Jump to content

Search the Community

Showing results for 'firefox'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ESET General Forums
    • ESET Announcements
    • General Discussion
    • Forum FAQ's and Rules
    • Submit a virus, website or potential false positive sample to the ESET lab
  • ESET Home User Products
    • ESET Internet Security & ESET Smart Security Premium
    • ESET NOD32 Antivirus
    • ESET Cyber Security (for Mac)
    • ESET Cyber Security Pro (for Mac)
    • ESET NOD32 Antivirus for Linux Desktop
    • ESET Products for Mobile Devices
    • Web portals
  • Malware Detection and Cleaning
    • Malware Finding and Cleaning
    • ESET Standalone Malware Removal Tools
  • ESET Business User Products
    • ESET Endpoint Products
    • ESET Products for Windows Servers
    • ESET Products for Linux Servers
    • ESET Products for Mobile Devices
    • Remote Management
    • ESET Enterprise Inspector (EDR)
    • ESET Products for Virtualized Environments
    • Encryption
    • ESET Licensing for Business
  • ESET Beta Products
    • ESET Beta Products for Home Users
    • ESET Beta Products for Business Users
  • Slovak and Czech forums
    • ESET NOD32 Antivirus, ESET Internet Security a ESET Smart Security Premium
    • Produkty pre mobilné zariadenia
    • Vírusy a iné hrozby
    • Ostatné

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Interests

Found 103 results

  1. I know I have turned off cache on my firefox on my computer, i will re enable it
  2. the same situation here (crying icon; on win7 x64, using chrome or Firefox) Using an IE11 (win7) i did successful login. then i did logout and retried login using firefox. got crying image... then did try login using IE - got the same situation (crying). something very strange is going on . it do not seems to be tightly related to the browser i'm sure, that login using IE to eset site was the first usage of this address on IE. But the second try didn't work... BR, Albinas
  3. I'd like to block https://www.youtube.com/. In URL ADDRESS MANAGEMENT, I add a record *.youtube.com. I've tried IE/Firefox/Vivaldi, https://www.youtube.com/ been blocked. But if I use Chrome to browse https://www.youtube.com/, EEA don't block it. If I block others domain, for example: *.facebook.com, then https://www.facebook.com/ been blocked in IE/Firefox/Vivaldi/Chrome. EEA version: 7.2.2055 How can block YouTube form Chrome?
  4. I am running Ubuntu Desktop 19.10 (GNOME 3.34.2) and am having a strange problem with NOD32 4.0.90.0 (64-bit). I have a Firefox (73.0.1) window open to YouTube TV (streaming a TV program) and after a while (~5 minutes), other Firefox windows will stop browsing. The windows/tabs open just fine but won’t display any content nor can I access any URL. It doesn’t matter if I disable the ESET protection or not, the behavior is still the same. However, if I remove NOD32, everything works OK. I’ve tested this multiple times by reinstalling NOD32, and each time the problem returns until I uninstall it. This is a fresh build of Ubuntu 19.10 but I’ve also found this same behavior in Ubuntu 18.04.
  5. I finally found a web reference to this Omnisoft fake FireFox garbage. Per this MalwareByte forum posting thread: https://forums.malwarebytes.com/topic/238865-mozilla-pops-up-with-pon-contents-whenever-i-boot-my-pc/?tab=comments#comment-1279613 . Initially it appeared that this might be a rootkit and Kaspersky's TDSS Killer: https://usa.kaspersky.com/downloads/tdsskiller got rid of it. However as the OP posted, looks like the bugger reinfected the installation somehow. This might have been via the previously noted startup entry the malware created. Do as @Nightowl suggested. Run a Custom scan ensuring all drives, folders, files, and networks are selected. Make sure the scan is run as Administrator by clicking on like named button. This should at least let us know if a rootkit is present or the MBR is infected.
  6. But I uninstalled firefox and this remained, as I started the pc this program started opening pages in the malicious firefox.
  7. Something just occurred to me. This Omnisoft stuff might be related to some extension or the like you installed directly or inadvertently in FireFox. Perhaps something by Mozilla itself. This would at least explain the signed cert. by Mozilla for update.exe.
  8. This C:\program files x(86)\common files\omnisoft\update.exe obviously has nothing to do with FireFox. It's update program is located in its specific C:\program files x(86) or C:\program files directory. For this reason alone, I say the program has nefarious purposes. Software located in C:\program files x(86)\common files directory get there usually as a result of something you downloaded and was placed there via installer method. It could also be adware that that was embedded or possibly even a coin miner since you state it is using a lot of system resources. The first place to check is Windows installed programs via Control Manager for anything that you don't recollect manually installing. I would start by creating an Eset firewall rule to block any outbound traffic from C:\program files x(86)\common files\omnisoft\update.exe. Make sure you enable event alert and log entry creation. When the alert occurs copy the Eset Network protection log entries related to the outbound traffic and post them in a forum reply. This will give us an idea of the server IP addresses the bugger is trying to connect to.
  9. Firefox updater is located in C:\Program Files\Mozilla Firefox and it's called updater not update.exe This file is malicious , and it's suspicious Upload it to one of these : https://www.virustotal.com/gui/home/upload https://www.hybrid-analysis.com/ https://app.any.run/submissions/
  10. At the beginning when the computer was turned on the program was automatically executed, the program uses many resources and can even crash the computer. I managed to disable its execution at startup, and after making an analisys the ESET antivirus did not detected the malware. So, I know the location of the executable "C:\Program Files (x86)\Common Files\OmniSoft" but I don't see how to uninstall this program, It is not at the contoll panel. having access to the location of the program folder, how can I uninstall it?
  11. I can confirm this too, tested with Edge-Chromium latest (v80.0.361.57) and Firefox latest (v73.0.1). With Google Chrome latest (v80.0.3987.122) I get the ESET PUA Alert. (Win10 x64 1909, EIS 13.0.24.0)
  12. I'd suggest opening a support ticket with your local ESET distributor since the cause of the issue discussed in this topic was fixed by Mozilla in Firefox 73.0.1.
  13. A few final comments: 1. Never ever install a browser extension/add-on from a web site request. Always install the extension from the Store associated with that particular browser. 2. Never ever absolutely assume that a browser Store extension/add-on is 100% safe. Google notoriously and Firefox to a lesser extent do not test their Store extensions for malware prior to being placed in the Store. Apps are usually removed only after someone has discovered one is malicious or potentially unwanted status. 3. Configure your browser such that extensions/add-on's are not automatically added. In other words, you must manually allow the request. 4. AV solutions are as a rule are quite poor in detecting browser extension/add-on malware. This is because the app is not a stand-alone executable but running as a processing extension to the browser.
  14. Thanks for the info will look into it. Used to use firefox years ago but started having problems but think it was the PC I had at the time being too old. I've user chrome ever since and I do like how it syncs with android devices. However being Google theres always the concern of what they are collecting. I do have the new chromium based edge to but haven't really used it. I have also heard good things from Opera which even has a built in VPN
  15. If your primary concern is browser privacy, you are best served using a browser that is designed for privacy such as FireFox. "Out-of-box:" i.e. w/o adding any extensions, it offers a number of privacy protections such as: Adding the uBlock Origin extension will only strengthen FireFox's native privacy protections. uBO by default uses multiple tracking protection and malware block lists with AdBlock's TPLs being one of them. I have also added Nano Defender to uBO which is an anti anti-adbocker. Web sites are increasingly using anti-adblockers to get around browser adblocking protection. Adding Nano Defender to uBO in FireFox is a "bit tricky" though. The final FireFox extension I use is Decentraleyes which does: Finally, note that Chrome is built for security; not privacy. Being a Google based product, I believe that is self-evident.
  16. Below is an example of how DNS monitoring is always present by your ISP. Now it is possible that Firefox DoH - Cloudflare servers fell back to DoT:
  17. We didn't find any issue with our code. In fact, reading the changelog for Firefox 73.0.1 showed that they fixed a couple of bugs some of which caused issues with BPP as well.
  18. I did find a workaround in FireFox though. Right mouse click on Google search result link. Then select either Open Link in New Tab or Window will produce the Eset PUA alert. Really not a practical solution.
  19. Yep Fixed my system too. Although to be fair I have not retested ESET with Firefox v73.0 t see it ESET have fixed it at their end.
  20. @itman I can confirm all your findings. Tested on Edge-Chromium, Firefox and Internet Explorer.
  21. Win 10 x(64) 1909, FireFox 73.0.1, Eset IS 13.0.24 Eset is not throwing an alert for blocked Google search list results. Mouse clicking on the URL results in no visual clue the connection was blocked. Nor does the current displayed screen with existing search results change in any way. The block is logged in the event log however. For example: However if I try to access hxxps://www.pcrisk.com from the FireFox address bar, the Eset PUA alert displays:
  22. Actually, my previous comments about Firefox had nothing to do with the Eset forum. Again, I was getting random ones infrequently until I enabled DoH. Another behavior I have seen in regards to uBlock Origin and Firefox is how some search list connections are silently blocked, whereas others will show a block alert from the applicable TPL. For example when using the Google displayed search results list, I can click on a URL and nothing happens. UBlock just silently blocks the connection attempt. No failed connection display, etc.. -EDIT- Appears the above blocking is not being done by uBlock Origin after all. The blocking is being done by Eset PUA blacklist. But no alert is being displayed if its a Google search it URL: Whereas if I try to access hxxps://www.pcrisk.com via Firefox address bar, I will receive an Eset PUA alert. Looks like a bug. Will open a new thread for it.
  23. Yes it seems that you get redirected to another servers while surfing this forum , you get redirected to some other servers owned by Invision , which can be blocked for some reasons , Firefox sometimes block it with BAD SIGNATURE error , and also the Fortinet
  24. Another interesting observation. My boot drive crashed two weekends ago. My image backup restored OK but boot rec was corrupted and could not restore it using multiple attempts with various options. So I decided it was time to do a fresh Win 10 1909 install. BTW - glad I did; things work now that never did in my previous Win 7 upgraded installation. Anyway, I installed FireFox fresh. Set up uBlock Origin immediately. Thereafter, I started getting strange occasional redirects that never happened with my old FireFox installation. Checking out FireFox settings, DoH was not enabled. Strange since I thought that was done now by default. Enabled DoH w/Cloudfare servers and haven't had one of those redirects since. I can only conclude that this activity had to be originating from my ISP DNS servers.
×
×
  • Create New...