www.amtso.org Open in urlscan Pro
160.153.0.9  Public Scan

URL: https://www.amtso.org/feature-settings-check-drive-by-download/
Submission: On May 08 via api from BR — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.amtso.org

<form class="elementor-search-form" action="https://www.amtso.org" method="get">
  <div class="elementor-search-form__toggle" tabindex="0" role="button">
    <i aria-hidden="true" class="fas fa-search"></i> <span class="elementor-screen-only">Search</span>
  </div>
  <div class="elementor-search-form__container">
    <label class="elementor-screen-only" for="elementor-search-form-1a36448">Search</label>
    <input id="elementor-search-form-1a36448" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
    <div class="dialog-lightbox-close-button dialog-close-button" role="button" tabindex="0">
      <i aria-hidden="true" class="eicon-close"></i> <span class="elementor-screen-only">Close this search box.</span>
    </div>
  </div>
</form>

GET https://www.amtso.org

<form class="elementor-search-form" action="https://www.amtso.org" method="get">
  <div class="elementor-search-form__toggle" tabindex="0" role="button">
    <i aria-hidden="true" class="fas fa-search"></i> <span class="elementor-screen-only">Search</span>
  </div>
  <div class="elementor-search-form__container">
    <label class="elementor-screen-only" for="elementor-search-form-7a08f19">Search</label>
    <input id="elementor-search-form-7a08f19" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
    <div class="dialog-lightbox-close-button dialog-close-button" role="button" tabindex="0">
      <i aria-hidden="true" class="eicon-close"></i> <span class="elementor-screen-only">Close this search box.</span>
    </div>
  </div>
</form>

Text Content

Skip to content
 * AMTSO Standard
   * Overview
   * Change Requests
   * Contact List
 * Tests
 * Resources
   * Free tools
   * Documents
   * Threat Intel
     * ThreatList
     * RTTL
 * News
 * Events
 * About us
   * About AMTSO
   * Members
   * Join AMTSO
   * Contact us

Menu
 * AMTSO Standard
   * Overview
   * Change Requests
   * Contact List
 * Tests
 * Resources
   * Free tools
   * Documents
   * Threat Intel
     * ThreatList
     * RTTL
 * News
 * Events
 * About us
   * About AMTSO
   * Members
   * Join AMTSO
   * Contact us

Search
Search
Close this search box.

CONTACT AMTSO
 * AMTSO Standard
   * Overview
   * Change Requests
   * Contact List
 * Tests
 * Resources
   * Free tools
   * Documents
   * Threat Intel
     * ThreatList
     * RTTL
 * News
 * Events
 * About us
   * About AMTSO
   * Members
   * Join AMTSO
   * Contact us

Menu
 * AMTSO Standard
   * Overview
   * Change Requests
   * Contact List
 * Tests
 * Resources
   * Free tools
   * Documents
   * Threat Intel
     * ThreatList
     * RTTL
 * News
 * Events
 * About us
   * About AMTSO
   * Members
   * Join AMTSO
   * Contact us

Search
Search
Close this search box.

 * Verify if your desktop security software detects drive-by downloads of
   malware

As soon as this page is accessed by a browser, a simulated “drive-by download”
is initiated – the EICAR test file (called “eicar.com”) should start
downloading.

If you are able to download this 68 byte file successfully, your anti-malware
solution is NOT configured correctly or DOES NOT conform with industry best
practice. The EICAR test file was developed by the European Institute for
Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization
(CARO) to test the response of computer antivirus programs. Instead of using
real malware, which could cause real damage, this test file allows people to
test anti-virus software without having to use a real malware sample. So, this
file is NOT actually malicious, but by industry-wide agreement this file is
detected as malicious by mainstream products with antivirus functionality so
that people can verify that their anti-malware product’s detection capability is
configured correctly.

 * Not sure if your product should support this feature?

Please contact your vendor’s support department for instructions explaining how
to enable the feature in your product.

 * Verify if your desktop security software


DETECTS MANUALLY DOWNLOADED MALWARE




DETECTS POTENTIALLY UNWANTED APPLICATIONS (PUAS)




DETECTS PHISHING PAGES


DETECTS COMPRESSED MALWARE


IS CONNECTED TO A CLOUD-BASED LOOKUP SYSTEM





AMTSO STANDARD

 * Overview
 * Change requests
 * Contact list
 * Documents

ABOUT US

 * About AMTSO
 * Members
 * Join AMTSO
 * Contact us

 * Tests
 * Free tools
 * News
 * Events

 * Member site



Privacy Policy / Terms of Use

2024 © AMTSO®

AMTSO STANDARD

 * Overview
 * Change requests
 * Contact list
 * Documents

ABOUT US

 * About AMTSO
 * Members
 * Join AMTSO
 * Contact us

 * Tests
 * Free tools
 * News
 * Events

 * Member site


Privacy Policy / Terms of Use
2024 © AMTSO®
amtso.org


We believe your data is your property and support your right to privacy and
transparency.
Select a Data Access Level and Duration to choose how we use and share your
data.
Reject AllAccept SomeAccept All
1 month6 months12 months

Highest level of privacy. Data accessed for necessary basic operations only.
Data shared with 3rd parties to ensure the site is secure and works on your
device

Balanced experience. Data accessed for content personalisation and site
optimisation. Data shared with 3rd parties may be used to track you and store
your preferences for this site.

Highest level of personalisation. Data accessed to make ads and media more
relevant. Data shared with 3rd parties may be use to track you on this site and
other sites you visit.

Consent Preferences
Use the toggles below to specify your data sharing purposes for this website.
Basic Operations
This type of sharing is necessary for us to access the data we need to make sure
the website is secure and working properly.
Data Accessed:
 * Anonymous data like browser name and version
 * Pseudonymous data like authentication token

Content Personalization
When enabled, you allow us to save your preferences and create a profile about
you so we can deliver personalized content.
Data Accessed:
 * Anonymous data like device type, model and operating system
 * Pseudonymous data like site browsing preferences
 * Personal data like your IP address and location

Site Optimization
When enabled, you allow us to monitor your behavior so we can analyze and
improve the services on our website for all visitors.
Data Accessed:
 * Anonymous data like the address of the previously visited website (HTTP
   Referer)
 * Pseudonymous data like website activity identifiers
 * Personal data like content, search and purchase history

Ad Personalization
When enabled, you allow us access to share data with our advertising partners
that build profiles about you across multiple websites.
Data Accessed:
 * Anonymous data like affiliate referral links
 * Pseudonymous data like identifiers used to track and profile users
 * Personal data like your age, gender and demographics

Protection & Metrics
View your consent record, and the list of 3rd parties blocked and allowed based
on your settings.
Consent Metrics

Consent ID—Date of Consent—Data Access Level—Purpose Categories—Duration of
Consent—

Privacy Protection
Services Blocked
 * —

Services Allowed
 * Google Fonts

Save my preferences
 * Customize

 * Privacy policy