Perhaps this has something to do with it? <https://security.googleblog.com/2016/05/evolving-safe-browsing-api.html>
-Al- On Sun, May 22, 2016 at 05:56 PM, Joel Esler (jesler) wrote: > > This is something the team is actively working on. Please stay tuned. > > > -- > Joel Esler > Manager, Talos Group > > > > > On May 22, 2016, at 12:38 PM, TR Shaw <ts...@oitc.com<mailto:ts...@oitc.com>> > wrote: > > The following is safebrowsing’s test host name, > malware.testing.google[.]test, and using google’s test page > > https://www.google.com/transparencyreport/safebrowsing/diagnostic/index.html#url=malware.testing.google[.]test > > shows that it is listed. > > I have enabled safebrowsing in freshclam.cong and checked that > safebrowsing.cvd has been downloaded and is current. > > I checked clamav using clamscan on a file containing EICAR signature and it > detects. I also check clamd using INSTREAM and piped an EICAR signature to > clamd and it responded "Eicar-Test-Signature FOUND” > > I then created a file containing > > <http> > <head> > </head> > <body> > <a > href=http://malware.testing.google[.]test/>http://malware.testing.google[.]test/</a> > </body> > </html> > > and ran it through clamav: > > clamscan -v googlesafebrowsingtest.txt
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml