Skip to main content

All Questions

Tagged with
0 votes
0 answers
68 views

Is using a different subnet on a downstream router enough to isolate a network client?

Say I have a network host that's potentially infected with malware capable of reaching out to fellow network hosts (possibly able to crack SMB passwords) and replicate itself to other hosts. Is this ...
autobottodoggo's user avatar
0 votes
0 answers
299 views

Is there a comprehensive list of devices affected by KV botnet malware infections?

According to this January 31, 2024 article in Ars Technica: Chinese malware removed from SOHO routers after FBI issues covert commands Routers were being used to conceal attacks on critical ...
Giacomo1968's user avatar
1 vote
0 answers
109 views

Is it safer to use a VM and VPN for working with other people's python scripts or executables?

I want to start taking freelancing jobs doing python programming, but I am new to working for others. I want to do everything I can to avoid scams and having my computer infected with malware. I know ...
Scarlett's user avatar
0 votes
1 answer
51 views

When AV software puts files and various malicious "objects" in "quarantine", what exactly do they actually do?

I had malware on a computer, which Malwarebytes managed to remove. Or did it? It rather "put it in quarantine". And it's remained like that. I see no way to actually delete it. This appears ...
C. Naslund's user avatar
0 votes
1 answer
814 views

How is it possible to be infected by a Trojan without downloading anything suspicious?

After conducting a full scan on my Fujitsu Windows 10 laptop yesterday (Nov. 01, 2022), I got informed of this threat: Trojan:HTML/CryptoExtortBTC.A, with the detail "This program is dangerous ...
Aqqqq's user avatar
  • 181
1 vote
2 answers
5k views

How do you find what program is installing third-party Chrome extensions?

When I added a new profile to my Chrome installation I get the alert message in the top-right New extension added (Web Safety) Clicking on the alert message opens a message saying that another ...
bigLarry's user avatar
  • 751
2 votes
0 answers
305 views

Mysterious hidden files in C:\Windows -- are they malicious?

A few months ago, I noticed two strange hidden files in C:\Windows. They had seemingly random alphanumeric names, no file extensions, and seemingly random binary content. I didn't think much of it at ...
MGuy's user avatar
  • 21
-1 votes
1 answer
265 views

Malicious process detected on Powershell while working on my React Native project, what should I do?

My Rav Antivirus showed me this message while working on my React Native project. What does it mean and what should I do?? I was working on my college project and i'm not familiar with security and ...
Cli Ad's user avatar
  • 23
0 votes
0 answers
94 views

Can Ransomware migrate from an infected PC to uninfected Linux computers on a network?

My roommate's company was recently hit by a comprehensive Ransomware attack and she has been working from home via our home network. All the other computers in our house other than her work machine ...
confused's user avatar
  • 171
1 vote
1 answer
213 views

Should I do anything after formatting my computer because of malware infection?

Yesterday I realised that, after installing some software last weekend, Microsoft Defender was detecting several file on my Windows 10 document's temp folder. Some of them were deleted by the ...
user1314836's user avatar
1 vote
2 answers
118 views

I clicked on a link which turned out to be a malicious advert. Should I format my computer?

I accidentally visited a sketchy website and clicked on a link which I think was a malicious advert. After that I think the site tried to download something on my computer but my antivirus blocked two ...
Mateo Miatas's user avatar
0 votes
1 answer
115 views

Store computer/admin password in the password manager

I have two accounts on my Mac: a standard user account for everyday activities and an administrator account. I always use the standard user account. I have a password manager (1Password) installed on ...
Nick's user avatar
  • 15
1 vote
2 answers
2k views

Can keylogger record the admin password on macOS

I have two accounts on my Mac: a standard user account for everyday activities and an administrator account. When I need to do something that requires the admin rights like changing something in the ...
Nick's user avatar
  • 15
4 votes
1 answer
258 views

How do tech support scams work in windows? Is it malware, phishing, or how else would threats gain access to computers?

I'm currently working for Geek Squad at Best Buy in the front of the operation checking in client computers and I am frequently encountering bogus tech support scams which involves copious amounts of ...
Henry A's user avatar
  • 49
0 votes
1 answer
83 views

Connect old, possibly unsafe HDD to Windows 10 PC

I have an old HDD from my former laptop which I've been using until around 2013. Now, after 7 years, I want to connect it to my HDD (with a SATA - USB adapter). I worry a bit about malware on said HDD ...
LWun's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
10