itman

Most Valued Members
  • Content count

    1,894
  • Joined

  • Last visited

  • Days Won

    77

itman last won the day on January 12

itman had the most liked content!

4 Followers

About itman

  • Rank
    N/A

Profile Information

  • Gender
    Male

Recent Profile Visitors

3,843 profile views
  1. I noticed that BPP updated today to ver. 1122. IE11 x64 still not launching my bank web site in BBP mode when IE11 is in normal browsing mode.
  2. JS/Chromex.Submelius.D trojan

    Eset blocked access to the web page. As such, nothing could have been downloaded and you are not infected with anything.
  3. If those IP addresses associated with the yellow explanation point shown in your screen shot are part of your local based network - appears they are - then refer to this: https://support.eset.com/kb2933/?locale=en_US
  4. Same as you; secured browser. Suggest you test under IE11 since that is what I am using and where the problem is being experienced. -EDIT- Also my OS is x64 which I forgot to post. That would mean x64 IE11 is running.
  5. https://www.bankofamerica.com module: 1120 dated 1/10/2018 Also Paypal doesn't work. Opens outside of OPP.
  6. Win 10 1709, IS 11.0.159 My bank web site is no longer opening under OPP from normal browser mode. Browser is IE11. Perhaps latest Win Updates borked something?
  7. @Marcos you have mentioned the sandbox ref. a couple of times. Are you referring to AppContainer which is the only sandboxing I know that both IE and Edge use? I use IE11 with EPM enabled which auto forces AppContainer as noted below: Eset OPP works just fine with AppContainer enabled for IE11.
  8. I am going to duplicate a posting below I made on wilderssecutity.com that I believe will "demystify" a lot in regards to Meltdown and Spectre vulnerabilities. I will then make some additional recommendations on how you can protect yourself against Spectre vulnerabilities. The following from SANS pretty much sums up the Meltdown and Spectre vulnerabilities. Since Meltdown attacks the OS kernel, I would say that it is the worst of the two: Here's is the full SANS article on the subject which is definitely worth a read: http:// https://www.renditioninfosec.com/files/Rendition_Infosec_Meltdown_and_Spectre.pdf As far as browser mitigations go, besides apply the software patches, is the following. I find it ironic that a protection mechanism, i.e. sandboxing, is what is being exploited : As far as Meltdown is concerned, OS update patches will mitigate it. Additionally, AMD processors are not vulnerable to Meltdown. Sprectre is a different matter altogether. Both OS and application update patches need to be applied. Additionally, BIOS firmware updates need to applied. Furthermore, a number of security expects have outright stated until new CPU processors are introduced into the marketplace, this vulnerability will not be fully mitigated. Again, refer to the above SANS chart. What is currently most vulnerable to Spectre attacks - browsers. For those that have not read the above linked SANS article is one important point to note: Next refer to what I underlined in the above first quote box.There is current one browser, IE11, that can be configured to do just that. When a new tab is opened in IE11, a new child process of itself is spawned in effect isolating its allocated memory from other currently running tabbed instances. Another browser option is to use Chrome configured for strict site isolation in the web browser. Finally, Edge might be able to be configured similar to that stated for IE11 although I have tested it yet.
  9. Internet browsing lag

    At least this is an app that lived up to its name.
  10. I also have suggested at the minimum to create an option to allow default Win firewall outbound rules and alert for any other outbound traffic. This would get around the problem many have in creating outbound rules for Win 10 Microsoft package apps.
  11. Works fine for me. What was strange is I received an UAC alert for elevated privileges with the HIPS rule in place whereas none is ever triggered by normal desktop item deletion running as a limited admin:
  12. Internet browsing lag

    I second this. I just accessed Gmail web page in IE11 and it loaded instantly.
  13. ESET and Thunderbird

    Only issue I have had recently in regards to T-Bird and Eset is it is not removing its prior Windows root CA store certificate:
  14. ESET vs Ransomware

    Maybe this will "put to bed" the notion that Eset lacks behavior detection capability in regards to ransomware detection. The latest Malware Research Group AV lab 360 test which is a realtime capability test using the most recent malware samples is here: https://www.mrg-effitas.com/wp-content/uploads/2017/12/MRG_Effitas_360_Assessment_2017_Q3-1.pdf . Of the samples used, 50 were ransomware as noted below: Of the 50 ransomware samples tested, 49 were detected by Eset prior to execution. However, one sample was detected by behavior means. So Eset does indeed have protection mechanisms in place to prevent ransomware like activities post-execution. However as previously noted if one decides to arbitrarily and selective disable Eset protection mechanisms; state that the product can't detect a local run malware sample; then frankly, the tester doesn't know what he is doing and any conclusions drawn as to Eset's effectiveness are erroneous.
  15. ESET vs Ransomware

    Personally, I think responding to bypasses like this is a waste of time. It is obvious that the posters don't want to take the time to understand that Eset's protections are proactive - not reactive - and are designed to keep ransomware from running on a device in the first place.