Latest VB100 announced

Posted by   Virus Bulletin on   Aug 20, 2008

September 2nd deadline set for Windows Server 2008 test

VB has issued a call for submissions for the latest VB100 comparative review, which will test the performance of products available for the Microsoft Windows Server 2008 platform (Standard Edition, 32-bit). The comparative will test the performance of products supporting the platform, measuring detection rates and scanning speeds under VB's strict testing protocols.

The deadline set for product submissions is September 2nd, with test sets and test platforms frozen on August 29th - the latest WildList available from the WildList Organization on this date will be used for the test. Those products which prove capable of detecting the full contents of the WildList, both on access and on demand, without raising any false positives on a set of known-clean files, will be awarded VB100 certification.

An overview of the VB100 testing process can be found here, with more in-depth details of the testing procedures here. Submission is entirely free of charge, and any software vendors interested in submitting a product for the test should contact John Hawes for further information. The schedule for future comparatives is here.

The results of the test will appear in the October issue of Virus Bulletin, available (from 1 October) to subscribers only - see here for details of how to subscribe.

Previous test update: In the last VB100 comparative, published in the August edition of VB, the product submitted by Bullguard was found to miss certain filetypes in on-access mode, including some samples from the WildList test set. Further analysis has found that this issue was caused by a limited set of extensions being in use on initial installation. A second reboot has been shown to correct this issue, which has also been corrected in subsequent product releases, and most users running the product would have been properly protected.

As the product was also found to have raised false positives during the test, this update does not affect its qualification for VB100 certification, but the information is being released to reassure Bullguard's users.

Posted on 20 August 2008 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 call for papers - now open!

Have you analysed a new online threat? Do you know a new way to defend against such threats? Are you tasked with securing systems and fending off attacks? The call for papers for VB2019 is now open and we want to hear from you!

VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis library

Today, we publish a VB2018 paper by Google researcher Maddie Stone in which she looks at one of the most interesting anti-analysis native libraries in the Android ecosystem. We also release the recording of Maddie's presentation.

VB2018 paper: Draw me like one of your French APTs – expanding our descriptive palette for cyber threat actors

Today, we publish the VB2018 paper by Chronicle researcher Juan Andres Guerrero-Saade, who argues we should change the way we talk about APT actors.

Book Review: Cyber Wars

VB Editor Martijn Grooten reviews Charles Arthur's Cyber Wars, which looks at seven prominent hacks and attacks, and the lessons we can learn from them.

VB2018 paper: Office bugs on the rise

At VB2018 Sophos researcher Gábor Szappanos provided a detailed overview of Office exploit builders, and looked in particular at the widely exploited CVE-2017-0199. Today we publish his paper and release the video of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.