This “test” is actually going to be an ongoing programme of assessing a cohort of security applications effectiveness in securing Internet Explorer 8 on an XPSP3 system against a combination of bespoke test tools, malware emulators and real, zero day to early life malware.
We are still in the process of securing the funds required to sustain this programme, but, to avoid delay and spark a bit of interest, we will be starting the first tests using our own, custom financial malware emulation tool.
We will repeat the test every 24 hours, each time using the same original build of our tool to assess the security applications ability to detect and counter this threat over time.
We will run the test, just using our emulator for the next week or so, until we have funds to widen the programme to include our other in-house tools (and so cover numerous vectors) and real malware.
The tool uses the same techniques employed by real malware to steal users banking data.
In this first test, we will use the tool to test security applications ability to:
1) * *Detect or block the test application on install
2) * *Prevent the tool from capturing data entered in to an HTTPS site using IE8
3) * *Prevent the tool from sending captured data out of the system
System Manufacturer/Model Number Bruce ... somewhere in his 40's OS Windows 7 Ultimate 32bit SP1 CPU Intel(R) Core(TM)2 Quad CPU @ 2.40GHz, 2400 MHz Motherboard INTEL/D975XBX2 Memory 4 GB Graphics Card ATI Radeon HD 2600 Pro Monitor(s) Displays Samsung SyncMaster 914v Screen Resolution 1280 x 1024
Keyboard Standard PS/2 Keyboard Mouse Microsoft PS/2 Mouse PSU Rocketfish 700 W Case G.Skill Gigabyte Chassis Hard Drives 2/500GB each ... ST3500630AS ATA Device.
One is not connected Internet Speed DSL Antivirus Avira Internet Security Browser IE 9 Other Info ATI HDMI Audio
Browser Security / Financial Malware test problems?