-
Recent Posts
Recent Comments
Archives
Categories
- (ISC)2
- AMTSO
- articles
- Aryeh Goretsky
- AVAR
- AVIEN
- BCS Institute
- CFET
- ChainMailCheck
- Computer Weekly
- conference papers
- Dan Raywood
- David Harley
- EICAR
- Elsevier
- ESET
- eWeek
- Hakin9
- inaudit.com
- Infosecurity Magazine
- Internet Evolution
- Interviews
- IT Pro
- Kevin Townsend
- Mac Virus
- Naked Security
- Network Security
- Professional Security
- SC Magazine
- Securiteam
- Small Blue-Green World
- Sophos
- Spamfighter
- Sys-Con Media
- The Times
- Uncategorized
- VB Conference Papers
- Virus Bulletin
- Virus Bulletin articles
- Wall Street Journal
- white paper
- Words & Music
- ZDNet
Meta
Category Archives: EICAR
Virus Bulletin article, June 2010
An article from Virus Bulletin, June 2010, that looks at the controversy around anti-malware products and product testing at the 2010 iAWACS/ESIEA/EICAR events. David Harley, Pwn2kill, EICAR, and AV: Scientific and Pragmatic Research, June 2010, Virus Bulletin. Copyright is held by … Continue reading
Posted in AMTSO, David Harley, EICAR, Virus Bulletin, Virus Bulletin articles
Tagged anti-malware testing, EICAR, ESIEA, iAWACS, pwn2kill
Leave a comment
EICAR Paper (11): PIN Holes: Numeric Passcodes and Mnemonic Strategies
This is the second paper I presented at the EICAR 2012 conference in Lisbon. As before, It’s posted here rather than on the ESET resources page for conference papers in accordance with EICAR’s copyright stipulation that EICAR conference papers be posted … Continue reading
Posted in conference papers, David Harley, EICAR
Tagged Amitay, entropy, mnemonic strategy, passcode, passphrase, password, PIN, Rasmussen, rote learning, Rudmin
Leave a comment
EICAR Paper (10): After AMTSO: a funny thing happened on the way to the forum
This is one of two papers I presented at the 2012 EICAR conference in Lisbon. After AMTSO: a funny thing happened on the way to the forum Here’s the abstract: Imagine a world where security product testing is really, really useful. Testers … Continue reading
Posted in AMTSO, conference papers, David Harley, EICAR
Tagged Anti-malware product testing, detection testing
Leave a comment
EICAR paper (9): Security Software & Rogue Economics: New Technology or New Marketing?
This is a paper I presented in 2011 at the EICAR conference in Krems, Austria, on “Security Software & Rogue Economics: New Technology or New Marketing?” Here’s the abstract: A highlight of the 2009 Virus Bulletin Conference was a panel … Continue reading
Posted in conference papers, David Harley, EICAR, ESET, Virus Bulletin
Tagged AV marketing, fake AV, FUD, scareware
Leave a comment
EICAR paper (8): Real Performance
This is a paper called “Real Performance?” written by Ján Vrabec and myself and presented at the 2010 EICAR Conference in Paris, available by kind permission of EICAR. Abstract: The methodology and categories used in performance testing of anti-malware products and their … Continue reading
Posted in AMTSO, conference papers, David Harley, EICAR
Tagged anti-malware, benchmarking, detection testing, performance testing, product testing
Leave a comment
EICAR Paper (7): Perception, Security and Worms in the Apple
This paper on Apple security was written and presented at EICAR 2010 with Pierre-Marc Bureau, a friend and colleague at ESET, and Andrew Lee, then with K7 Computing but also a long-time friend and colleague and now CEO of ESET North America. … Continue reading
Posted in conference papers, David Harley, EICAR
Tagged Apple, iOS, jailbreaking, OS X, rogue AV, rootkits
Leave a comment
EICAR Paper (6)Execution Context in Anti-Malware Testing
This is my 2009 EICAR paper, presented by Randy Abrams and myself on behalf of ESET in Berlin. Abstract Anti-malware testing methodology remains a contentious area because many testers are insufficiently aware of the complexities of malware and anti-malware technology. … Continue reading
EICAR paper (5): Spam, Malware, Deception and Impersonation: a Taxonomical Approach
This is my paper from the 2004 EICAR conference: Spam, Malware Deception and Impersonation: a Taxonomical Approach And here’s the abstract. Email, the World Wide Web notwithstanding, may have been the “killer application” of recent years. It’s an excellent … Continue reading
Posted in conference papers, David Harley, EICAR
Tagged chain letters, email, email management, fraud, mail abuse, mail bombing
Leave a comment
EICAR Paper (4) Man, Myth, Memetics and Malware
This is my other paper from EICAR 2002, co-written with Urs Gattiker (co-author with myself and Robert Slade of Viruses Revealed), based on an EICAR project. Man, Myth, Memetics and Malware Here’s the abstract. Hoaxes, urban legends, spoofs, chain letters … Continue reading
Posted in conference papers, David Harley, EICAR
Tagged chain letters, hoax management, hoaxes, identification, policy, urban legends, Urs Gattiker
Leave a comment
EICAR paper (3): Back to the Future – Fresh Approaches to Malware Management
One of my papers for EICAR 2002, co-written with ESET CEO Andrew Lee, though at that time he was working for Dorset County Council and I was working for the NHS Information Authority. Back to the Future – Fresh Approaches … Continue reading
Posted in conference papers, David Harley, EICAR, ESET
Tagged Andrew Lee, malware management, system management, system security
Leave a comment