Christian Mairoll

Emsisoft Employee
  • Content Count

    1250
  • Joined

  • Days Won

    117

Christian Mairoll last won the day on October 31

Christian Mairoll had the most liked content!

Community Reputation

237 Excellent

About Christian Mairoll

  • Rank
    Emsi

Contact Methods

  • Website URL
    http://www.emsisoft.com

Profile Information

  • Gender
    Male
  • Location
    New Zealand
  • Interests
    Anti-Malware Software

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. We added a powerful new reports feature for real-time data analysis and scheduled snapshots. Reports can be template-based and fully customized by users to their needs. The post New in 2020.12: Real-time reports and scheduled data snapshots appeared first on Emsisoft | Security Blog. View the full article
  2. New KPI tiles improve the workspace dashboard and new push notifications will show operating system level alerts for urgent protection issues. Windows Firewall and RDP settings can now be managed through policies too. The post New in 2020.11: Key performance indicators, push notifications and more appeared first on Emsisoft | Security Blog. View the full article
  3. Emsisoft Anti-Malware earned VB100 certification in the October 2020 tests by independent testing group Virus Bulletin. The post Emsisoft Anti-Malware awarded VB100 in October 2020 tests appeared first on Emsisoft | Security Blog. View the full article
  4. Improved support for 4k displays and new grid columns for quarantined objects in the cloud console. The post New in 2020.10: Detail Improvements appeared first on Emsisoft | Security Blog. View the full article
  5. Improved licensing section, new logon session management, workspace dashboard improvements and enhanced notifications. The post New in 2020.9: Emsisoft Cloud Console efficiency improvements appeared first on Emsisoft | Security Blog. View the full article
  6. Emsisoft Business Security blocks and detects 100% of malware in CheckLab’s July 2020 Advanced In The Wild Malware Test. The post Emsisoft scores 100% in CheckLab’s Advanced In The Wild Malware Test appeared first on Emsisoft | Security Blog. View the full article
  7. 800x600 wird wie gesagt nicht mehr unterstuetzt, weil selbst Windows mindestens 1024 erfordert. Ich waere aber stark an einem Screenshot von 1920x1080 interessiert, der das Problem zeigt. Eventuell haben wir hier einen UI Rendering Fehler. Als Alternative bleibt ansonsten noch der Remote-Only Management Modus, der die Fenstergroesse auf unter 800x600 bringt. Saemtliche Funktionen sind dann ueber das MyEmsisoft Portal verfuegbar und das ist voll Responsive, d.h. auch auf kleinen Handy Screens gut verwendbar.
  8. Emsisoft Anti-Malware earned the VB100 in the August 2020 tests by independent certification body Virus Bulletin. The post Emsisoft Anti-Malware awarded VB100 in August 2020 tests appeared first on Emsisoft | Security Blog. View the full article
  9. We added a new feature to save the preferred view settings for quick access, as well as a new column filtering feature for workspaces and device lists. The post New in 2020.8: Custom filtered views for the console dashboard appeared first on Emsisoft | Security Blog. View the full article
  10. Closing the entry door for RDP based attacks (ransomware), introducing a new notifications sidebar and adding new fully customizable workspaces and devices lists. The post New in 2020.7: New RDP attack alerts & new notifications system appeared first on Emsisoft | Security Blog. View the full article
  11. Emsisoft Anti-Malware has been awarded VB100 certification in the June 2020 tests by Virus Bulletin. The post Emsisoft awarded VB100 in June 2020 tests appeared first on Emsisoft | Security Blog. View the full article
  12. Emsisoft Business Security and Emsisoft Anti-Malware were awarded the Best+++ badge in the March-April 2020 “Three Security Test” by AVLab. The post Emsisoft awarded Best+++ badge in March-April 2020 tests by AVLab appeared first on Emsisoft | Security Blog. View the full article
  13. This month, our development teams put their focus on fine-tuning the many new major additions of the past few months, such as the remote-only security management mode. The post New in 2020.6: Remote-only mode improvements & new Edge Chromium extension appeared first on Emsisoft | Security Blog. View the full article
  14. The statement on MalwareTips couldn't be further away from the facts. Our update system was actually one of the first in our industry which implemented advanced manipulation protection, 13-14 years ago, long before SSL became common and at a time when most AVs just had a plain and easy to manipulate file listings to get their updates. This is how we protect the update trust chain: 1. Update files are encrypted when published, but that's mainly to protect our intellectual property, not to defend hackers. 2. All files are hashed and named by their checksum on our servers. 3. Updates are generally delivered as differential/fragment files that only match with non-manipulated older file versions already on your computer. 4. The update API on our servers provide a list of hashes of all files of the product. The API output is digitally signed, so if it was manipulated, the software would stop the update right away. 5. The software downloads all files that have different hashes than the locally existing files. At that point, any locally made manipulations would be overwritten. 6. Downloads are through HTTPS, e.g. (https://dl.emsisoft.com/updates/CCB6E1DBF0D8220FEF38A77189CC7BB1.dat) 7. After downloading, the software verifies if the hash in the earlier provided download listing matches the actual hash of the files. If there were any manipulations in the download process, e.g. through SSL interception, the files would be rejected at that point. 8. Binary files are also digitally signed, which means if anything gets manipulated on client side, the software won't run anymore and Windows would immediately alert that it's down. Only if a file can be guaranteed to be and original from Emsisoft, is is being installed. Note that the described security model doesn't even need SSL to be bullet-proof. We just added SSL because it's freely available with our hosting provider. Btw. the download protocol can be viewed with tools like FiddlerTool (JSON/RAW view), so you can easily verify the above information by yourself. We do, however have a Bug Bounty program. If anyone can get me a working proof that they were able to manipulate our updates, a big cash reward is waiting for them!
  15. We're working on getting our name on that vendor listing page again (we've been there for Windows 7, but the requirements have changed significantly since). Unfortunately there are lots of political hurdles to pass, but we're confident that we will be there again, sooner or later. Being on that list has no advantage for our users though, it's a simple marketing opportunity that MS offers to selected vendors. To avoid bias and preference the list re-sorts randomly with each page refresh. To answer your question on WSC APIs: Yes, MS is aware of all AVs and they strictly limit access to those APIs to vendors that meet their (rather arbitrary and quite expensive) requirements. The chain of trust goes very deep into the Windows core though, so it can't be easily misused by fake AVs.