On 14/05/17 17:42, G.W. Haywood wrote:
>> Are clamav users protected from this ransomware?
Partially. Everyone agrees:
* Check MS17-010 is applied on every Windows device you can - before
tomorrow!
I don't have access to samples, but ClamAV seems to be picking up some
of Wcry/WanaCrypt0r/WannaC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Any timescale for daily.cvd to be updated?
On 21/03/16 21:59, Paul Kosinski wrote:
> Ours is looking for updates every 1.5 hours, just as the cron job
> says.
(Just curious: do you have two crontab lines, or start freshclam
daemon with "-c 16" ? )
C
clam willing to
report on it?
Thanks.
--
All best wishes,
Cedric Knight
GreenNet
>
> Original Message
> Subject: securiteinfo problems
> From:"Steve Basford"
> Date:Thu, April 23, 2015 8:24 am
> To:
rather than using ClamAV at all, but I would imagine the
feature of testing files from most specific to most generic would be a
useful enhancement for many users.
> - Feel free to submit feature requests to bugzilla.clamav.net
I think this is an RFE, so will do so. Thanks.
CK
>
> S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
Like a lot of users I suspect, I use ClamAV to search within archives
for generic filename patterns (or other characteristics) specified in
a .zmd file. Like some, I use clamdscan through amavis and rescore
some types of hits that conceivably migh
Hello
Running clamav 0.97.6 and then 0.97.8 on a Debian squeeze server, since
14 Feb this year freshclam has been consistently failing with
ERROR: getpatch: Can't download daily-16682.cdiff from database.clamav.net
WARNING: Incremental update failed, trying to download daily.cvd
...
Ignori
Hi
Please excuse the long composite response:
On 30/05/12 12:17, G.W. Haywood wrote:
> On Wed, 30 May 2012, Cedric Knight wrote:
>
>> What I'm looking for is a way to avoid having to report new malware
>> variants so frequently.
>
> You need iptables, a long G
On 29/05/12 15:04, Henrik K wrote:
> On Tue, May 29, 2012 at 12:33:30PM +0100, Cedric Knight wrote:
>> It seems there's at least new variant every day of Kryptik/Kazy/Zbot
>> worms or Trojan droppers sent zipped through email. These are attached
>> to a type of spam u
companies like Sophos has a fair degree of automation
anyway, so you would think they would also scour the network for
suspicious files using simple patterns. Or maybe the malware is just
good at avoiding everyone else's spamtraps? Or would it escalate the
malware arms race?
Just curious.
On 11/05/12 17:14, Cedric Knight wrote:
> Hi
>
> I'm seeing BC.Exploit.CVE_2012_0184 hit a wide variety of attachments as
> of 14:40 UTC this afternoon. Will submit a sample the usual way, but
> wanted to warn that it just seems to be quite extensive. (also
> possibly B
ishes,
Cedric Knight
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml
A user reported Avast had detected a zipped .exe malware dropper as
"Win32.Oficla-BJ [Drp]". I submitted a sample via the ClamAV site on 3
December, but it seems the signature still hasn't been published and the
file is still not detected.
I believe it has been in the SaneSecurity/OITC winnow lis
12 matches
Mail list logo