Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Windows Defender vs Ransomware! (Shocking Results?)
Message
<blockquote data-quote="Trident" data-source="post: 1081685" data-attributes="member: 99014"><p>Majority of malware will cause no slowdown (specially true for RATs and infostealers). Malware that causes slowdown, by the time user feels it, it would have already done its job.</p><p>Security setups, even when overcomplicated, fail too.</p><p></p><p>Good habits, such as avoiding torrents, cracks, keygens and other pirated content, not believing everything seen in emails as well as on ad banners, knowing that if something is too good to be true then it probably is, all that goes a long way and is less prone to failure (like everything else, not 100%).</p><p>For these habits, you don’t need to obtain masters in cybersecurity. Of course, it is naive to believe that everyone will have them, hence different security apps exist.</p><p></p><p>Even on business environments, employees are expected to be trained. When they are not, layered security setups fail and it is a recipe for disaster.</p><p>Highly technical and sophisticated attacks rarely happen, majority of times there will be some very obvious tell-tale signs.</p><p>For example, that email from GM will be coming from protonmail.com, not from the company domain.</p><p><u>Attackers pray for and prey upon the attacked user not to pay attention and to take shortcuts.</u></p><p>Remember that Linus Tech Tips account takeover, had he noticed that the “contract” pdf is 700MB (highly impossible for a legit pdf to be this size) he wouldn’t have been hacked. His security failed.</p><p></p><p>So it’s important for people to:</p><p>1.) pay their dues</p><p>2.) pay attention</p><p>3.) refuse to do what they are told in email and over the phone, rather log-in to their online account</p><p>The layered security setup is then optional but not unnecessary.</p><p>A lot of security apps blindly trust signed, reputable executables, so supply chain attacks will go right through in any case.</p><p>Supply chain attacks however are extremely rare, much more frequently, DJVU/Stop ransom and Agent Tesla are infecting systems because someone wanted a cracked game.</p><p>This is why, when investigating botnets, frequently it’s discovered that vast majority of the infrastructure is in third-world countries, where users are much more likely to rely on piracy.</p><p>On Android, majority of issues lie in apps that I got no clue why anyone over the age of 12 will want to install, table below provided by Bitdefender.</p><p>[SPOILER="Table"]</p><table style='width: 100%'><tr><td>Qasim.Llc</td><td><a href="mailto:Steelrbasic@gmail.com">Steelrbasic@gmail.com</a></td><td>https://personalitycharginshow[.]xyz</td></tr><tr><td>ALCANTARA.Lab</td><td><a href="mailto:TipAprilb@gmail.com">TipAprilb@gmail.com</a></td><td>https://smartqrscanner1[.]xyz</td></tr><tr><td>Baig.Corp</td><td><a href="mailto:Ississppifinest2@gmail.com">Ississppifinest2@gmail.com</a></td><td>https://animatesstickermaster[.]xyz</td></tr><tr><td>Hamid.Apps</td><td><a href="mailto:jemarchag@gmail.com">jemarchag@gmail.com</a></td><td>https://gps1ocationfinder[.]xyz</td></tr><tr><td>Emmanuel.Llc</td><td><a href="mailto:Quintonjxus@gmail.com">Quintonjxus@gmail.com</a></td><td>https://mygps123123[.]xyz</td></tr><tr><td>Jamie.Lab</td><td><a href="mailto:jjamiemunoz417@gmail.com">jjamiemunoz417@gmail.com</a></td><td>https://artgirlswallpaperhd[.]xyz</td></tr><tr><td>Bennington.Llc</td><td><a href="mailto:kkarlbennington@gmail.com">kkarlbennington@gmail.com</a></td><td>https://catsimulator1[.]xyz</td></tr><tr><td>Josh.Lnc</td><td><a href="mailto:huhua.luc@gmail.com">huhua.luc@gmail.com</a></td><td>http://smartwifii123[.]xyz</td></tr><tr><td>Vern.Apps</td><td><a href="mailto:Vernl3138@gmail.com">Vernl3138@gmail.com</a></td><td>https://imagewarpcamera[.]xyz</td></tr><tr><td>VILORIA.Corp</td><td><a href="mailto:Jamelpmac@gmail.com">Jamelpmac@gmail.com</a></td><td>https://smartqrcreator1[.]xyz</td></tr><tr><td>Abid.Studio</td><td><a href="mailto:ita.mita594@gmail.com">ita.mita594@gmail.com</a></td><td>https://colorizeoldphoto[.]xyz</td></tr><tr><td>Adeel.Studio</td><td><a href="mailto:ikvznj@gmail.com">ikvznj@gmail.com</a></td><td>https://smartaps1ocation[.]xyz</td></tr><tr><td>Haq.Corp</td><td><a href="mailto:Wycliffedennis07@gmail.com">Wycliffedennis07@gmail.com</a></td><td>https://secrethoroscope1[.]xyz</td></tr><tr><td>Nadeem.Apps</td><td><a href="mailto:KnowMonty@gmail.com">KnowMonty@gmail.com</a></td><td>https://volumecontroll[.]xyz</td></tr><tr><td>Cedrick.Corp</td><td><a href="mailto:Cedrickoayz@gmail.com">Cedrickoayz@gmail.com</a></td><td>https://gps1ocationmaps[.]xyz</td></tr><tr><td>RICHARD.Lnc</td><td><a href="mailto:Flossiezxe@gmail.com">Flossiezxe@gmail.com</a></td><td>https://girlsartwallpaper[.]xyz</td></tr><tr><td>Sushil.Dev</td><td><a href="mailto:tacie.bush@gmail.com">tacie.bush@gmail.com</a></td><td>https://mediavolumeslider[.]xyz</td></tr><tr><td>Haider.Studio</td><td><a href="mailto:Eduardoaunx@gmail.com">Eduardoaunx@gmail.com</a></td><td>https://sleepsoundss[.]xyz</td></tr><tr><td>Kumar.Apps</td><td><a href="mailto:Randytzjp@gmail.com">Randytzjp@gmail.com</a></td><td>https://qrcreatorr12[.]xyz</td></tr><tr><td>Waseem.Llc</td><td><a href="mailto:MarquisDunlap35@gmail.com">MarquisDunlap35@gmail.com</a></td><td>https://secretastrology[.]xyz/</td></tr><tr><td>Butt.Corp</td><td><a href="mailto:eterbrellocvx@gmail.com">eterbrellocvx@gmail.com</a></td><td>https://colorizephotos[.]xyz/</td></tr><tr><td>Vledern Studio</td><td><a href="mailto:deernivle67@gmail.com">deernivle67@gmail.com</a></td><td>-</td></tr></table><p>[/SPOILER]</p><p></p><p>Even to properly layer your security, knowledge is still required. Nowadays there are loads of resources users can absorb, if they are lazy, it’s on them. That OEM McAfee won’t help them much.</p><p></p><p>TLDR: between a trained user that knows what they are doing and a user who installs an arsenal of security tools, the latter is more prone to getting an infection. One can always be both. <img class="smilie smilie--emoji" loading="lazy" alt="👍🏻" title="Thumbs up: light skin tone :thumbsup_tone1:" src="https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f44d-1f3fb.png" data-shortname=":thumbsup_tone1:" /></p></blockquote><p></p>
[QUOTE="Trident, post: 1081685, member: 99014"] Majority of malware will cause no slowdown (specially true for RATs and infostealers). Malware that causes slowdown, by the time user feels it, it would have already done its job. Security setups, even when overcomplicated, fail too. Good habits, such as avoiding torrents, cracks, keygens and other pirated content, not believing everything seen in emails as well as on ad banners, knowing that if something is too good to be true then it probably is, all that goes a long way and is less prone to failure (like everything else, not 100%). For these habits, you don’t need to obtain masters in cybersecurity. Of course, it is naive to believe that everyone will have them, hence different security apps exist. Even on business environments, employees are expected to be trained. When they are not, layered security setups fail and it is a recipe for disaster. Highly technical and sophisticated attacks rarely happen, majority of times there will be some very obvious tell-tale signs. For example, that email from GM will be coming from protonmail.com, not from the company domain. [U]Attackers pray for and prey upon the attacked user not to pay attention and to take shortcuts.[/U] Remember that Linus Tech Tips account takeover, had he noticed that the “contract” pdf is 700MB (highly impossible for a legit pdf to be this size) he wouldn’t have been hacked. His security failed. So it’s important for people to: 1.) pay their dues 2.) pay attention 3.) refuse to do what they are told in email and over the phone, rather log-in to their online account The layered security setup is then optional but not unnecessary. A lot of security apps blindly trust signed, reputable executables, so supply chain attacks will go right through in any case. Supply chain attacks however are extremely rare, much more frequently, DJVU/Stop ransom and Agent Tesla are infecting systems because someone wanted a cracked game. This is why, when investigating botnets, frequently it’s discovered that vast majority of the infrastructure is in third-world countries, where users are much more likely to rely on piracy. On Android, majority of issues lie in apps that I got no clue why anyone over the age of 12 will want to install, table below provided by Bitdefender. [SPOILER="Table"] [TABLE] [TR] [TD]Qasim.Llc[/TD] [TD][email]Steelrbasic@gmail.com[/email][/TD] [TD]https://personalitycharginshow[.]xyz[/TD] [/TR] [TR] [TD]ALCANTARA.Lab[/TD] [TD][email]TipAprilb@gmail.com[/email][/TD] [TD]https://smartqrscanner1[.]xyz[/TD] [/TR] [TR] [TD]Baig.Corp[/TD] [TD][email]Ississppifinest2@gmail.com[/email][/TD] [TD]https://animatesstickermaster[.]xyz[/TD] [/TR] [TR] [TD]Hamid.Apps[/TD] [TD][email]jemarchag@gmail.com[/email][/TD] [TD]https://gps1ocationfinder[.]xyz[/TD] [/TR] [TR] [TD]Emmanuel.Llc[/TD] [TD][email]Quintonjxus@gmail.com[/email][/TD] [TD]https://mygps123123[.]xyz[/TD] [/TR] [TR] [TD]Jamie.Lab[/TD] [TD][email]jjamiemunoz417@gmail.com[/email][/TD] [TD]https://artgirlswallpaperhd[.]xyz[/TD] [/TR] [TR] [TD]Bennington.Llc[/TD] [TD][email]kkarlbennington@gmail.com[/email][/TD] [TD]https://catsimulator1[.]xyz[/TD] [/TR] [TR] [TD]Josh.Lnc[/TD] [TD][email]huhua.luc@gmail.com[/email][/TD] [TD]http://smartwifii123[.]xyz[/TD] [/TR] [TR] [TD]Vern.Apps[/TD] [TD][email]Vernl3138@gmail.com[/email][/TD] [TD]https://imagewarpcamera[.]xyz[/TD] [/TR] [TR] [TD]VILORIA.Corp[/TD] [TD][email]Jamelpmac@gmail.com[/email][/TD] [TD]https://smartqrcreator1[.]xyz[/TD] [/TR] [TR] [TD]Abid.Studio[/TD] [TD][email]ita.mita594@gmail.com[/email][/TD] [TD]https://colorizeoldphoto[.]xyz[/TD] [/TR] [TR] [TD]Adeel.Studio[/TD] [TD][email]ikvznj@gmail.com[/email][/TD] [TD]https://smartaps1ocation[.]xyz[/TD] [/TR] [TR] [TD]Haq.Corp[/TD] [TD][email]Wycliffedennis07@gmail.com[/email][/TD] [TD]https://secrethoroscope1[.]xyz[/TD] [/TR] [TR] [TD]Nadeem.Apps[/TD] [TD][email]KnowMonty@gmail.com[/email][/TD] [TD]https://volumecontroll[.]xyz[/TD] [/TR] [TR] [TD]Cedrick.Corp[/TD] [TD][email]Cedrickoayz@gmail.com[/email][/TD] [TD]https://gps1ocationmaps[.]xyz[/TD] [/TR] [TR] [TD]RICHARD.Lnc[/TD] [TD][email]Flossiezxe@gmail.com[/email][/TD] [TD]https://girlsartwallpaper[.]xyz[/TD] [/TR] [TR] [TD]Sushil.Dev[/TD] [TD][email]tacie.bush@gmail.com[/email][/TD] [TD]https://mediavolumeslider[.]xyz[/TD] [/TR] [TR] [TD]Haider.Studio[/TD] [TD][email]Eduardoaunx@gmail.com[/email][/TD] [TD]https://sleepsoundss[.]xyz[/TD] [/TR] [TR] [TD]Kumar.Apps[/TD] [TD][email]Randytzjp@gmail.com[/email][/TD] [TD]https://qrcreatorr12[.]xyz[/TD] [/TR] [TR] [TD]Waseem.Llc[/TD] [TD][email]MarquisDunlap35@gmail.com[/email][/TD] [TD]https://secretastrology[.]xyz/[/TD] [/TR] [TR] [TD]Butt.Corp[/TD] [TD][email]eterbrellocvx@gmail.com[/email][/TD] [TD]https://colorizephotos[.]xyz/[/TD] [/TR] [TR] [TD]Vledern Studio[/TD] [TD][email]deernivle67@gmail.com[/email][/TD] [TD]-[/TD] [/TR] [/TABLE] [/SPOILER] Even to properly layer your security, knowledge is still required. Nowadays there are loads of resources users can absorb, if they are lazy, it’s on them. That OEM McAfee won’t help them much. TLDR: between a trained user that knows what they are doing and a user who installs an arsenal of security tools, the latter is more prone to getting an infection. One can always be both. 👍🏻 [/QUOTE]
Insert quotes…
Verification
Post reply
Top