Jump to content

ritchie58

Moderators
  • Content Count

    2,407
  • Joined

  • Last visited

  • Days Won

    187

Everything posted by ritchie58

  1. Hi Gordon, You're just one of many that have run into this same update/connection bug with the 7.3.0 build unfortunately. I use Immunet as a companion AV to another paid AV product. For that reason I didn't use the ClamAV module so that's never been a problem for me. However I did like the added security that the ETHOS & SPERO cloud engines provided. After I noticed that cloud lookups were not taking place I had no other choice but to uninstall Immunet for now. I mean, why keep an app installed that is essentially useless! So now I'm waiting for the developers to fix this issue before I reinstall Immunet again. What's particularly disconcerting for me is that no admin or dev seems to want to even take the time to look into this or let users know they're working on it. "I hate to sound so pessimistic but your guess is as good as mine when/if this bug will be adequately resolved regrettably!" I know Cisco has made Immunet a "Low Priory" project but this is getting absolutely ridicules how long it's taking in my honest opinion! Has Immunet become complete ABANDONWARE? I'm starting to have my suspicions and this ongoing scenario is really starting to bum me out! I've been involved with this project for over 10 years now and "this is the worst situation I've encountered in all that time!" If things don't improve soon I'm not sure how much longer I will wish to stay involved with this software. What's the point of helping to support abandonware that no longer even works properly? Frustratingly, Ritchie...
  2. Immunet's built-in uninstaller should work adequately. If you don't plan on reinstalling Immunet again at this time, when asked by the uninstaller if you plan on reinstalling again choose the "NO" option and proceed with the remainder of the uninstall process. This will delete your entire settings configuration and delete all .db history files for a more through uninstall. After uninstalling and rebooting you can also delete Immunet's Program Files folder from that directory. If you want to dig even deeper you can use the Windows regedit app. Just click on Start -> type in regedit in the Search bar and click on the icon that appears. Once regedit is launched you can search the directories for any orphaned registry keys associated with Immunet. A word of caution. Regedit can be a very useful tool but it's also a double edged sword. If you delete the wrong registry keys that can cause your OS to become unstable or even not boot-up at all! Actually it's not a bad idea at all to create a manual System Restore Point first before using regedit "just in case!" Only delete any sub-keys that you may find that are "directly associated with Immunet!" If you've never used Windows regedit or are a little wary to do so that's ok just to leave these keys in place. Since you did an uninstall they will be inactive, just using up a little OS disk space is all. I hope this info helps.
  3. Immunet's services, by design, are very difficult to stop by both malware and the intended user, even if you use your Administrator rights. There are several bugs with build 7.3.0 regarding problems with updating the ClamAV module and even cloud lookups. Is that the problem you're also encountering?
  4. My opinion is a user shouldn't have to go through this possible work-around! "I wish someone would take a genuine interest in fixing this issue properly!!" This info might be helpful for someone that actually uses the ClamAV module, which I don't. Like I mentioned in your other topic I am not reinstalling Immunet again until the devs can sort this thing out and issue a new bug fix build.
  5. Personally speaking I still plan to keep Immunet uninstalled for now until a bug fix is issued by the development team for the update issues that continue to exist for build 7.3.0.
  6. President Donald Trump on Friday told reporters he will act soon to ban Chinese-owned video app TikTok from the United States, NBC News reported. Trump made the comments while chatting with reporters on Air Force One during the flight back to Washington from Florida. "As far as TikTok is concerned we're banning them from the United States," Trump said, calling the action a "severance." Trump did not specify whether he will act through an executive order, or another method. such as a designation, according to NBC News. "Well, I have that authority. I can do it with an executive order or that," Trump said. A TikTok spokesperson told NBC News that the app helped to create jobs across the U.S. and was committed to user privacy. "We've hired nearly 1,000 people to our US team this year alone, and are proud to be hiring another 10,000 employees into great paying jobs across the U.S.," the spokesperson said in a statement. "Our $1 billion creator fund supports U.S. creators who are building livelihoods from our platform. "TikTok US user data is stored in the US, with strict controls on employee access," the statement said. "TikTok's biggest investors come from the US. We are committed to protecting our users' privacy and safety as we continue working to bring joy to families and meaningful careers to those who create on our platform." Trump's comments come as it was reported Friday that Microsoft has held talks to buy the TikTok video-sharing mobile app from Chinese owner ByteDance, one person close to the situation told CNBC. This person characterized the talks as having been underway for some time, rather than being brand new. Trump told reporters that he didn't support the reported spinoff deal involving Microsoft buying TikTok, NBC News reported. A TikTok acquisition could make Microsoft, a major provider of business software, more concentrated on consumer technology, which Microsoft has moved away from somewhat in recent years, by exiting the smartphone hardware, fitness hardware and e-book markets. Amy Hood, Microsoft's chief financial officer, said in 2018 that in recent years the company had been consistent in its strategy on acquiring "networked assets" with many users, including LinkedIn. Chinese company ByteDance launched TikTok in 2017. The app has grown more popular during the coronavirus pandemic, with 2 billion downloads in April, according to Sensor Tower. Competitors include Facebook and Snap. ByteDance investors seeking to take over TikTok have valued it at $50 billion, Reuters reported earlier this week. Microsoft declined to comment on the talks, which were first reported by Fox Business Network. "While we do not comment on rumors or speculation, we are confident in the long-term success of TikTok," TikTok said in a statement Friday. The rise of TikTok in the U.S. has prompted the Trump Administration to scrutinize the app. Trump said earlier on Friday that the administration was looking at various options for what to do with TikTok, including banning the app. Earlier this month, Secretary of State Mike Pompeo said the U.S. was looking at banning TikTok as well as other Chinese social media apps, citing national security concerns. Pompeo added that the Trump administration was evaluating TikTok akin to Chinese state-backed tech companies Huawei and ZTE, which he has previously described as "Trojan horses for Chinese intelligence." In 2018, the Pentagon halted sales of Huawei and ZTE mobile phones and modems on military bases around the world, again citing national security concerns. U.S. officials have long complained that Chinese intellectual property theft has cost the economy billions of dollars in revenue and thousands of jobs and threatens national security. Beijing maintains it does not engage in intellectual property theft. The move by the Trump administration represents another step in the deteriorating relations between Washington and Beijing and comes a week after the U.S. closed the Chinese consulate in Houston, prompting China to shutter the U.S. consulate in Chengdu. The Pentagon has taken concrete steps to discourage U.S. service members and their families from using Chinese-backed tech. In December, the Defense Information Systems Agency advised that all Department of Defense personnel should not use the Chinese-owned social media platform, citing a "potential risk associated with using the TikTok app." My personal comment: There have been many TicTok users (some that will be first time voters) that say that they will now register to vote just so they can vote against Trump being reelected in the upcoming election because of this action. Except for his die-hard radical right-wing base Donald Trump seems to alienate just about every other group in our society including those in the BLM movement. So the way I see it he will not be getting the young or the African-American voters on his side this time around! CNBC's Steve Kopack and NBC's Josh Lederman contributed to this report
  7. Hi David, Yeah, you're absolutely correct. The devs have never been able to adequately address this UI issue with 4k screens then and now regrettably.
  8. Hi Vince, Sorry for the delay in responding but I've been dealing with my own issues with Immunet. I've observed that excessive CPU usage by Immunet is usually caused by the ClamAV module being enabled and a installed software package a user has installed. Are you using any programs that very frequently or constantly write to disk such as a system backup/mirroring or Virtual Machine software? If so, maybe a custom exclusion rule or two could correct this issue for you. Normally I would recommend, as an experiment, you turn off the Clam AV module to see if that has any beneficial effects. But there is a server issue going on right now that some people (including myself) can't seem to connect properly to the service which means that ETHOS & SPERO cloud lookups are not taking place. So at the moment if you disabled ClamAV and are one of the folks experiencing this server issue too you could be essentially going without any protection at all with Immunet. Best wishes, Ritchie...
  9. Mmm. Still no technical input from anyone regarding this subject. Bummer! I really would like to reinstall Immunet if this server issue gets fixed. Even though I don't use the ClamAV module because I've got Immunet running as a companion AV to a paid product, I've always liked the added security layer that the ETHOS & SPERO cloud engines provided. Regards, Ritchie...
  10. Personally speaking I decided to uninstall Immunet for now. It would be great if an admin or dev would add a thread to this topic to verify the on-going server issue has been fixed. If not I plan not to reinstall Immunet again until a new build is rolled-out. This really is unacceptable for uses having to deal with this for almost a week now! "Is there any admin or dev out there that even cares about this software anymore?" I'm really starting to wonder about that.
  11. I believe there is a serious server issue occurring right now. My Scan Now tab has been greyed out & I can't connect to the cloud for almost a week now! I don't use the ClamAV module since I have Immunet paired with a paid AV product. If I can't connect to the cloud that makes Immunet essentially useless for me. Believe me you're not the only one experiencing issues with the buggy build.
  12. Personally speaking I'm getting rather annoyed that this is still happening after several days now & no admin or dev seems to give a crap! This has to be a glitch on the server side of things. That's something I have no control over. I'm "seriously considering" just uninstalling Immunet for now until a new build is rolled-out! Maybe I'll wait a day or two more to see if this server issue is corrected but after that I'm uninstalling it! That's as far as my patience will last! Hopefully the next build won't be so buggy! One can only hope I guess. It's quite obvious to me that Immunet is NOT getting enough in-house testing to eliminate the major bugs before a public roll-out occurs. "As you can tell I'm starting to get rather perplexed that no support personal has responded to anyone's technical issues for three months now!" Has Immunet become abandonware? It makes me really start to wonder at this point! A sad state of affairs if you ask me for a once very promising AV. "Holy disillusionment Batman!" I'm not advocating uninstalling Immunet for everyone that reads this thread. If it seems to be working adequately for you then leave it installed would be my recommendation.
  13. "Thanks much" for your input gogos! I was really wondering if it was just myself observing this for some unknown reason! Like I mentioned, I have seen this behavior on rare occasions because of a temporary server glitch but usually it's corrected within hours or perhaps a day's time. This has been going on for at least two days now, very troubling! Something I additionally find troubling is that even though I have the Cloud Notifications setting turned on, which normally gives a little pop-up balloon when Immunet connects to the cloud seems to be also non-existent! Am I running which is essentially a useless app right now? This build seemed so so buggy from the start!!! Best wishes, Ritchie...
  14. Is anyone else seeing this with the UI presently (see images)? The Scan Now tab is greyed out and I can't figure out the reason why? I tried several reboots but that didn't correct the issue. I even did a clean reinstall to no avail either. I have an internet connection since I'm here typing this so that's not the problem. I know it's not my firewall or other security apps conflicting. What's up with that? I'm stumped! It could be some sort of temporary server issue (I hope). I've seen that happen on a few very rare occasions.
  15. This is a known issue with version 7.3.0 unfortunately. What you need to do is do a clean uninstall of Immunet. When Immunet's uninstaller asks you if you plan on reinstalling Immunet again choose the "NO" option and proceed with the remainder of the uninstall. After reinstalling you will have to reconfigure the settings to the way you had them, add any custom exclusions again and reschedule any scheduled scans you were using. That should work to get the updates rolling again but if it doesn't let us know. Cheers, Ritchie...
  16. Here's additional information regarding the Twitter hacker breach. By Kevin Collier and Jason Abbruzzese. NBC News corespondents. Cyber-security professionals broadly agree on a central problem: Computers and code have clear fixes, but humans don't. Twitter provided perhaps the highest-profile example of this challenge when its security was breached Wednesday, allowing for scam-filled messages to be sent from some of the most followed people on the platform, including Joe Biden, Barack Obama, Jeff Bezos, Kanye West and Elon Musk. Specifics of how the attack happened are still unconfirmed, but Twitter announced Wednesday night that it suspected "a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools." Put more simply, Twitter didn't break. An employee did. Or more than one. "Humans and their behaviour continue to be the biggest threat for organizations," said Mikko Hyppönen, the chief research officer at the Finnish cybersecurity company F-Secure. "Security holes come and go. Sometimes there's something urgent happening but once you patch and update, you're good to go," he said by text message. "The human weaknesses are there always. Every day. Forever." Twitter worked to contain the damage, but it took several hours, including a period in which it prevented most verified users from posting new tweets. (Verified users, known for their check marks, tend to be prominent figures in politics, the media, business and culture.) During that time, scam tweets were sent from dozens of major accounts, as well as hundreds of unverified accounts. The hackers quickly received hundreds of transfers worth over $115,000. Giovanna Falbo, a spokesperson for Twitter, declined to comment beyond the company's tweets. But the company indicated to Vice's Motherboard, a tech-focused publication, that whoever was behind the breach had gotten someone inside Twitter to provide the access willingly. Motherboard reported that people who claimed responsibility for the attack had worked with someone at Twitter and that one person said the Twitter employee was paid for the access. It's more common for employees to be unaware of the roles they play in data breaches. The most common hacking efforts center on tricking employees into giving up login information, a process known as phishing. But other major hacks have involved company insiders' using their access. An "insider threat" was alleged to have been responsible for the 2019 Capital One security breach, in which former Amazon engineer Paige Thompson was accused of leveraging her knowledge of the platform to gain access to Capital One servers on Amazon Web Services. The problem of company insiders' opening the door to hackers has also become a national security issue at the heart of international espionage schemes. Twitter has also faced this problem. In November, the Justice Department charged two former Twitter employees with providing user data to Saudi Arabia. And in 2017, a Twitter employee briefly shut down President Donald Trump's account. How to stop these kinds of security breaches has become the subject of growing efforts within the cybersecurity world. Which employees have access to what systems is closely watched, and security software can look out for employees who are doing things out of the ordinary. Companies are also working to figure out how to make sure employees don't have more access than they need. Marcin Kleczynski, CEO of Malwarebytes, said Twitter will inevitably review the internal systems used in the breaches, pointing in particular to a tool for resetting account passwords that has been the focus of speculation by some cybersecurity experts. "Twitter will be eager to make sure this never happens again, so it'll be interesting to see what focus they put on this admin tool and what access folks at Twitter will have going forward," he said. Targeting people who may be willing to turn on their employers isn't a new tactic. For decades, the U.S. defense industry has been the target of widespread espionage efforts to steal sensitive information about weapons systems by pressuring company employees, often with lures of money or threats to reveal sensitive personal information. While there are no signs that Twitter's breach was part of an espionage effort — such work usually doesn't try to attract international attention — other factors can push people to accept monetary offers. Michael Hamilton, the former chief information security officer for the city of Seattle, said that during the recession that followed the financial crisis, employees were more likely to entertain offers from hackers. "When the macroeconomics get to be real bad ... people have a higher tendency to go to the dark side," he said. Hamilton said the current economic downturn has almost certainly triggered more activity from hackers looking for opportunities to persuade employees to take risks. "The offers for people are probably coming with intensity right now, because the audience is receptive, and again this whole COVID-caused dropout of the economy creates the opportunity for this kind of insider malfeasance," he said.
  17. The first thing to check is make sure that any other installed security software (including your firewall) is not blocking any of Immunet's processes. These are sfc.exe, iptray.exe, cscm.exe and freshclam.exe ( if using the ClamAV module). If that's not the issue then I would suggest you do one more reinstall. This time when Immunet's uninstaller asks you if you plan on reinstalling Immunet again choose the "NO" option and proceed with the remainder of the uninstall. After reinstalling you will have to reconfigure the settings to the way you had them, add a custom exclusions again and reschedule any scheduled scans you were using. Let us know if that doesn't work. What was the quarantine response you encountered? Just click on the underlined word Quarantine located just below & to the right the History tab to access the dialog box. That's if the UI can be accessed after doing a reinstall of course. Best wishes, Ritchie...
  18. Here is a news article by NBC News reporter Kevin Collier how some celebrities and politicians had their Twitter accounts hacked today! Over a dozen high-profile Twitter accounts, including Apple, Amazon CEO Jeff Bezos, Microsoft founder Bill Gates, Democratic presidential candidate Joe Biden, and former president Barack Obama, were apparently hacked on Wednesday and posted tweets telling followers to send bitcoin to a specific address. One wallet linked to in the tweets had apparently received over 12 bitcoin, worth over $110,000 at the current exchange rate. Twitter is looking into the issue. Over a dozen high-profile Twitter accounts, including Apple, Amazon CEO Jeff Bezos, Microsoft founder Bill Gates, Democratic presidential candidate Joe Biden, and former president Barack Obama, were apparently hacked on Wednesday and posted tweets telling followers to send bitcoin to a specific address. Tesla CEO Elon Musk was first high-profile account to be hacked, posting a tweet early Wednesday afternoon promising to double any payments sent to the bitcoin address. Twitter's stock dropped over 2% in extended trading. "We are aware of a security incident impacting accounts on Twitter. We are investigating and taking steps to fix it. We will update everyone shortly," the company said in a tweet. The Musk tweet was deleted minutes after it was sent, before a second tweet asking for bitcoin was posted from the same account and deleted again. In total, Musk's account sent at least three bitcoin tweets from a Twitter web account and one reply to Bill Gates. The bitcoin-related tweet was Apple's first ever tweet, although the account had placed ads in the past. Other accounts hacked included former New York City mayor Mike Bloomberg, musicians Kanye West and Wiz Khalifa, Berkshire Hathaway chairman Warren Buffett, reality TV star Kim Kardashian, the Cash App corporate account, and Uber's corporate account. Rachel Tobac, the CEO of cybersecurity firm SocialProof Security, told NBC News that the attack was likely the largest Twitter had ever seen. "I'm surprised twitter hasn't gone completely dark to prevent misinformation campaigns and political upheaval," she said. "We are lucky the attackers are going after bitcoin (money motivated) and not motivated by chaos and destruction." Teresa Payton, former White House Chief Information Officer and CEO of Fortalice Solutions, said that she expects Twitter to provide a full report detailing how and why these accounts were hacked. She also warned that information, such as direct messages, may have been stolen from the affected accounts and could be released or used in the future. "They're going to need to apologize to the VIPs and to the individuals who were defrauded and fell for the scam," Payton told CNBC. "The next thing they're going to need to do is to conduct a thorough and transparent investigation, and they're going to need to share what they can about who the attackers were and how they pulled this off." Kelley Robinson, a security advocate for Authy, a company that provides two-factor authentication, told NBC News that the scale of the attack indicated the hackers had gotten administrative access at Twitter itself. "It's really unlikely that Bezos, Musk, and especially Biden all had credentials compromised," she said over Twitter Direct Message. Mel Shakir, a Managing Director at DreamIt Ventures and a veteran of the IT security industry, said that high-profile users like those attacked on Wednesday should be using as many security options as possible, including biometric authentication like fingerprints, or using hardware keys instead of text messages for two-factor authentication. "Passwords are inherently insecure. But Twitter has provided all the security options that are available," Shakir said. Earlier on Wednesday, several cryptocurrency accounts simultaneously linked to a phishing site called CryptoForHealth. Cameron Winklevoss, cofounder of Gemini, a cryptocurrency market, said in a tweet: "ALL MAJOR CRYPTO TWITTER ACCOUNTS HAVE BEEN COMPROMISED." In the past, one popular cryptocurrency scam on Twitter involved attackers changing their display name and avatar to match Elon Musk, then they would reply to his tweets pretending to be him asking for bitcoin. But on Wednesday, the accounts tweeting about bitcoin were real. All hacked accounts on Wednesday were verified. The tweets on Wednesday appeared to have been sent through a web browser accessing Twitter.com, not an app or third-party software. Around 3:15 PT, Twitter blocked all verified accounts from tweeting in an attempt to regain control.
  19. Thanks for the extra input on this issue Jim. I do appreciate you reporting this. This is the first posting that a clean reinstall didn't seem to work! "Sorry to hear that bro!" What is your Operating System anyway Jim? I too truly hope the devs are reading these recent issue postings since I'm not exactly getting a whole lot of help on this site lately. I believe that your observations are correct. It seems the issue solely lies with the ClamAV module. This has been and continues to be a non-issue for me since I don't use ClamAV. I got Immunet paired as a companion AV to a different paid AV product. It is recommended that the ClamAV module & updates for it be disabled if Immunet is used in this manner. Sincerely, Ritchie...
  20. I'd like to wish everyone a safe & happy July 4th weekend! I know that many cities & municipalities across the country have canceled their fireworks display because of the pandemic. If you're lucky enough to live in or near a location that will have a display just remember to follow the CDC's guidelines. If you go out wear a face mask & continue to practice social distancing! Some health experts are worried that if people congregate in large crowds (like what happened Memorial Day) it could cause another spike in covid-19 cases. Cheers, Ritchie...
  21. Thanks for the encouraging words guys! "I do really appreciate it!" It is rather obvious by now that Immunet is not getting the priority it once did by the Cisco/Sourcefire management. I guess one can only hope that things will eventually improve and there is more input from the support staff. Best wishes, Ritchie...
  22. Everyone is entitled to there opinion Frank. What I would like to see is more input from some knowledgeable support staff helping users with there technical issues. I'm the forum moderator for this site but I've been thrust into the role of doing the duties of a support person to the best of my abilities. I've been getting almost no help for over several months now! I have no clue as to why that's happening! The admin Rob T was a great help on the site but he's been M.I.A. since April. That certainly isn't the first time this has happened in the years I've been doing this. "It does get 'rather frustrating' when I get no assistance at all on the site!!"
  23. I would venture to guess that the dialog box is empty because Immunet recognized the detection as a safe EICAR dummy test virus. I've done tests with EICAR test strings with Immunet in the past. Usually though the entire folder you download that has the test strings gets immediately quarantined!
  24. Mmm. That is very odd! Try accessing "Services" (click on Control Panel -> Administrative Tools -> Services) to see if Immunet is set to "Automatic" at startup. That's the setting you want. Depending on the OS build you're using Defender will disable itself if another AV is installed. What is your OS anyway? I don't want to scare you unnecessarily but another possible cause would be you installed Immunet on an already infected machine that's preventing Immunet from launching at startup now. That could also be the cause for Defender not launching too. Some types of malware can & do have the ability to disable your currently or newly installed security software. Immunet is "really great" at keeping an already clean machine that way but not so good if you did install the software when you were already infected with something I'm sorry to say.
  25. The answer to that is yes. Immunet will protect you against known strains of ransomware Ernesto. Even if Immunet detects an unknown variant it has "heuristic capabilities" that can react to and block these strains as well. Regards, Ritchie...
×
×
  • Create New...