How do you perform on a test that explores whether you're vulnerable to viruses from known malicious sites?

How are we testing?:

This test downloads a benign file containing an EICAR virus test file from the official EICAR site. Most network defenses should easily block the download either by scanning the file and detecting the test pattern or by blocking the destination based on reputation.


Why is this test important?:

This is one of the most basic test we perform. It check for the existence of the most basic threat prevention tools.


Take our security preview now

Can you access and download known test virus file?

Viruses can be blocked by either scanning the content or checking the reputation of the destination, and with the best defenses – combining the two for defense in layers. While advanced malware analysis techniques are needed to defeat advanced threats, these simple defenses can be used against mass market threats.

In the News:

Ukraine scrambles to contain new cyber threat after 'NotPetya' attack - Reuters

05 Jul 2017
KIEV (Reuters) - The Ukrainian software firm used to launch last week's global cyber attack warned on Wednesday that all computers sharing a network with its infected accounting software had been compromised by hackers. The attack used a virus, dubbed ...

Cyber attacks hit Israeli hospitals as globe battles new computer ... - The Jerusalem Post

29 Jun 2017
The affected hospitals are said to be routinely functioning now following the cyber attack; news comes as new virus wreak havoc on the globe.

Cyberattack Hits Ukraine Then Spreads Internationally - New York Times

28 Jun 2017
Reports that the computer virus was a variant of Petya suggest the attackers will be hard to trace. Petya was for sale on the so-called dark web, where its creators made the ransomware available as “ransomware as a service” — a play on Silicon Valley ...

More »

LEADERS SELECT LEADERS