Thank you for that, it too helped to understand the situation better. I did want to clarify something I wrote: Here's a simple example of what...
Thanks, that gave me a better idea of how security is set up in large organizations. :thumb:
This is intriguing. If you have discussed this idea before, I'd love to read more about it: on some forums, people would freak out to read a...
The best point in a post full of good points! (To be clear: I'm not being argumentative in what follows, just shocked and curious to learn more....
In episode 1043 of Steve Gibson and Leo Laporte's "Security Now," I was startled from my comfortable listening by the following statement by...
That FindMySoft review is quite thorough, very well done. In combination with the post just above by @Darren Williams, I have learned more about...
That was a useful and informative article, thank you. :thumb: This article, which is linked to on that page, was also highly informative.
I'm not @RonnyT ;) but the following section from your second link above raised a question or two: I can't comment on the first item on that...
OK, here's some additional information that may shed light on what BlackFog is and how it works: https://www.blackfog.com/faq/
Just finished reading that post and I agree: it's not clear at what point in the process the attack was blocked or how successful it was. One...
LOL
Can you elaborate on why you think it's not as advanced as it may seem? My own take on BlackFog is that their website doesn't seem to explain a...
Yes, there is a ton of information that we don't know. At these testing services, I'd love to be a fly on the wall (a hacker inside their...
Back when HMP.A was independent, sometimes the Lomans would come into WSF to show their product in action stopping an attack. Thanks for the new...
I did check out those links, thanks. :thumb: They were very informative, and I understand much more now about how these attacks operate and how...
Interesting, thanks. Would it then be fair to say that, in terms of protecting a computer, having effective defensive processes is more important...
Thanks for these links. I have MBAE on a couple of systems and have no complaints. It seems to run quietly in the background. Then again, I...
From that Hacker News article: If they had attacked my machine and then decided that it wasn't "valuable enough to conduct further...
Yes, the screenshot is indeed for the original, anti-spyware Windows Defender that came preinstalled on Windows 7. I never had MSE on that...
By chance, last night I decided to run a full scan on one of my Windows 7 machines with Windows Defender. (Note that this is the old-style Windows...
+1, I too would love to know what the threat was and which layer of defenses stopped it. It would add a data point to the observations.
That's been my experience too. I used Vista for my main PC until 2021 (protected by Norton 360, HMP.A, uBO, and frequent running of on-demand...
When you say "isolate," do you mean 1) sneakernet, 2) sandboxing, 3) VMs, or 4) something else?
Thanks, this jibes with my own impression. If you're a high-value target, you're going to need greater protection, while the rest of us aren't...
Thank you, this is good to know. Clear description by Palo Alto Networks, too. It does bring up a new question: If AVs + specialized tools offer...
Separate names with a comma.