www.eicar.org Open in urlscan Pro
89.238.73.97  Public Scan

Submitted URL: http://eicar.com/
Effective URL: https://www.eicar.org/
Submission: On December 05 via manual from RU — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

 * Increase TextIncrease Text
 * Decrease TextDecrease Text
 * GrayscaleGrayscale
 * High ContrastHigh Contrast
 * Negative ContrastNegative Contrast
 * Light BackgroundLight Background
 * Links UnderlineLinks Underline
 * Readable FontReadable Font
 * Reset Reset

 * Contact

+49 8194 99 84 99
 * Eicar
 * About
 * Team
 * News
 * Projects
 * Membership
 * Download Anti Malware Testfile
 * Search
 * Menu Menu




TRUST WORTHINESS

It s always a matter of trust and controlling




INDEPENDENT



As a non-for-profit organization, we are not affiliated with any governmental or
commercial business and thus can fully concentrate on making the world a safer
place.


Read more


DISTINCTIVE



EICAR is not your typical nonprofit, we actively want to engage in the
discussion on cybersecurity and helping companies to make safer products.


check it


CONSISTENT



Our EICAR test file helps enterprises and antivirus-manufacturers to test their
software – for more than 30 years.


Get it
Download Anti Malware Testfile


WELCOME TO EICAR



Established in 1991 as the European Institute for Computer Anti-Virus Research
(EICAR) we have a long track record in the fields of science, research,
development, implementation and management. We represent different stakeholder
groups such as Universities, recognized experts, governmental bodies and vendors
who do provide neutral and independent advice – always through the lense and
within the interest of the consumers. We are Independent, Distinctive and
Consistent.




INFOS // BROCHURES



You have questions about Cybersecurity, Cyberprivacy, Cyberrisk,
Cyberinsurances, Cyberfication and Computer Anti-Virus Research? For more
information

contact us

Downloads

 * IT Security Sec 202c StGB (PDF)
 * Spionage-Tools (PDF)
 * Wallet Stealer (PDF)
 * German Press Release to announce (PDF)
 * EICAR WG2 2018 – Deepsecurity (PDF)
 * EICAR WG2 2018 – KI-IN-ITSECURITY (PDF)
 * EICAR Criminal Relevance Security Audit (PDF)
 * EICAR_WG2_2018 – THREATS (PDF)


TEST FILE WEB SURVEY



To assess the success of the EICAR Test File, we have conducted a survey
outlining the experiences and whishes of the EICAR Test File users.

More Info

More than 500 participants from about 80 countries answered 14 fine-grained
groups of questions. The outcome will be published here. As soon as the workshop
for discussion of results and making plans for further actions is scheduled the
date will be announced.

Downloads

First presentation of Test File Survey at CARO Workshop in 2015

Main parts of the survey were presented May 12th 2015 in Hamburg at the CARO
Workshop.

 * SLIDES

 * POSTER

Workshop date for discussion of survey results and if required make plans for
next steps will be published here.


OUR TEAM OF EXPERTS



EICAR is always actively involved in various projects. We also take initiative
and lead projects that have an influence on regulations, the society as a whole
or the industry.

meet the team




ABOUT US



We would like to inspire information exchange on a global basis as well as
synergy building to enhance computer-, network- and telecommunication-security.
The members are all key players in the focused topic. The goal is to develop
best practice scenarios and guidelines with the efforts of a bundled
know-how-pool.

EICAR is supporting all kinds of initiatives in terms of technical solutions or
preventive measures against writing and proliferation of malicious code like
computer viruses or Trojan Horses, and against computer crime, fraud and the
misuse of computers or networks, inclusive malicious exploitation of personal
data.

The institute is dealing with all kind of technical,organisational, legal and
psychological aspects in the context of IT-Security. EICAR is bringing together
know-how from leading scientists and academics as well as recognized
researchers, official institutions and global players of the industry.

EICAR-Trailer at YouTube






EICAR-Trailer at YouTube







ABOUT YOU



We do provide a lot of benefits to our members. Our organizational model is
unique as it is based on voluntary contribution. However you could elaborate
various helpful outcomes that you would gain from a EICAR membership.

Membership


YOUR BENEFITS


 * Access to experts in the field of Anti-Virus and Computer Security
 * Joining of any of our Task Forces
 * Discount on all our workshops, conferences etc.
 * Significant discounts up to 1.000€ for workshops with our legal advisors
   (e.g. GDPR)
 * Advanced notice of all our workshops

 


OUR PROJECTS




EICAR is always actively involved in various projects. We also take initiative
and lead projects that have an influence on regulations, the society as a whole
or the industry. These are the four projects we are currently working on.


EICAR TRUSTWORTHINESS STRATEGY

The EICAR Trustworthiness Strategy is to enhance transparency in the
contemporary IT Security environment



EICAR WG 7 (CYBER SECURITY)

Considering the uncertainties surrounding the Cyberspace, this eicar* working
group 7 (eicarwg7) also known as “Flamingo Club” aims at uniting cyberspace
stakeholders in order to facilitate the exchange of ideas and best practices in
matters relating to ...



EICAR WG2 (ANTI VIRUS)

This is the working group of systems administrators and other security experts
of greater corporations. Group members, vendors and distributors of anti-virus
programs meet to exchange experiences in the usage of AV products ...





NEWS, EVENTS AND MORE …




What’s happening at EICAR? What’s the status of cybersecurity? Find the latest
news about Computer Anti-Virus Research here.


TRUSTWORTHINESS STRATEGY

News
The EICAR Trustworthiness Strategy is to enhance transparency in the
contemporary IT Security environment and its ever evolving threats and
vulnerabilities scenario and to enable trust into IT Security products that help
creating a safer environment.



1. June 2022
https://www.eicar.org/wp-content/uploads/2022/06/trustworthiness-strategy-13-e1654085366117.jpg
200 200 Fwk_2022
https://www.eicar.org/wp-content/uploads/2022/06/eicar_240x100-02.svg
Fwk_20222022-06-01 20:49:412022-06-06 13:04:09Trustworthiness Strategy



OUR COMPUTER ANTI-VIRUS RESEARCH PARTNERS




CODE OF CONDUCT



Viruses as well as other malicious program codes present a threat, which affect
users, developers and researchers in equal measure. Therefore the members of
EICAR feel committed to contribute actively in the fight against them. Topics
and problems in the area of computer viruses will be treated seriously and
responsibly. The recognition of the code of conduct is a requirement for
membership.

This includes:

Activities
Abstaining
Infos
Activities

Total abstinence from activities or publications, which could cause or foster
panic, i.e. no “trading on people’s fears”.

Abstaining

Abstaining from the loud and vociferous superlatives and factually untenable
statements in advertising, e.g. “all known and unknown viruses will be
recognised”.

Infos

Information which is suited for the development of viruses as well as other
malicious program code will not be published or given to a third party. Exchange
of such information with institutions, companies and persons is excepted, which
are responsibly researching or are active in combating in this sector.


GENERAL INFORMATION



In this section you can find general information about Information Security
related issues. If you have information that are from interes that are worth
publishing, please contact us.

Comments on the § 202 of the German StGB. It describes the usage of hacker-tools
and the legal issues around it.

 * EICAR papers from the Legal Advisory Board
   
   PDF-Download
   
   
   
 * BYOD Guideline
   
   PDF-Download
   
   
   
 * GDPR guideline (German) in collaboration with Rohde & Schwarz
   
   PDF-Download
   
   
   

© Copyright - EICAR 2023
 * Imprint
 * Privacy Policy
 * Constitution

Switch language English German (Deutsch)
We use cookies and other technologies.
We, EICAR – European Institute for Computer Anti-Virus Research e.V., and our
768 partners use and process your data on our internet sites. To do this, we use
methods that allow us to store and read information on your device. Some of
these methods are technically essential, others are only used with your consent.
This concerns both us and our partners, including those who are jointly
responsible for data processing with us. They are used to personalize your
website settings, generate statistics or display individual advertising. This
includes data transfer to countries outside the EU, where a different data
protection standard may be maintained.
A click on Settings gives you the opportunity to agree to individual uses and to
obtain further information about the data processing procedures.
Clicking Decline only allows the use of technically necessary processes. By
clicking Accept everything, you consent to the processing of data stored on your
terminal device, such as personal identifiers or your IP address, in accordance
with Section 25 (1) TTDSG and Art. 6 (1) lit. a GDPR. In addition, you consent
to the processing of your data by providers in the USA if this is used, in
accordance with Art. 49 (1) GDPR. In this case, your data may be further
processed by local authorities. For more information, in particular on the
duration of cookie storage and your right to revoke your consent at any time
with future effect, please see our privacy policy.
By clicking Accept everything, third party vendors are allowed to collect and
process the following in the IAB TCF system: Personalised advertising and
content, advertising and content measurement, audience research and services
development , Precise geolocation data, and identification through device
scanning, Store and/or access information on a device.
Settings Accept everything Decline
Imprint Data protection notice Third-party supplier
Powered by CCM19
Please select guidelines to be admitted
Store and/or access information on a device (629) ?
Cookies, device or similar online identifiers (e.g. login-based identifiers,
randomly assigned identifiers, network based identifiers) together with other
information (e.g. browser type and information, language, screen size, supported
technologies etc.) can be stored or read on your device to recognise it each
time it connects to an app or to a website, for one or several of the purposes
presented here.
Illustrations:
 * Most purposes explained in this notice rely on the storage or accessing of
   information from your device when you use an app or visit a website. For
   example, a vendor or publisher might need to store a cookie on your device
   during your first visit on a website, to be able to recognise your device
   during your next visits (by accessing this cookie each time).


Use limited data to select advertising (407) ?
Advertising presented to you on this service can be based on limited data, such
as the website or app you are using, your non-precise location, your device type
or which content you are (or have been) interacting with (for example, to limit
the number of times an ad is presented to you).
Illustrations:
 * A car manufacturer wants to promote its electric vehicles to environmentally
   conscious users living in the city after office hours. The advertising is
   presented on a page with related content (such as an article on climate
   change actions) after 6:30 p.m. to users whose non-precise location suggests
   that they are in an urban zone.
 * A large producer of watercolour paints wants to carry out an online
   advertising campaign for its latest watercolour range, diversifying its
   audience to reach as many amateur and professional artists as possible and
   avoiding showing the ad next to mismatched content (for instance, articles
   about how to paint your house). The number of times that the ad has been
   presented to you is detected and limited, to avoid presenting it too often.


Create profiles for personalised advertising (465) ?
Information about your activity on this service (such as forms you submit,
content you look at) can be stored and combined with other information about you
(for example, information from your previous activity on this service and other
websites or apps) or similar users. This is then used to build or improve a
profile about you (that might include possible interests and personal aspects).
Your profile can be used (also later) to present advertising that appears more
relevant based on your possible interests by this and other entities.
Illustrations:
 * If you read several articles about the best bike accessories to buy, this
   information could be used to create a profile about your interest in bike
   accessories. Such a profile may be used or improved later on, on the same or
   a different website or app to present you with advertising for a particular
   bike accessory brand. If you also look at a configurator for a vehicle on a
   luxury car manufacturer website, this information could be combined with your
   interest in bikes to refine your profile and make an assumption that you are
   interested in luxury cycling gear.
 * An apparel company wishes to promote its new line of high-end baby clothes.
   It gets in touch with an agency that has a network of clients with high
   income customers (such as high-end supermarkets) and asks the agency to
   create profiles of young parents or couples who can be assumed to be wealthy
   and to have a new child, so that these can later be used to present
   advertising within partner apps based on those profiles.


Use profiles to select personalised advertising (463) ?
Advertising presented to you on this service can be based on your advertising
profiles, which can reflect your activity on this service or other websites or
apps (like the forms you submit, content you look at), possible interests and
personal aspects.
Illustrations:
 * An online retailer wants to advertise a limited sale on running shoes. It
   wants to target advertising to users who previously looked at running shoes
   on its mobile app. Tracking technologies might be used to recognise that you
   have previously used the mobile app to consult running shoes, in order to
   present you with the corresponding advertisement on the app.
 * A profile created for personalised advertising in relation to a person having
   searched for bike accessories on a website can be used to present the
   relevant advertisement for bike accessories on a mobile app of another
   organisation.


Create profiles to personalise content (211) ?
Information about your activity on this service (for instance, forms you submit,
non-advertising content you look at) can be stored and combined with other
information about you (such as your previous activity on this service or other
websites or apps) or similar users. This is then used to build or improve a
profile about you (which might for example include possible interests and
personal aspects). Your profile can be used (also later) to present content that
appears more relevant based on your possible interests, such as by adapting the
order in which content is shown to you, so that it is even easier for you to
find content that matches your interests.
Illustrations:
 * You read several articles on how to build a treehouse on a social media
   platform. This information might be added to a profile to mark your interest
   in content related to outdoors as well as do-it-yourself guides (with the
   objective of allowing the personalisation of content, so that for example you
   are presented with more blog posts and articles on treehouses and wood cabins
   in the future).
 * You have viewed three videos on space exploration across different TV apps.
   An unrelated news platform with which you have had no contact builds a
   profile based on that viewing behaviour, marking space exploration as a topic
   of possible interest for other videos.


Use profiles to select personalised content (186) ?
Content presented to you on this service can be based on your content
personalisation profiles, which can reflect your activity on this or other
services (for instance, the forms you submit, content you look at), possible
interests and personal aspects, such as by adapting the order in which content
is shown to you, so that it is even easier for you to find (non-advertising)
content that matches your interests.
Illustrations:
 * You read articles on vegetarian food on a social media platform and then use
   the cooking app of an unrelated company. The profile built about you on the
   social media platform will be used to present you vegetarian recipes on the
   welcome screen of the cooking app.
 * You have viewed three videos about rowing across different websites. An
   unrelated video sharing platform will recommend five other videos on rowing
   that may be of interest to you when you use your TV app, based on a profile
   built about you when you visited those different websites to watch online
   videos.


Measure advertising performance (433) ?
Information regarding which advertising is presented to you and how you interact
with it can be used to determine how well an advert has worked for you or other
users and whether the goals of the advertising were reached. For instance,
whether you saw an ad, whether you clicked on it, whether it led you to buy a
product or visit a website, etc. This is very helpful to understand the
relevance of advertising campaigns.
Illustrations:
 * You have clicked on an advertisement about a “black Friday” discount by an
   online shop on the website of a publisher and purchased a product. Your click
   will be linked to this purchase. Your interaction and that of other users
   will be measured to know how many clicks on the ad led to a purchase.
 * You are one of very few to have clicked on an advertisement about an
   “international appreciation day” discount by an online gift shop within the
   app of a publisher. The publisher wants to have reports to understand how
   often a specific ad placement within the app, and notably the “international
   appreciation day” ad, has been viewed or clicked by you and other users, in
   order to help the publisher and its partners (such as agencies) optimise ad
   placements.


Measure content performance (232) ?
Information regarding which content is presented to you and how you interact
with it can be used to determine whether the (non-advertising) content e.g.
reached its intended audience and matched your interests. For instance, whether
you read an article, watch a video, listen to a podcast or look at a product
description, how long you spent on this service and the web pages you visit etc.
This is very helpful to understand the relevance of (non-advertising) content
that is shown to you.
Illustrations:
 * You have read a blog post about hiking on a mobile app of a publisher and
   followed a link to a recommended and related post. Your interactions will be
   recorded as showing that the initial hiking post was useful to you and that
   it was successful in interesting you in the related post. This will be
   measured to know whether to produce more posts on hiking in the future and
   where to place them on the home screen of the mobile app.
 * You were presented a video on fashion trends, but you and several other users
   stopped watching after 30 seconds. This information is then used to evaluate
   the right length of future videos on fashion trends.


Understand audiences through statistics or combinations of data from different
sources (319) ?
Reports can be generated based on the combination of data sets (like user
profiles, statistics, market research, analytics data) regarding your
interactions and those of other users with advertising or (non-advertising)
content to identify common characteristics (for instance, to determine which
target audiences are more receptive to an ad campaign or to certain contents).
Illustrations:
 * The owner of an online bookstore wants commercial reporting showing the
   proportion of visitors who consulted and left its site without buying, or
   consulted and bought the last celebrity autobiography of the month, as well
   as the average age and the male/female distribution of each category. Data
   relating to your navigation on its site and to your personal characteristics
   is then used and combined with other such data to produce these statistics.
 * An advertiser wants to better understand the type of audience interacting
   with its adverts. It calls upon a research institute to compare the
   characteristics of users who interacted with the ad with typical attributes
   of users of similar platforms, across different devices. This comparison
   reveals to the advertiser that its ad audience is mainly accessing the
   adverts through mobile devices and is likely in the 45-60 age range.


Develop and improve services (330) ?
Information about your activity on this service, such as your interaction with
ads or content, can be very helpful to improve products and services and to
build new products and services based on user interactions, the type of
audience, etc. This specific purpose does not include the development or
improvement of user profiles and identifiers.
Illustrations:
 * A technology platform working with a social media provider notices a growth
   in mobile app users, and sees based on their profiles that many of them are
   connecting through mobile connections. It uses a new technology to deliver
   ads that are formatted for mobile devices and that are low-bandwidth, to
   improve their performance.
 * An advertiser is looking for a way to display ads on a new type of consumer
   device. It collects information regarding the way users interact with this
   new kind of device to determine whether it can build a new mechanism for
   displaying advertising on this type of device.


Use limited data to select content (72) ?
Content presented to you on this service can be based on limited data, such as
the website or app you are using, your non-precise location, your device type,
or which content you are (or have been) interacting with (for example, to limit
the number of times a video or an article is presented to you).
Illustrations:
 * A travel magazine has published an article on its website about the new
   online courses proposed by a language school, to improve travelling
   experiences abroad. The school’s blog posts are inserted directly at the
   bottom of the page, and selected on the basis of your non-precise location
   (for instance, blog posts explaining the course curriculum for different
   languages than the language of the country you are situated in).
 * A sports news mobile app has started a new section of articles covering the
   most recent football games. Each article includes videos hosted by a separate
   streaming platform showcasing the highlights of each match. If you
   fast-forward a video, this information may be used to select a shorter video
   to play next.


Special processing possibilities
Use precise geolocation data (247) ?
With your acceptance, your precise location (within a radius of less than 500
metres) may be used in support of the purposes explained in this notice.

Actively scan device characteristics for identification (120) ?
With your acceptance, certain characteristics specific to your device might be
requested and used to distinguish it from other devices (such as the installed
fonts or plugins, the resolution of your screen) in support of the purposes
explained in this notice.

Processing purposes not defined by IAB
Technically necessary (3) ?
Here you can find all technically necessary scripts, cookies and other elements
that are necessary for the operation of the website or the operator has a
legitimate interest according to DSGVO Art6, para. 1.
Social media (1) ?
All social media channels used by the current page are listed here.
More information
Third-party supplier (765) ?
Cancel Save All accept

Scroll to top