Jump to content

All Activity

This stream auto-updates     

  1. Yesterday
  2. I've got a Data Block USB Charging Adapter distributed by Talos (a company also owned by Cisco). It does resemble a conventional flash drive. Many charging cables also double as a data transfer cable. This can be helpful when transferring files from your mobile device to a computer, or vice a versa, but this feature can be harmful if you are connecting to a public charging station or unsecured computer leaving your device at risk of viruses and stolen data. It works by restricting the data transfer ability and only allows the cable to charge your device.
  3. Last week
  4. The restore failed response you mentioned zombunny2 can happen if the file in question was a quarantined third-party software "temp" file that gets automatically deleted by the program once it's closed. So in that situation there is no longer a file to restore. Personally I have "Ask Me" enabled for both Quarantine Behavior settings so I can be the one to decide what to do. I think most technically savvy computer users could get away with using these Ask Me settings but I would recommend a novice computer user leave the default automatic settings enabled.
  5. Just a quick note: Once or twice (but very rarely) I've had Immunet quarantine a file, and upon attempting to restore it, Immunet has simply responded with "Restore failed" - and the file is seemingly gone forever. I think sometimes Immunet's history database gets corrupted. I've not worked out whether this is some sort of failed quarantine, or whether the history files get a bit corrupted at some point afterwards, preventing restoration. Like I say it's very rare. I think it's only ever happened to me twice, and that's all the time since the pre-ClamAV cloud-only version (pre version 2.0), so it'd be difficult to replicate. I think correct behaviour when "ask me" is selected in the GUI should be to block access to the file (to keep the system safe) and immediately open a dialogue box ("quarantine the file?", yes/no). The file should only be moved to quarantine after the user has clicked "yes". The current method is automatic quarantine, which necessitates restoration of false-positives, which leads to data-loss when an error occurs.
  6. Responding a bit more to your post... I haven't mentioned mobile phone surveillance, but basically if it really worries you, take a look at the Replicant, /e/, and LineageOS ROMs for your phone, and consider ditching the Google Play store and its proprietary apps for the F-Droid store and its free (libre) open-source apps. Or use a non-smart phone. I occasionally have a digital detox with a vintage Nokia. I really don't miss-out on anything. You might also want to consider whether all those loyalty cards (and the data-profiling they entail) are really worth it (unless you're on the poverty line, they're probably not). You might also want to educate yourself (if you haven't already) on when (and when NOT) to use a VPN and/or TOR. You can get some great information by checking out EFF's surveillance self-defense site, privacytools.io, restoreprivacy.com, thatoneprivacysite.net and any other reputable sites dealing with this subject (clue: they won't be sponsored by any of the services they recommend, and they'll be transparent about how they operate). You may also find it useful to change your e-mail and search providers away from the main big ones. Be warned that looking into privacy is like falling down a rabbit-hole, and it's really easy to get very, very paranoid and overestimate your threat model. You can easily cut yourself off from the world, make your computer unusable and bogged-down, etc. I prefer a middle ground, therefore I go for an option of passive resistance: I want advertisers, data-trackers and governments to know that I object to what they do, even though it would be impractical for me to attempt to stop them. I can't stop them, but I can make it a little more difficult and expensive for them, and I can reduce what they get hold of. I don't have much to hide and am not doing anything illegal, but privacy is a basic human right, and I reserve that right even when I don't need to make use of it. By upholding that right, I potentially save the life of someone who does need to make use of that right, such as a whistleblower, human-rights lawyer or journalist. To paraphrase Edward Snowden: "The nothing to hide, nothing to fear argument is like saying nobody should have freedom of speech just because you have nothing to say".
  7. Interesting mention of Sophos. The same concern crossed my mind once, when deciding which AV to use, however I don't think you need to worry! I initially thought Sophos would send data back to GCHQ, however I really doubt it for one big reason: There's absolutely no need to waste the time and effort doing it. The UK already has an intelligence deal with the Americans, which means that there's no need to pressure Sophos to put a backdoor in their software: The NSA probably already has one in the Operating System, which makes compromising the AV a redundant effort. Any data collected by one 5-eyes country is available to the others. For the same reason, I have no problem trusting Immunet (an American AV, owned by Cisco), because it's already running on an American OS (Windows). If the NSA wants to spy on us, they won't ask Sophos, Immunet and others to backdoor their products, when the operating system itself with all its telemetry is already a tool of mass surveillance. All they have to do is issue a court order telling Microsoft to turn over the information they already collect! Alternatively, they could just ask Microsoft to put a backdoor in the operating system. One point of contact and collection for everyone is far more efficient than going via every single AV vendor and relying on your target using one of the AVs you managed to compromise. As a side note, depending on your views about China and Russia you'd still have this theoretical worry with a Chinese or Russian AV, because obviously they're not in the Western spy-club (5/9/14-eyes). They'd therefore have to compromise something like an AV because they wouldn't be able to pressure Microsoft to backdoor the OS or turn over data like that. Of course, depending on your nationality, views and threat-model, you might not be concerned about this - or you might even trust the Chinese and Russians more than the 5/9/14-eye nations of the West. This is of course all speculation. In any given situation, we don't know for sure who is targeted for surveillance, who is doing the surveillance, and which firms and service-providers are implicated in it. My point is that GCHQ has no need to compromise Sophos (or any other AV) because it would be a far better use of resources for the NSA to compromise Microsoft. If you can't trust your operating system, worrying about the software running on it is irrelevant and pointless. This is actually one of the many reasons why I tend to favour GNU/Linux, *BSD /et al/ wherever possible. I admit they're not perfect and not invulnerable, but that's all a discussion for another thread and another day.
  8. Exploits using public charging points have been around for a while. I have always avoided these even since before the first proof-of-concept exploits were published, for two reasons: Firstly, because it was inevitable this would happen, and secondly, because you cannot guarantee the stability and reliability of the power supply at an unknown charging point. If I use the charger that came with my device, plugged into a surge protector, I know it won't damage my device. I would recommend anyone that ever uses these charging points to purchase a USB data-blocker (also often called a "USB condom"), or to use a charging-only cable. A data-blocker is very small (only about the size of your USB plug). It plugs into the USB charging point, and you plug your cable into the data-blocker. It does the same thing as a charging-only cable: It leaves the voltage connections intact but severs the data connections on the plug - so your device can still charge, but it is completely impossible to exchange data via USB. They all seem fairly inexpensive. Mine is a "Portapow" one, which seems to be the most common; however many other manufacturers make them including Mic-Lock (their AC-USB pays homage to AC/DC's logo) and Privise.
  9. I was told that most likely it's caused by the updater not being able to properly connect to the server because of something the user has installed that's blocking or interfering with that process. However, with the continuing complaints regarding this 503 error issue I'm not so sure that's what's transpiring myself either. I would suggest you send the Admin. Rob. Turner a PM and personally voice your issue to him that way. Just click on the Message button to send Rob a PM. https://support.immunet.com/profile/1703-robturner/ BTW, I do remember you as an old-school member! Not trying to change the subject but why didn't you log into your previous forum account instead of creating a new one? Did you have difficulties/problems trying to access it? If so, or if it's a matter of just not remembering the proper log in credentials give me a PM and I can look into that for you. Best wishes, Ritchie...
  10. Good point novirus! Simply using a public USB port charging station can be used as an attack vector to access one's laptop computer, tablet or smartphone or even execute arbitrary code if the charging provider has malicious intent or the system has been hacked into! These public charging stations are becoming increasingly more popular & cropping up in more places like you mentioned novirus. Like airports, shopping malls, bus terminals, restaurants, bars, etc...
  11. EXTREMELY FRUSTRATED - 503 ERROR I am a VERY early Immunet user (since original beta days) and have never had significant problems with it till this stupid 503 error which appears to be ignored by current personnel. IS ANYONE THERE? HELLO?
  12. JUICE JACK payload loaded through using public charging stations in airports ,malls phones and tablets and maybe few laptops that allow USB charging once connected payload steals information via USB connection (usually USB ports have cables already provided) STAY SAFE CAREFUL USING public USB stations use your own charger connected to power plugs thieves dont stop
  13. my 2 cents,,,, all hack iran,korea,vietnam,russia,india pakistan, euopeans others too many to name spain portugal also through free software like word ,office antivirus sophos ,antivirus sends data to British intelligence using Microsoft amount of data microsoft collects is like Everest proportional just big problem all around even governments hack,NSA canadian cyber(government espionage bureau) DARK WEB ,big problem sell ids for $1,50 each used to hang there but its overwhelming for novice like me Our government is one of the most intrusive in governments in the world, monitoring all online activities and cell phone use, making use of any smart device purchased to further their need to surveil all American civilians. It would be a mistake to believe that one of the close to twenty two agencies that gather data on all American civilian
  14. I have no qualms with the average Chinese citizen. I'm sure they're hard working people trying to keep a roof over their heads and food on the table for their family like everyone else in the world. It's the Chinese government and the decisions it makes that I see is the real problem if it allows (or turns a blind eye to) this type of internet activity. Cheers, Ritchie...
  15. Hello cyber_funk, I find it distressing you ran into this situation myself. I could see where replacing 40 terabytes of data would be a time consuming process indeed! That's a plethora of code! Something I do on a regular basis and endorse. Always, always, ALWAYS back up critical data externally if possible just in case!
  16. It was a rom file for an emulator, it only listed what was in the parenthesis in the file name for some reason so I can't figure out what I need to replace, or even for what system, meaning I will need to rebuild my entire archive again. No other antivirus was running and no one else used this computer(I live alone and I ran the scan when I was asleep, woke up to this mess) Even assuming the rom file was compromised and was hiding malicious code, it cannot execute it on it's own. Even still, I'd like to have been able to find out what I need to replace and that's seemingly impossible now. It won't even list half of the things it quarantined because the list glitches out half way through scrolling. I will probably need to start from scratch my entire 40TB archive because of this, this is very serious for me. I probably won't even remember or find some of the things that may or may not have been deleted without my consent. It won't even list the scan history and says I've never scanned my PC...
  17. Interesting bug, I reached out to Cyberfunk for a support dump but off the top of my head there are 2 reasons Immunet might ho this message I'll star with what is probably the most important thing to you - unfortunately no, once Immunet has deleted a file from quarantine there is no easy way to recover it. that said I can think of 3possible ways to end up showing this message: -Immune auto deletes quarantined files after 30 days to save disk space, the reasoning being it was a legitimate malware detection and you don't want that ile hanging around your computer , and if you didn't resre the file within 30 days you probably didn't care about it anyway. However Immune handles these cases and t displays a different UI dialog than the screenshot one you posted. - some other aAV program (or space conscious well meaning user) manually deleted the file form c:\programfiles\immunet\quarantine. - the file in question was detected in memory and quarantined before it hit the disk, (i.e. whatever program that was about to create the file was terminated before the file could be saved Does "USA,Europe" look like a legitimate filename or path you might have creatd or saved to at some point?
  18. I'm using immunet on windows with ClamAV After my last scan I picked up around 80-something threats. Some of these were put into quarantine and likely were threats, however some were listed as "deleted quarantine file" with a broken file name and no path telling me what it originally was; I don't even know what folder it was in. So now I basically have to rebuild my entire library from scratch on my archive drive if I can't undo this. Which would be a multi-week long nightmare of a project for me and I simply don't have the time with classes just starting for me. Is there any way to get these files back? or at least prevent Immunet from deleting things from my computer without permission.
  19. I'm sure most Chinese firms and ordinary Chinese people in general are upstanding and honourable, however reading this article did remind me of measures I took about a year ago. I was getting ever-increasing volumes of spam to my e-mail inbox, and I got fed-up with sifting through it, so I configured the e-mail server to automatically reject absolutely anything coming from a Chinese domain-name or IP-address. In short, I geo-blocked the entire state of China. I haven't had a single item of unsolicited SPAM since. I've not yet missed any item of mail I was expecting, either. It might be worth pointing out the obvious, though... which is that if you have Chinese friends or relatives, this would cut them off!
  20. Earlier
  21. Hello User, Actually the reason why you're having difficulties is very simple. Immunet does not support and is not compatible with Apple Macintosh computers using the MacOS platform. These are the Microsoft Windows platforms that Immunet supports. Windows 7, 8, 8.1, 10, Server 2008 R2, Server 2012 and Server 2016. There have been ideas/discussions of developing a Mac compatible version of Immunet in the past but that idea never really went anywhere unfortunately. There are some other great free AV's that are Mac compatible. Here's a Digital Trends article that will show you arguably the best 6 different free AV's for MacOS that you can choose from. https://www.digitaltrends.com/computing/best-free-antivirus-software-for-mac/ Regards, Ritchie...
  22. Hi. This software was recommended to me. I tried downloading it from both safari and Firefox. Both browsers downloaded a 2.9 MB file, which cannot be opened by my Mac. I keep trying to redownload, and I'm having the same problem. Is there a solution for this, or is there a process on my computer preventing a successful download? Thanks.
  23. Here is an article by Ashley Shaffer, a correspondent for USA Today that outlines how the Chinese military was responsible for the 2017 hack of over 145 million Americans personal information when they infiltrated Equifax's servers. Read on. WASHINGTON – Four members of the Chinese People's Liberation Army have been charged with hacking into the computer systems of the credit reporting agency Equifax in 2017, which Attorney General William Barr called a "deliberate and sweeping intrusion" that compromised private data of 145 million Americans. The suspects were members of the PLA's 54th Research Institute, according to a nine-count federal indictment unsealed Monday. Wu Zhiyong, Wang Qian, Xu Ke and Liu Lei were charged with three counts of conspiracy to commit computer fraud, conspiracy to commit economic espionage and conspiracy to commit wire fraud. "The scale of the theft was staggering," Barr said. "The theft not only caused significant financial damage to Equifax, but invaded the privacy of many millions of Americans, and imposed substantial costs and burdens on them as they had to take measures to protect against identity theft." FBI Deputy Director David Bowdich described the intrusion as the largest instance of state-sponsored theft in U.S. history. "This is not the end of our investigation," Bowdich said. "To all who seek to disrupt the safety, security and confidence of the global citizenry in this digitally connected world, this is a day of reckoning." The Chinese army identified a flaw in Equifax's security system, executed a plan of attack to penetrate the system and devised a scheme to cover their tracks on their way out, according to the indictment. From about May through July 2017, hackers obtained names, birth dates and Social Security numbers of 145 million Americans, and driver's license numbers for at least 10 million Americans, prosecutors allege. "In a single breach, the PLA obtained sensitive personally identifiable information for nearly half of all American citizens," prosecutors wrote. How it happened: Chinese military hackers identified flaw in Equifax's security and exploited it Hackers also stole credit card numbers and other personal information for 200,000 Americans and personal information for nearly a million citizens of the United Kingdom and Canada, the indictment says. Equifax has agreed to pay up to $700 million to settle federal and state investigations into how it handled the data breach. The settlement includes $425 million to help consumers affected by the breach and a restitution fund with at least $380.5 million allotted to consumer compensation. The fund will also include an additional $125 million if the initial funds run out. Equifax breach settlement: Wednesday is last day to file a claim for free credit monitoring or money The Equifax theft is among several high-profile breaches of American databases, including the U.S. Office of Personnel Management, Marriott hotels and Anthem health insurance company. "About 80% of economic espionage prosecutions have implicated the Chinese government, and about 60% of all trade secret theft cases in recent years involved some connection to China," Barr said. The Justice Department and the FBI have been investigating individuals for alleged theft of trade secrets and economic espionage as part of its China Initiative, launched in 2018 in response to government agencies' findings about China's practice of acquiring intellectual property and technology from other countries. Last week, FBI Director Christopher Wray said the communist power’s theft of technology and trade secrets is the “greatest long-term threat to our economic vitality." Wray said the Chinese government will use any means necessary to “steal their way up the economic ladder at our expense'' by penetrating information technology systems, aerospace, agriculture, defense and research programs, and broad swaths of academia. The FBI has 1,000 open investigations into suspected Chinese economic espionage and technology theft, he said. Last month, the Justice Department charged a Harvard University professor for allegedly lying about money he received from the Chinese government. Charles Lieber, chair of the Department of Chemistry and Chemical Biology at Harvard, made false statements about work he did for a program run by the Chinese government that seeks to lure American talent to China, according to the Justice Department. On Monday, Sen. Ben Sasse, R-Neb., a member of the Intelligence Committee, said the threat does not end with the charges in the Equifax case. "The Chinese Communist Party will leave no stone unturned in its effort to steal and exploit American data," Sasse said. "These indictments are good news, but we've got to do more to protect Americans' data from Chinese Communist Party influence operations." Sen. Mark Warner, D-Va., vice chairman of the Intelligence Committee, lamented that the Trump administration's trade deal with China, signed last month, did not reference the kind of espionage outlined in the Monday's court papers. "For years, the Chinese government has targeted Western commercial firms," Warner said. "It is disappointing that despite a lot of rhetoric, President Trump’s recent agreement with China does nothing to address this specific issue. This is my addition: So what's China going to to do with all of that information? Who knows, but they could use it to blackmail or extort American citizens into resorting to espionage against their own country is one plausible possibility. With the corona-virus disaster still unfolding I'm sure they have more pressing things on their agenda now instead of stealing private American citizens personal data for their own nefarious purposes! It's also no surprise that most of the world's hacking activity and malicious spam comes from China! What a great thing to be notorious for, right? Regards, Ritchie...
  24. We do support Windows Server 2008 R2. Like I mentioned in the previous thread this can be caused by a software conflict. Make sure your firewall or other security software you may be using isn't blocking, interfering or conflicting with any of Immunet's processes. Something you need to look into.
  25. Can get the scan to run. just hangs up without starting. This is a new install on a 2008 server. Service seems OK ad restarts easy but still no scan. Any ideas?
  26. Hi Gary, sorry to hear about your current predicament! I would assume you already tried a previous System Restore point with no luck. Have you tried to run Immunet in Safe Mode yet? If not, enter "Safe Mode with Networking" and run a Full Scan of all your drives on your machine. If running Immunet in Safe Mode produces no positive results may I suggest you try Emsisoft Emergency Kit. These free series of tools are great at cleaning an already infected machine. https://www.emsisoft.com/en/home/emergencykit/ Some types of malware won't let you successfully download or install any new anti-malware software. So you may need to use a friend or relative's computer to download Emsisoft Emergency Kit. Then make sure you update the software and then upload it to a USB flash drive. After entering "Safe Mode without Networking" on your machine plug in the USB device and run the scanning tools. There are some great tutorial videos on YouTube you can view prior to using the software too! Just type in Emsisoft Emergency Kit in YouTube's search bar. I always keep a current copy of EEK on a USB device myself just in case. If none of these things are successful there a few other things to try but, worst case scenario, you may have to format your Operating System again. I hope your machine came with the original OS install disk, you may eventually need it. If you need any further assistance or instructions feel free to add an additional thread to this topic. Best wishes, Ritchie...
  27. I ran the immunet virus scan and it did not detect anything. However I have background processes that have no property selection available. Most of my processes are disabled or do not have permission. Chrome and Microsoft Edge have been corrupted. Any suggestions? Thank you
  1. Load more activity
×
×
  • Create New...