Perhaps this has something to do with it?

<https://security.googleblog.com/2016/05/evolving-safe-browsing-api.html>

-Al-

On Sun, May 22, 2016 at 05:56 PM, Joel Esler (jesler) wrote:
> 
> This is something the team is actively working on.  Please stay tuned.
> 
> 
> --
> Joel Esler
> Manager, Talos Group
> 
> 
> 
> 
> On May 22, 2016, at 12:38 PM, TR Shaw <ts...@oitc.com<mailto:ts...@oitc.com>> 
> wrote:
> 
> The following is safebrowsing’s test host name, 
> malware.testing.google[.]test, and using google’s test page
> 
> https://www.google.com/transparencyreport/safebrowsing/diagnostic/index.html#url=malware.testing.google[.]test
> 
> shows that it is listed.
> 
> I have enabled safebrowsing in freshclam.cong and checked that 
> safebrowsing.cvd has been downloaded and is current.
> 
> I checked clamav using clamscan on a file containing EICAR signature and it 
> detects. I also check clamd using INSTREAM and piped an EICAR signature to 
> clamd and it responded "Eicar-Test-Signature FOUND”
> 
> I then created a file containing
> 
> <http>
> <head>
> </head>
> <body>
> <a 
> href=http://malware.testing.google[.]test/>http://malware.testing.google[.]test/</a>
> </body>
> </html>
> 
> and ran it through clamav:
> 
> clamscan -v googlesafebrowsingtest.txt

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to