GZ Visiting Expert Joined Apr 8, 2012 Posts 1,302 Location New Jersey Jul 11, 2012 #1 I was just hit by a redirect... I was not fooled by it for two reasons... One, I am at work and we use Endpoint... Two, it didn't act like MSE. Either way, it is convincing enough that many people would be fooled into infecting their computers. I was browsing images with Google when I clicked on one of the photos, that is when the redirect hit. Just a heads up. I doubt it is new, but hey... Who knows. This is the first time I have seen it.
I was just hit by a redirect... I was not fooled by it for two reasons... One, I am at work and we use Endpoint... Two, it didn't act like MSE. Either way, it is convincing enough that many people would be fooled into infecting their computers. I was browsing images with Google when I clicked on one of the photos, that is when the redirect hit. Just a heads up. I doubt it is new, but hey... Who knows. This is the first time I have seen it.
Corrine Administrator, Microsoft MVP, Security Analyst Staff member Joined Feb 22, 2012 Posts 12,294 Location Upstate, NY Jul 11, 2012 #2 That is the way the rogues operate. Please note, however, that clicking the OK or X to close is the same as giving approval to install. The only way to avoid that is via Task Manager or the keyboard combination ALT+F4. There are times when it is necessary to repeat ALT+F4 to close all of the windows.
That is the way the rogues operate. Please note, however, that clicking the OK or X to close is the same as giving approval to install. The only way to avoid that is via Task Manager or the keyboard combination ALT+F4. There are times when it is necessary to repeat ALT+F4 to close all of the windows.
GZ Visiting Expert Joined Apr 8, 2012 Posts 1,302 Location New Jersey Jul 11, 2012 #3 Don't worry... I'm all good here... I used Task Manager to kill iexplore.exe then ran Endpoint to be sure. I uploaded the photo... Perhaps one of us can use it in a "How to identify Rogues" type article.
Don't worry... I'm all good here... I used Task Manager to kill iexplore.exe then ran Endpoint to be sure. I uploaded the photo... Perhaps one of us can use it in a "How to identify Rogues" type article.
Cayden Member Joined Jul 25, 2012 Posts 198 Location Toronto Jul 26, 2012 #4 Yes recognizing spoof software is very important, but difficult for the vast majority and unfortunately they're only likely to read our help after the damage is done. It's a two-pronged issue as recognizing and dealing with rogue software are fairly different approaches.
Yes recognizing spoof software is very important, but difficult for the vast majority and unfortunately they're only likely to read our help after the damage is done. It's a two-pronged issue as recognizing and dealing with rogue software are fairly different approaches.
jcgriff2 Co-Founder / AdminBSOD Instructor/ExpertMicrosoft MVP (Ret.) Staff member Joined Feb 19, 2012 Posts 21,541 Location New Jersey Shore Jul 27, 2012 #5 SysInternals Process Explorer - very useful. Like Task Manager on steroids http://technet.microsoft.com/en-us/sysinternals/bb896653
SysInternals Process Explorer - very useful. Like Task Manager on steroids http://technet.microsoft.com/en-us/sysinternals/bb896653
Cayden Member Joined Jul 25, 2012 Posts 198 Location Toronto Jul 27, 2012 #6 If only it came standard.
jcgriff2 Co-Founder / AdminBSOD Instructor/ExpertMicrosoft MVP (Ret.) Staff member Joined Feb 19, 2012 Posts 21,541 Location New Jersey Shore Jul 27, 2012 #7 ProcExp was written & is maintained by Mark Russinovich, Microsoft TechNet.
Cayden Member Joined Jul 25, 2012 Posts 198 Location Toronto Jul 27, 2012 #8 But our friend Mark Russinovich has not made it standard in Windows operating systems, instead of the task manager that we have now, which is what I was trying to say.
But our friend Mark Russinovich has not made it standard in Windows operating systems, instead of the task manager that we have now, which is what I was trying to say.