About 369 results
Open links in new tab
  1. Download Anti Malware Testfile - EICAR

    The EICAR Anti-Virus Test File or EICAR test file is a computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus …

  2. Eicar e.V. - European Institute for Computer Anti-Virus Research

    EICAR is bringing together know-how from leading scientists and academics as well as recognized researchers, official institutions and global players of the industry.

  3. News - EICAR

    Jun 1, 2022 · The EICAR Trustworthiness Strategy is to enhance transparency in the contemporary IT Security environment and its ever evolving threats and vulnerabilities …

  4. Product Cybersecurity Standard - EICAR

    Jan 22, 2025 · The set of requirements provides concrete assistance for manufacturers of connected products in their timely preparation for the implementation standards of the Cyber …

  5. Projects - EICAR

    EICAR is always actively involved in various projects. We also take initiative and lead projects that have an influence on regulations, the society as a whole or the industry. The projects are …

  6. About Us - EICAR

    The institute is dealing with all kind of technical, organisational, legal and psychological aspects in the context of IT-Security. EICAR is bundling expert know-how from leading scientists and …

  7. Trustworthiness Strategy - EICAR

    Jun 1, 2022 · The EICAR Trustworthiness Strategy is to enhance transparency in the contemporary IT Security environment and its ever evolving threats and vulnerabilities …

  8. The set of requirements provides concrete assistance for manufacturers of connected products in their timely preparation for the implementation standards of the Cyber Resilience Act and …

  9. Membership // Registration - EICAR

    Our membership plans and fees. Once you become an Eicar member, membership is automatically renewed every year.

  10. Eicar Trustworthiness Strategy - EICAR

    The EICAR Trustworthiness Strategy is to enhance transparency in the contemporary IT Security environment and its ever evolving threats and vulnerabilities scenario and to enable trust into …