to contact ESET in order to see what's going on.
  2. Elise

    emsisoft browser security

    Hello, This is legitimate. You can read more about it here: https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
  3. PUP behavior typically does not include password stealing (that would move it straight into the malware category). These are considered PUPs because the way they are distributed, however if you would like to install it because you think it's useful there's nothing wrong with it. It is possible that Tampermonkey is bundled in a third-party download wrapper that also may distribute adware/malware, however if you download it from the official website it should be fine.
  4. Elise

    Grambler is it safe?

    I've never used it, so I can't really comment on the functionality, only that it is safe and not malicious.
  5. Elise

    Grambler is it safe?

    Hello, This application is safe. If you can go to Logs and double click the entry where the file was flagged, you can copy the alert message and paste it here and I can whitelist the executable for you.
  6. Hello, None of these keys are inherently dangerous, but it depends on what installed them. This can happen if you installed a program of Asian origin for example. I'd check the content of each key to be sure (you can export them by right clicking the key name and then selecting Export and post or attach the content here).
  7. It depends of course on personal preferences, but for your computer's security Emsisoft Anti-Malware in combination with the Windows inbuild firewall really is enough.
  8. Elise

    Fake Tech Support websites

    Yes, when I checked it, it was taken down already (at least good that the hoster acted so quickly :)).
  9. Elise

    Fake Tech Support websites

    Thank you, I'll check it and detection will be added if necessary.
  10. Please stop accusing people of saying things they did not. Everyone is entitled to their own opinion and terms related to criminal behavior can certainly be discussed, but this forum is not the right place for that. Since your original question has already been answered, I am locking this topic.
  11. I think it was just an example used here. Law enforcement won't typically want to investigate any computer without there being a reasonable suspicion of something illegal going on.
  12. Yes, I was referring to the content of the file, not any database file obviously. Logging itself is not bad, logging private information is another thing.
  13. Your computer is full with more or less personal data, if it's searched by law enforcement they'll be able to find personal data no matter what. The article talks about Avast that leaves an easily readable file containing browser data. This is not the same as having system logs that show when the AV was updated, what files or urls were blocked and such. In other words, no matter if you use incognito mode or browse normally, the only URL or files showing up in our logging database are those that are detected. It is impossible to use that database to track your browsing history.
  14. That file is not used nor collected by us, for that reason this simply doesn't apply.
  15. If you're not sure, you can always call to your internet provider (using the phone number on their website) and explain what happens. Usually they'll be able to confirm/deny that the call was from them.
  16. No it can't because we don't collect that information. To read more about this: https://blog.emsisoft.com/en/26117/https-interception-what-emsisoft-customers-need-to-know/
  17. Elise

    EMERGENCY KIT

    Hello, Emsisoft Emergency Kit is already portable. All you have to do is to copy the EEK folder to the USB drive and run it from there.
  18. Elise

    Fake Tech Support websites

    Yes, you are right. I checked them all, but (fortunately) none of the content reported did work (although I could see it had been there before).
  19. Elise

    Fake Tech Support websites

    Hello, We do block techsupport scams, however we do not use heuristics detection to do this as some other products do. The reason for this difference is that doing so would require us to actively filter/check all your browser activity. Not only is this a breach of your online privacy, it also brings security risks with it, which is why we opted not to do this. While I completely understand how annoying/scary such fake techsupport scams can be, they are harmless to your computer; the worst that can happen is that you have to close the browser via the taskmanager (you can do it also via Emsisoft's Protection/Behavior Blocker tab). I will check the data you provided and will add any undetected techsupport scams to our database.
  20. Elise

    EAM and Camera Hijack

    Theoretically that is possible yes, but then something would need to be installed on disk. And that would count as suspicious behavior.
  21. Elise

    EAM and Camera Hijack

    The hijacking aside, you need to have traffic back to the attacker, which would be detected in any case. And unless someone tricks you in installing something to capture your camera input to send it their way (which would be a legitimate program, which you clearly have to install manually and configure) the attack itself would be intercepted as well. Larger files may always not be scanned by the file guard, but they are monitored by the behavior blocker, so that is not an issue.
  22. Elise

    EAM and Camera Hijack

    Hello, Thank you for contacting us about this issue. Please feel free to forward the email to [email protected] Most likely this is a malicious email. As for your questions: 1: Yes, you would be protected from that by EAM. 2: No, realtime protection would have blocked it, either via the file guard or behavior blocker. However you can always run a scan to doublecheck. 3: Yes. 4: No, you can just trash the mail or forward it to us (and then trash it).
  23. Elise

    qarantine

    Based on the file name I think this was a temporary installation file. It triggered an alert and EAM attempted to quarantine, but before this was completed the file was already gone, hence no actual file in quarantine.
  24. Elise

    qarantine

    It is possible that you had a file in quarantine, then removed it. The event that the file was quarantined will still be visible in the logs, even if the file is no longer in quarantine.
  25. Hello, Was the version you tried to run also 3 months old? In that case it's recommended to download a new copy of EEK from the website. Please let me know if this also happens with a new copy of EEK.