Jump to content

Elise

Emsisoft Employee
  • Posts

    8514
  • Joined

  • Last visited

  • Days Won

    129

Everything posted by Elise

  1. Hi, As a general rule for mods for popular games like Minecraft, they are safe if you download them from the official websites, for example for RLcraft that would be: https://www.curseforge.com/minecraft/modpacks/rlcraft If you're not sure you can always scan the downloaded files or upload them to https://www.virustotal.com
  2. It was the day for outages apparently. :) The page should now load properly again.
  3. I'm sorry to hear about this problem. Unfortunately I cannot help you with this password issue (and I suggest you refer back to your support ticket for an update on that), however in regards to the alerts you are getting, you can submit these directly from quarantine using the False Detection button so we can whitelist them and you can use the program that is getting blocked.
  4. There is a difference between the Web Protection in Emsisoft Anti-Malware and the browser extension. If we're talking about the Web Protection, then we either block the entire domain or not. The browser extension can be a bit more nuanced in this respect due to the way it works. That means for example, if someone uploads a phishing page to an otherwise legitimate hoster, we won't block the entire domain, which is a good thing if you consider that for example Dropbox or Amazon AWS are used as well for that.
  5. Thank you for your kind feedback! We're glad to hear all the files were properly detected. If there are any missed files you can always report them in the appropriate subforum by following the steps here:
  6. Hello, In Emsisoft Anti-Malware, click on Web Protection (under Protection). In the window that opens, click on Add Rule. Under Host add the site you want to allow and under "Implemented Actions" you can set what to do with that site. Click OK and you should have a new rule for the site.
  7. As far as I know these updates will only show up as optional. Most normal computer users will just rely on Windows installing updates automatically and will rarely check the Windows Update settings page. Right now I have an optional preview of KB4601382 for example. I can install that manually, but Windows won't do it automatically until the next patch Tuesday. It's good to realize that preview updates (which you can get a little earlier than normal updates) and preview builds (which you can get when you're part of the Windows Insiders program) are really different things. It's normal to see the former on Windows, but the latter you should only see when you are registered for Insider builds.
  8. What exactly is the update number/description that is being offered?
  9. Hello, The posts you found are more than 5 years old. In terms of security software that means the information there is severely outdated. In the past years considerable changes have been made to our products and currently Emsisoft Anti-Malware protects against fileless malware. Fileless malware detection has nothing to do with the reputation settings you asked about; our behavior blocker routines were adapted to adequately detect and block fileless malware a few years ago.
  10. Hello, No, Emsisoft Anti-Malware should be enough. It will detect keylogging attempts through it's behavior blocker. To be safe, especially against phishing attempts online it is recommended to also install the free Emsisoft Browser Security extension.
  11. This is the wrong place to report such issues. You already reported it in the submission topic you made which is the correct forum for most detection issues. I replied to you there a bit earlier today. To avoid confusion I will lock this topic.
  12. Hello, The short answer here is "no" (if no information was shared). It will depend on what they were playing on xBox, but it is possible for someone in a multiplayer game to see the IP address of other players. A simple lookup of that address will show your location. That is not an exact address, but just a general indicator (city/state). However that information does not give anyone the possibility to manipulate your internet access. Access is managed by your ISP, so if your internet was not working it probably was a coincidence. You could contact your ISP to see if they have any information about a possible outage.
  13. It's a legitimate file, created by TLC (the owner of Alcatel). The McAfee detection is a false-positive.
  14. Hello, Thank you for reporting this issue. Without an actual file there is nothing we can do to check this. My recommendation would be though to contact McAfee and ask them to check if this is a false-positive since it is their application detecting it.
  15. No idea, probably a slow update connection. You could try to check if the browser is up to date via Help > About Chrome in the menu.
  16. Does this happen after a restart (not standby) before you start the browser at all?
  17. According to their manual you can uninstall it from Apps & Features: http://h10032.www1.hp.com/ctg/Manual/c06379792
  18. This has not changed. The article also states clearly at the start:
  19. RDP attacks are not really new, please see also this article from 2017: https://blog.emsisoft.com/en/28622/rdp-brute-force-attack/ As for software, I would always try out a program to see if it suits your needs, in case of brute force protection its usually the user/administrator, and not the software that makes the difference.
  20. The short answer to that is: no. It can be broken by malware (as in: won't run) or blocked (a replacement is attempted but after a reboot the original bad file is back), but that is about it. That being said, malware doesn't need to manipulate it, if it can just circumvent it. If a system is infected and a replaced system file has sufficient permissions to fool Windows into thinking it is legitimate (this typically is rootkit-level), you can run SFC all you want and Windows will report everything is fine, while in fact you can have one or more infected system files. So running SFC is not a malware scan nor should it be used as such.
  21. I will test this a bit next week, in the mean time you may want to check what the alert was for, because I highly doubt it was for 7zip and rather for the malware file(s).
  22. It depends completely on how this script is executed; in a "normal" malware scenario it will be dropped or downloaded, which will lead it to be blocked.
  23. Unfortunately I can't access that topic. I have checked the files and I suspect the issue is with the powershell script (mal.ps1). A script like that one is usually the result of being dropped by other malware or ending up on the system using exploit code, which will be blocked. To simulate that correctly in a test you would need to find out what malware dropped this script and run that instead.
  24. Thank you for your feedback. Could you please send us the samples that weren't blocked so we can check out why they were able to encrypt files?
×
×
  • Create New...