Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'kaspersky'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 120 results

  1. Kaspersky [Medicine-Discussion-Knowledge Base Info] ================================================================= Official Download Links: ---------------------------------------- Kaspersky KAV,KIS,KTS 2017 Inc. Patch E Without Secure Connection [English] http://textuploader.com/d5e91 Download Links: Kaspersky 2017 MR0 17.0.0.611abcd Patch d Offline Download Links Digital Signatures from 22 March 2017 [English] Kaspersky 2017 MR0 17.0.0.611abcd en-us l KIS 17.0.0.611abcd or KIS 17.0.0.611abcd l KAV 17.0.0.611abcd l KTS5 17.0.0.611abcd l KSOS 17.0.0.611 l release notes l ================================================================= Kaspersky 2016 MR1 16.0.1.445 en-us l KIS 16.0.1.445 l KAV 16.0.1.445 l KTS5 16.0.1.445 l release notes l Kaspersky 2015 MR2 15.0.2.361 en-us l KIS 15.0.2.361 l KAV 15.0.2.361 l KTS5 15.0.2.361 l release notes l Kaspersky 2017 17.0.0.611 MR0 Other Available Languages Official Download Links Kaspersky 2016 16.0.1.445 MR1 Other Available Languages Official Download Links If you already had previous version of Kaspersky I strongly suggest to use Removal tool to Uninstall Kaspersky Lab products >>> [More Info & Download Link] KIS/KAV 2014-2015-2016-2017 90 Days OEM Trial Keys: ---------------------------------------------- ================================================================= Kaspersky 2016 Activation Medicine: ----------------------------------- Kaspersky Reset Trial 5.1.0.35 [Multi]: ----------------------------------------- OS: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003Bit OS: 32 (x86), 64 (x64) Development Team: leo1961 >> , Streamdat, Maksim1876. : ) Interface Screenshots: Supported anti-virus products / Version History Instruction: ------------ Download Link: ------------- Kaspersky Reset Trial 5.1.0.35 ================================================================= Kaspersky Promotions / Giveaways: ============================ Kaspersky Total Security - Multi-Device 90 Days Activation Code Kaspersky Internet Security – Multi-Device 2016 60 days Promotional Key(s) Kaspersky All Product Latest Promotional Giveaways ================================================================= Kaspersky 2015 15.0.2.361 MR2 >>> ================================================================= Kaspersky Tools/Important Post Replies/Knowledge Base Information's: ------------------------------------------------------------ Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky 2015 15.0.2.361 MR2 (Android) Kaspersky Antivirus & Security Kaspersky 2018.0.0.405 Technical Release With Patch "A" (en-US) ------------------------------------------------------------ KIS 2017-2018 183 Days .lic License Keys KTS 2017-2018 90 Days .lic License Keys Kaspersky Virus Removal Tool [Free] Some Useful Kaspersky Product Tools Kaspersky 2017 Dark Skin How to Stop and Disable Kaspersky 2017/2018 Secure Connection How to disable daily trial notification in Kaspersky 2018 v18.0.0.x products [KTS/KIS/KAV] How to disable daily trial notification in Kaspersky 2017 v17.0.0.x products [KTS/KIS/KAV] Kaspersky prevents the opening of some sites and Google Search How to restore default settings -Import-Export Setting in Kaspersky Kaspersky Extract Code 1.0.0.9 by leo1961 How to manually install Kaspersky Beta Patch Disable registration requirement in Kaspersky 2016 v16.0.1.x products [KTS-KIS-KAV] How to create exclusion rules in Kaspersky Kaspersky Trial is expired and disable and Self-Defense function not available Kaspersky 2016 Official Useful Info's - Tips - Instructions How to block Internet access using Firewall How to configure Kaspersky Internet Security 2016 for better performance of your computer How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2016 How to change the network status How to disable news/promotional notification How To Disable Last License Notification Time Kaspersky 2016 Private Browsing [New Feature] & Pop Up Blocking Option Version designations of Kaspersky How to enable or disable downloading new versions of Kaspersky Migration Upgrading Between Kaspersky 2016 Product KIS-KAV-KTS Compatibility of Kaspersky Anti-Virus and Comodo Firewall How To Gather Offline Databases From Previous Installed Kaspersky Products How To activate Kaspersky & Bypass Region Mismatch Error Kaspersky Small Office Security 15.0.2.361 Final How to use .lic file to activate Kaspersky Product & activation backup / restore Kaspersky application automatically downloads new version and installs it on top of the current one Kaspersky Rescue Disk 10.x.xx.xx [updated every Sunday] Kaspersky Anti-Virus 2016 for free for three months [French Promotion] Kaspersky Free Anti-Virus (KFA) / 365 2016 MR1 16.0.1.445 [EN Localization] How to create and open Sharecode.! ================================================================= november_ra1n 17 July 2015 =================================================================
  2. Redmond says its antivirus plays nice with third-party apps Microsoft has finally issued a response to Kaspersky’s EU complaint, after the Russian security vendor requested an antitrust investigation over the way the software giant deals with third-party antivirus in its own Windows operating system. In a long statement whose role is to defend the Windows 10 antivirus and to explain how Microsoft is working with security vendors on making the operating system play nice with third-party solutions, Rob Lefferts, Partner Director, Windows & Devices Group, Security & Enterprise, explains that Windows Defender is currently one of the top solutions on the market, with over 99 percent detection rates. “We built Windows Defender Antivirus to make a promise to our customers that every Windows 10 device ALWAYS has protection from viruses and malware. Through our continued investments, our test results are among the top of security industry leaders,” he said. Lefferts then goes on to point out Microsoft is collaborating with nearly 80 independent software vendors as part of the so-called Microsoft Virus Initiative (MVI) program, which makes it possible for antivirus vendors to prepare for the release of new Windows versions and optimize their solutions to prevent any compatibility issues that might be experienced. Furthermore, Microsoft says that antivirus companies can also test compatibility with new Windows versions thanks to the Windows Insider program, a program that also involves millions of users who can send feedback on any problem that might arise. 95 percent of antivirus products compatible with Creators Update Lefferts responds to Kaspersky’s claim that Microsoft disables antivirus software when updating Windows by going back to the Windows 10 Creators Update released on April 11. No less than 95 percent of the Windows 10 PCs getting the update were running antivirus compatible with the Creators Update, Microsoft says. “For the small number of applications that still needed updating, we built a feature just for AV apps that would prompt the customer to install a new version of their AV app right after the update completed. To do this, we first temporarily disabled some parts of the AV software when the update began. We did this work in partnership with the AV partner to specify which versions of their software are compatible and where to direct customers after updating,” the company exec says. In the end, Lefferts emphasizes that Microsoft is always working closely with antivirus vendors to make sure not only that no compatibility issues are experienced when updating Windows, but also that users remain protected all the time. This is the reason Windows Defender kicks in when third-party antivirus is removed or expires, Lefferts added, again responding to Kaspersky who claimed that Windows 10 blocks expiring subscription notifications. Microsoft has been trying to reach out to Kaspersky several times, according to reports, but the Russian security company decided to pursue legal action. The EU is yet to announce whether an antitrust investigation would start or not. < Here >
  3. Kaspersky Lab, the security software company, announced Tuesday (June 20) a new State of Industrial Cybersecurity 2017 security survey, which found that over half (54 percent) of ICS companies interviewed have experienced at least one cyber attack in the last 12 months — with one in five (21 percent) experiencing two incidents in the same timeframe. What’s more, half of the companies surveyed experienced between one and five IT security incidents in the past 12 months. “As cyberattacks and the growing connected environments of industrial organizations evolve, the ICS organization will continue to face new challenges, and it’s essential that security strategies be reassessed now before it is too late,” said Clint Bodungen, senior researcher, critical infrastructure threat analysis at Kaspersky Lab, said in a press release announcing the results. “Preparedness among all departments in the organization — such as executive leaders, engineers, IT security teams and more — is key to protecting against cyberattacks. Businesses managing ICS environments need to put the necessary policies, procedures, technology and training in place immediately to properly manage these risks before they have an opportunity to damage the business.” Kaspersky Lab and Business Advantage conducted a security survey of 359 industrial cyber security practitioners from 21 countries from February to April 2017. The survey also revealed that ICS companies are aware of the potential risk of a cyber attack, with 74 percent saying they expect an attack on their infrastructure. The misunderstanding comes when prioritizing what risks they are facing. According to the research, while there is a lot of awareness about ransomware and targeted attacks, the biggest pain still comes from conventional malware, the security company said. Among survey respondents, conventional malware and virus outbreaks were the top incident concern for 56 percent, with threats from third parties concerning 44 percent of survey respondents and other intentional physical damage by external actors worrying 41 percent of those polled. The survey results also show there is confusion surrounding employee errors and unintentional actions, which are far more threatening to ICS organizations. What’s more, Kaspersky Lab found that struggling with a lack of IT security expertise, both internally and externally, is a major concern for ICS companies. “This finding is worrisome as it indicates that industrial organizations are not always ready to fight attacks, while they are certainly vulnerable to being compromised by outside and internal employee cyber threats,” Kaspersky Lab said. Article source
  4. Kaspersky Endpoint Security 10 Service Pack 2 for Windows Kaspersky Endpoint Security 10 Support >>> hOMEPAGE: http://aes.kaspersky-labs.com/english/endpoints/kes10windows/ Kaspersky Endpoint Security 10 SP2 English Download Link: AES256 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes256.exe ES56 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes56.exe Other Languages Download Links: Other Languages Download Links: http://aes.kaspersky-labs.com/ Release Notes: Kaspersky Endpoint Security 10 Service Pack 2 for Windows Version 10.3.0.6294 03/28/2017 How to activate using key files: 1. Click License Tab on the left corner 2. Click red cross delete the existing trial or block keys. 3. Hit Activate the application under a new license 4. Click activate with a key file and browse the key file Next to activate How to renew activation code for Kaspersky Endpoint Security 10 for Windows Activate Via Key File: https://support.kaspersky.com/us/13085#block1 MEDICINE: .lic file download Links see the topic reply there --> How to Activate Via Key File
  5. File Size: 113 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  6. Kaspersky Files Antitrust Complaint Against Microsoft over Windows 10 Antivirus - Updated Legal complaints filed with EU and German watchdog Kaspersky claims that Microsoft is turning to unfair tactics to force users to stick with Windows Defender, the default antivirus in Windows 10. In a blog post today, Kaspersky accuses the Redmond-based software giant of removing third-party antivirus when upgrading to Windows 10, using its dominant position to promote its own security product. “Microsoft’s antivirus is hardwired into all versions of Windows 10 for home users: it’s impossible to turn it off completely, impossible to delete. Until recently no one asked you if you needed it or not. There was a time when, even if you used a different security solution, Microsoft’s own AV all the same periodically ran scans,” Kaspersky says. Kaspersky: Other security companies must support us Microsoft is mostly doing this because its antivirus has failed to remain competitive and because third-party security products are a lot more powerful, he continues, blaming the software giant for using its position only against antivirus products because this is a market where others are leading. “Such restriction is applied only to antiviruses - with which Microsoft has been trying to compete (and not doing very well at) for years. But in previous (pre-10) versions of Windows there were no such special measures. Thus, it looks like, after years with no success (in competing with other antiviruses), Microsoft has resorted to the use of alternative, OS-empowered (in our view - underhand) tactics,” he adds. Microsoft not only removes third-party antivirus products from Windows when the upgrade is performed but the company isn’t giving vendors enough time to prepare their security software for new versions of Windows. And this is one of the reasons they are eventually blocked when the upgrade is performed, he says. Kaspersky ends his plea by calling for Microsoft to support fair and healthy competition, while also asking other security vendors to join this effort and file antitrust complaints against the software giant. “We want Microsoft to stop misleading and misinforming our - and not only our - users. We want to see all security solutions being able to work on the Windows platform on a level playing field. And we want to see users being able to decide for themselves what they want and consider important to them,” Kaspersky added. Microsoft has already released a statement, saying that it does not infringe competition rules and it’s willing to work with antitrust bodies on addressing all these claims. UPDATE: Microsoft has provided us with an updated statement, explaining that it tried to reach out to Kaspersky to discuss the said concerns, but a meeting is yet to take place. Furthermore, the firm emphasized that existing Windows 10 security features do not violate any competition rules. Source
  7. File Size: 113 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  8. Kaspersky Lab is announcing the beta testing of Kaspersky Anti-Ransomware tool. Testing is scheduled for 09/08/2016 - 31/12/2016 Kaspersky Anti-Ransomware Tool for Business is a program designed to protect the users’ computers from known malware of ransomware type. KEY FEATURES • Freeware and lightweight solution • Ransomware detection close to premium business product (KES for Windows) • Protection technologies: File AV (KSN based) + System watcher • Compatible with 3rd party Endpoint security solutions • Most popular client OS support: Win 7-10 (Including Anniversary Update) • Email reports on detection to Administrator LIMITATIONS • No central management (remote silent install, configuration) • No technical support (forum support for public beta will be available) • Localizations: English only DOWNLOADTo download product you need to perform initial registration.Please kindly visit the following site and perform all registration steps:https://go.kaspersky.com/Anti-ransomware-tool.html More info: https://forum.kaspersky.com/index.php?showtopic=355273 & http://www.kaspersky.com/about/news/product/2016/kaspersky-anti-ransomware-tool-available-free-of-charge-for-businesses
  9. Microsoft has already made some changes to address complaints, Kaspersky says Security vendor Kaspersky Lab won’t file a complaint against Microsoft for its antivirus practices in Windows 10, as the software company has made changes to address a number of reported problems, founder and Chief Executive Eugene Kaspersky was quoted as saying by Reuters. In a blog post published last November, Kaspersky accused Microsoft of abusing its dominant position in the software market to push Windows Defender as the preferred antivirus solution in Windows 10, while also explaining that users end up being exposed to security risks due to some third-party security products being removed when updating to newer OS releases. Kaspersky called Microsoft’s approach abusive, describing how Windows Defender is automatically enabled on a Windows system when licenses for their third-party antivirus are close to coming to an end. “It’s a big deal because this is the crucial period during which a significant number of users seek extensions of their security software licenses. And if a user forgets to renew a license, then Microsoft deactivates the existing AV, and turns on Defender,” he said. Microsoft makes changes to address complaints It turns out, however, that Microsoft has contacted Kaspersky and the two companies worked together on a number of improvements that are already implemented, though no specifics on this have been provided. “They are listening to us and they made a few changes. It's an ongoing process. Of course if Microsoft agrees to all our requests we will not file it,” Kaspersky said. Although Kaspersky now says that no antitrust complaint would be submitted to the European Commission, his initial announcement in late 2016 revealed some antitrust bodies had already been notified. “We’ve taken the decision to address official bodies in various countries (including the EU and Russia) with a request to oblige Microsoft to cease its violation of anti-competition legislation and to remove the consequences of that violation,” he said at that point. Microsoft hasn’t yet issued a statement on the possible collaboration with Kaspersky, and the European Commission also refused to confirm whether a complaint was received or not. Source
  10. https://translate.yandex.com/translate?url=http%3A%2F%2Fe-kaspersky.livejournal.com%2F371109.html&lang=ru-en
  11. Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky Small Office Security 5 Build: 17.0.0.611.0.95.0 Date: 7/4/2016 More Screenshots: Release Notes WHAT'S NEW IN KASPERSKY SMALL OFFICE SECURITY Download Links: ============== Kaspersky KAV,KIS,KTS,KSOS 2017 Inc. Patch D Without Secure Connection ENG http://textuploader.com/d5e91 Thanks to @vkarthik posting files.. : ) Offline Download Links [All Available Languages]: https://www.kaspersky.com/small-business-security/downloads/small-office-security ============================================================================ Medicine: Kaspersky Reset Trial 5.1.0.35 [Multi] see the link in dedicated Kasperksy Topic posted there --> ============================================================================ KSOS 5 --> 90 days Trial Keys 5 Device: ============================================================================
  12. Details regarding the investigation are murky, but according to the Russian newspaper who quotes anonymous sources, Stoyanov was involved in facilitating the transfer of funds from foreign companies to Mikhailov's accounts. According to Stoyanov's LinkedIn account, before serving as Head of the Computer Incidents Investigation Team at Kaspersky, he worked as Deputy Director for a company called Indrik, but also as a Major in the Ministry of Interior's Cyber Crime Unit. In the past few years, Kaspersky Lab has worked very closely with Russian authorities to track down and help authorities arrest criminals spread across Russia. The most recent high-profile arrests where Kaspersky collaborated with Russian law enforcement includes the apprehension of over 50 individuals in May 2016, tied to the creation of the Lurk banking trojan and the Angler exploit kit. Article source
  13. Kaspersky is moving to fix a bug that disabled certificate validation for 400 million users. Discovered by Google's dogged bug-sleuth Tavis Ormandy, the flaw stems from how the company's antivirus inspects encrypted traffic. Since it has to decrypt traffic before inspection, Kaspersky presents its certificates as a trusted authority. If a user opens Google in their browser, for example, the certificate will appear to come from Kaspersky Anti-Virus Personal Root. The problem Ormandy identified is that those internal certificates are laughably weak. "As new leaf certificates and keys are generated, they're inserted using the first 32 bits of MD5(serialNumber||issuer) as the key ... You don't have to be a cryptographer to understand a 32bit key is not enough to prevent brute-forcing a collision in seconds. In fact, producing a collision with any other certificate is trivial," he writes here. Ormandy's bug report gave, by way of demonstration, a collision between Hacker News and manchesterct.gov: "If you use Kaspersky Antivirus in Manchester, Connecticut and were wondering why Hacker News didn't work sometimes, it's because of a critical vulnerability that has effectively disabled SSL certificate validation for all 400 million Kaspersky users." Kaspersky fixed the issue on December 28. Source
  14. At last – we’ve done it! I’ve anticipated this day for ages – the day when the first commercially available mass market hardware device based our own secure operating system landed on my desk. And here she is, the beaut. This unassuming black box is a protected layer 3 switch powered by Kaspersky OS and designed for networks with extreme requirements for data security. And there’s plenty more in the pipeline where this came from too, meaning the tech will be applied in other Internet-connected bits of kit, aka the Internet of Things (IoT). Why? Because this OS just so happens to be ideal for applications where a small, optimized and secure platform is required. The operating system boasts several distinctive features. Let me run through the main ones briefly… First, it’s based on microkernel architecture, which allows to assemble ‘from blocks’ different modifications of the operating system depending on a customer’s specific requirements. Second, there’s its built-in security system, which controls the behavior of applications and the OS’s modules. In order to hack this platform a cyber-baddie would need to break the digital signature, which – any time before the introduction of quantum computers – would be exorbitantly expensive. Third, everything has been built from scratch. Anticipating your questions: not even the slightest smell of Linux. All the popular operating systems aren’t designed with security in mind, so it’s simpler and safer to start from the ground up and do everything correctly. Which is just what we did. And just the other day we celebrated the birth of this new OS! The very first meeting held regarding this project took place 14 (fourteen!) years ago almost to the day – on November 11! Not that we’ve been diligently coding and testing since then; in that amount of time with sufficient resources you could see several projects through to the end and update and improve them all several times over! No, in the first several years not a single line of code was written. We met from time to time, discussed technical details, architecture, and drew pretty pictures on large sheets of paper. Then we built up a team – very slowly, since OS specialists are few and far between. And onwards we move, slowly but surely. Fast forward several years, and today we aren’t simply celebrating the latest team discussion, but our first commercial hardware device actually ready! November 11 is of course easy to remember as it’s 11-11. Which is birthday of our big, ambitious project. Indeed, within the company the project is known simply as ’11-11′. 14 years is a serious age for any project. Looking back it seems so quaint now how at the start we argued about the architecture and the basic parameters of the future OS and felt a little bit like… alchemists with compasses trying to make squares out of circles. The question to which we were searching for an answer was this: how can we build an operating system that will be impossible to hack in principle? Is it possible in practice? Meanwhile, all around this alchemy folks were fairly astonished: just what were we thinking? We’d decided to make an unhackable platform and ruin our other security business model?! Indeed, we were often asked why such an OS is really necessary. Here’s why: Once, cyberthreats targeting critical infrastructure, telecoms and other modern-life-essential systems looked mostly like science fiction. No one – besides us paranoids (actually, and also the most advanced hackers, cyber-spies and cyber-militaries) really had any idea that data security could directly affect physical security. Nor were they aware that literally all digital systems in existence around the world can be hacked. After all, we started our project long before Stuxnet, and even before Die Hard 4, where the cyber-baddies hacked and wrecked critical infrastructure. But as time has passed the general level of understanding of the threats has gradually – and increasingly conspicuously – risen… The serious problem of security of critical infrastructure started to be discussed at high-profile international conferences. Then, gradually, the topic started to spread into the imaginations of Hollywood (Die Hard 4, Skyfall…). Next, literally in the last year to 18 months, attention has risen still further – exponentially – to finally make the topic of cybersecurity one of the main topics at various top-level international summits and meetings of world leaders. Meanwhile, quietly in the background all this time, alchemists KL experts were toiling away in their workshops edging ever nearer to the unveiling of our very own OS! We realized that the operating system needed to have lots of different applications. First, it should provide a basis for the development of protected industrial control systems. Second, it should provide a basis for the development of protected embedded devices, including the IoT. Btw, the recent DDoS attack on Dyn’s DNS servers, which brought down sites like Amazon and Twitter, was carried out by a botnet that had infected ‘smart’ (actually, rather stupid:) devices like IP-cameras. The attack generated an astounding 1.2 terabytes a second – the biggest DDoS in history. So, I’m hoping it’s obvious by now how protecting the IoT and, of course, critical infrastructure (industry, transport, telecoms, etc.) from IT threats is simply mandatory. I also hope it’s clear that it’s better – no matter how difficult – to build IoT/infrastructure devices from the very beginning in such a way that hacking them is practically impossible. Indeed, that is a fundamental goal with Kaspersky OS. That was all mostly a teaser really. Coming up soon – more details about our secure operating system. Article source
  15. Antivirus Firm Kaspersky launches Its Own Secure Operating System The popular cyber security and antivirus company Kaspersky has unveiled its new hack-proof operating system: Kaspersky OS. The new operating system has been in development for last 14 years and has chosen to design from scratch rather than relying on Linux. Kaspersky OS makes its debut on a Kraftway Layer 3 Switch, CEO Eugene Kaspersky says in his blog post, without revealing many details about its new operating system. The Layer of 3-switch is the very first tool for running the Kaspersky OS, which is designed for networks with extreme requirements for data security and aimed at critical infrastructure and Internet of Things (IoT) devices. What's new in Kaspersky OS than others? Kaspersky OS is based on Microkernel Architecture: The new secure OS is based on microkernel architecture that enables users to customize their own operating system accordingly. So, depending on a user's specific requirements, Kaspersky OS can be designed by using different modifications blocks of the operating system. Kaspersky OS is non-Linux: Yes, one of the three major distinctive features of the new OS mentioned by Kaspersky is that the GUI-less operating system has been constructed from scratch and does not contain "even the slightest smell of Linux." But what makes Kaspersky OS Hack-Proof? It is the operating system's inbuilt security system. Yes, Kaspersky OS inbuilt security system has the ability to control the behavior of applications and the OS modules. Kaspersky OS claims itself as practically unhackable OS, because for gaining unauthorized access, any hacker would need to break the digital signature of an account holder, which is possible only with a quantum computer. Kaspersky talked about the recent DDoS attacks that affected numerous websites in past few months. He guaranteed that Kaspersky OS would protect devices, such as industrial control systems, SCADA or ICS, and IoTs, from cyber attacks. The most severe one was the recent massive DDoS attack on Dyn's DNS servers, which knock down popular sites like Amazon and Twitter. The attack was carried out by Mirai botnets that had infected smart devices like security cameras. So, Kaspersky says it is mandatory to protect the IoT and other critical infrastructure (like industry, transport, and telecoms) from IT threats. More details about Kaspersky's secure operating system is coming soon. Stay Tuned! Source
  16. Case “opened” against Microsoft, FAS Russia announces Microsoft’s problems in Russia continues, as the Federal Antimonopoly Service has decided to start an investigation against the Redmond-based software giant amid claims of unfair practices regarding antivirus software in Windows 10. Russian-based security company Kaspersky complained that Microsoft is abusing of its dominant position by forcing users to stick with Windows Defender in Windows 10, while also implementing changes that impact the adoption of third-party software. Founder Eugene Kaspersky explained that Microsoft has reduced the period of time the company offered to software developers for testing purposes from 2 months to 7 days, and this led to many security apps being flagged as incompatible and replaced with Windows Defender. The Federal Antimonopoly Service (FAS) is now investigating these claims, explaining that Microsoft might violate Part 1, Article 10 of the Federal Law regulating protection of competition. The law “prohibits actions (omissions) of an economic dominant with the dominant position that lead or can lead to preventing, restricting, eliminating competition and (or) infringing the interests of other persons (economic entities) in business activities or consumers at large.” Equality for all companies in Russia Russia says that it’ll look into accusations as it wants “equal conditions” for all companies doing business in the country. “Since Microsoft itself develops antivirus software - Windows Defender that switches on automatically if third-party software fails to adapt to Windows 10 in due time, such actions lead to unreasonable advantages for Microsoft on the software market. Our task is to ensure equal conditions for all participants on this market,” Deputy Head of FAS Anatoly Golomolzin explained in a statement. This isn’t Microsoft’s only problem in Russia, as the government has recently announced that it would ban LinkedIn, the service that Redmond purchased earlier this year, after it failed to move user data on local servers and comply with Russian laws. Furthermore, Microsoft is at the center of Russia’s push off foreign software, with President Vladimir Putin himself seeing the software giant as a main threat to national security, as he believes that products such as Windows and Office could be used by other governments to spy on the country. Microsoft hasn’t yet issued a statement on Kaspersky’s claim or on this investigation started by Russia, but we’ve already contacted the company and we’ll update the article when an answer is received. Article source Kaspersky vs Windows Defender
  17. Russian antivirus vendor Kaspersky Lab has asked antitrust regulators in various countries (including the European Union and Russia) to make Microsoft stop giving an unfair advantage to Windows Defender. Microsoft is making it hard for independent virus vendors to compete with Windows Defender, Microsoft’s own antivirus application built-in to Windows 8 and Windows 10, according to founder of Kaspersky Lab, Eugene Kaspersky. For example, when users upgraded to Windows 10, their own antivirus product was disabled and Windows Defender was enabled by default. Another showcase of Microsoft’s way of making it harder to compete is that antivirus companies only received a week to make their antivirus software compatible with Windows 10. And even when the antivirus software was compatible, Windows Defender would be enabled nevertheless. If Windows Defender was disabled (and other antivirus software was running) it would show a warning, asking the user to uninstall their antivirus software and to turn on Windows Defender. Kaspersky argues that many users would think, “well, it’s from Microsoft – the people who make the OS; must be good; no harm in turning it on for sure”. Another complaint Kaspersky has is that Microsoft has limited the possibilities antivirus companies have to warn users that their license is about to expire. Microsoft only allows a warning in the Windows Security Center, which normally users hardly ever read. If the user doesn’t timely extend his license, the antivirus software is disabled and Windows Defender is activated. Kaspersky also criticizes the fact that Microsoft has limited the number of virus scanners users can have on a single system. One antivirus application is normally allowed, except for Microsoft’s own Windows Defender. Even when another antivirus application is installed, Windows Defender will occasionally become active and again ask the user to turn on Windows Defender and uninstall other antivirus applications. And all of it is not even beneficial to the user. “Defender gives by far not the best experience, but a below average one in the market,” Kaspersky writes in a blog titled, ‘That’s It. I’ve Had Enough!’ He also has an idea what Microsoft is up to, “The trend is clear: Microsoft is gradually squeezing independent developers out of the Windows ecosystem if it has its own application for this or that purpose.” Kaspersky goes on stating, “The company’s [Microsoft’s] intentions are easy to work out: (i) to try and get everyone to head over to the Windows Store; (ii) to levy an additional tax on independent developers; (iii) to strictly control who can do what; (iv) to suppress the competition with standardization and regulation; and (v) to further gradually take over the whole ecosystem – all to provide stable growth of profits. Put another way – to have a totalitarian/police-state platform in which there’s no place for independent developers or freedom of choice for users.” Kaspersky Lab has therefore decided to take action, “We’ve taken the decision to address official bodies in various countries (including the EU and Russia) with a request to oblige Microsoft to cease its violation of anti-competition legislation and to remove the consequences of that violation.” The company wants Microsoft to provide new versions and updates of Windows to independent developers in good time so they can maintain compatibility of their software to Windows. It also wants to force Microsoft to explicitly inform the user of the presence of incompatible software before upgrading Windows and to recommend the user to install a compatible version of the software after the upgrade and to always explicitly ask the user for his/her approval to enable Windows Defender. Also other antivirus vendors are unhappy according to Kaspersky, “Despite Microsoft slowly killing off the independent security industry, so far, we’re the only ones who have bitten the bullet and decided to say something about this publicly.” Kaspersky also warns that not only security companies should be worried about Microsoft’s business tactics, also other software developers on the Windows platform are in danger. Therefore Kaspersky calls for all independent software developers to “form an united front and all fight together”. Article source
  18. If you refuse to pay up, the malware vanishes from your PC -- but leaves everything fully encrypted. Kaspersky has released a decryption tool for the Polyglot ransomware to assist victims in recovering their files without giving in and paying a fee. On Monday, the cybersecurity firm launched the free tool (.ZIP), which is suitable for the Polyglot Trojan which is also known as MarsJoke, a strain which has been linked to attacks on government targets. Ransomware is a particularly nasty kind of malware which has hit the headlines over the past year after targeting victims including businesses, hospitals and universities. What makes the malware strain particularly devastating -- for organizations and the general public alike -- is its ability to take away access to files and content stored on a compromised machine. Once ransomware such as MarsJoke, Cerber or CTB-Locker is downloaded and executed -- often finding its way onto a PC through phishing emails or malicious links -- the ransomware encrypts files and in some cases, full hard drives. Once the victim can no longer access their machine, a holding page informs them that they must pay a "fee" in return for a decryption key which will release their content back to them. Polyglot infects PCs through spam emails which have malicious RAR archives attached. When infecting a machine, this family of ransomware blocks access to files and then replaces the victim's desktop wallpaper with the ransom demand, which is made in virtual currency Bitcoin. Many types of ransomware will simply sit on the machine for the payment to be made. However, Polyglot insists on a payment deadline and if the blackmail fails and no money is sent to the operators, the malware will delete itself -- leaving behind a machine with encrypted files and no way to retrieve them. Until now, at least. Kaspersky's tool will decrypt these machines and unlock user data. According to the security firm, although Polyglot looks similar to the severe CTB-Locker ransomware, the malware uses a weak encryption key generator. On a standard home PC, it takes less than a minute to brute-force the full set of possible Polyglot decryption keys -- which gives you an idea of actually how weak the malware is. This weakness also provided a path for Kaspersky to exploit to create the decryption tool. Anton Ivanov, senior malware analyst at Kaspersky Lab commented: If you are suffering from a different type of ransomware, it is worth checking out the No More Ransom project to see which decryption tools are available to you. The project is a joint initiative between Kaspersky Lab, the National High Tech Crime Unit of the Netherlands' police, Europol's European Cybercrime Centre and Intel Security, designed to help users recover their data without giving into the cybercriminals and paying up. Article source
  19. UK Banking Chief Raises Concerns Over Security Of Biometric Authentication Kaspersky Lab research finds 12 skimmers for sale that steal fingerprints, could pose threats to ATM banking Biometric data is increasingly playing a strategic role in end-user authentication, and banking regulators in the UK are concerned just how secure it might be in light of a recent report by Kaspersky Lab. In an investigation into underground cybercrime, Kaspersky found at least 12 sellers offering ATM skimmers capable of stealing fingerprints. Furthermore, Kaspersky identified three underground sellers researching devices that could obtain data from palm vein and iris recognition systems. The report drew the attention of the UK's Treasury Select Committee, which oversees treasury, revenue and customs, and the Bank of England. The committee's chief, Andrew Tryie, is asking banking regulators to look into consequences surrounding stolen biometric data. In a letter to industry and government, he said, "Banks and regulators will need to plan for what they will do if biometric details are lost and/or illegally obtained by third parties." He asked regulators if they shared his concerns, and he went on to say plans would need to be developed to deal with customers who may be victims of biometric hacks. The main concern with biometric identifiers is that they cannot be revoked and replaced by a new identifier like in the case of a stolen password. The concern is real in the US where 5.6 million fingerprint records were stolen during the breach of the United States Office of Personnel Management in the summer of 2015. US agencies created a working group to see how cyber attackers could use fingerprint data. This group includes the FBI, Department of Homeland Security, Department of Defense, and other members of the intelligence community. "The problem with biometrics is that unlike passwords or pin codes, which can be easily modified in the event of compromise, it is impossible to change your fingerprint or iris image," Olga Kochetova, security expert at Kaspersky Lab, said in a release surrounding the Kaspersky investigation. "Thus, if your data is compromised once, it won't be safe to use that authentication method again. That is why it is extremely important to keep such data secure and transmit it in a secure way." Kaspersky Lab also reported discussions in underground communities regarding development of mobile applications that rely on placing masks over a human face. With such an app, attackers can take a person's photo posted on social media and use it to fool a facial recognition system, the report said. Source
  20. Hack a rival? We're not cool with that, says Russian AV titan Kaspersky Lab is the first big vendor to publicly rip up its contract with disgraced security reseller Quadsys in the wake of the hacking scandal that the company’s bosses recently admitted to. On 22 July, Quadsys owner Paul Streeter, MD Paul Cox, director Alistair Barnard, account manager Steve Davis and security consultant Jon Townsend pleaded guilty to securing unauthorised access to computer material, contrary to section 1 of the Computer Misuse Act 1990. The five were charged in summer 2015 with hacking into a rival’s database to plunder customer information and pricing details. Sentencing is set for 9 September but ahead of that, Kaspersky Lab has distanced itself from Quadsys, which was accredited as a Kaspersky Gold partner, the vendor’s top tier certification. “One of the company’s key assets is its credibility in the eyes of its clients,” a spokeswoman at the Russian-headquartered antivirus business told us after we’d sent a bunch of questions to CEO Eugene Kaspersky. “We are committed to business ethics and adhere to the highest standards of transparency in all areas of our business and as such, we have terminated our business relationship with Quadsys,” she added. El Reg asked Kaspersky when it ripped up the contract but the company was unable to immediately confirm this. Sophos, another company that awarded Quadsys a high-level certification, was less than forthcoming about its relationship with the reseller when we asked if it wanted to continue recommending customers buy from an organisation run by directors who hacked a rival. The company told us “Sophos isn’t able to comment on this at this time”. Sophos had actually promoted Quadsys to its platinum certification on 1 August, just nine days after the Quadsys Five pleaded guilty at Oxford Crown Court, according to Quadsys' own Twitter feed. Similarly, we put questions to Intel Security but have yet to hear back from head of PR for EMEA, Michelle Spencer. We were unable to find Quadsys on Intel Security’s official ‘find a partner’ web tool which lists suppliers to buy from. We are awaiting comment from Quadsys. Article source
  21. Good day nsaners, I'm looking for a dark theme for Kaspersky Total Security (Latest version) v17.0.0.611 if anyone knows of one it would be much appreciated , Thanks
  22. Kaspersky fixes three DoS flaws, one information leak bug Russian security vendor Kaspersky Lab has recently patched four vulnerabilities in its flagship product, the Kaspersky Internet Security Suite, which allowed attackers to crash the antivirus and disclose information from the computer's memory. The Cisco Talos team has identified these four issues (CVE-2016-4304, CVE-2016-4305, CVE-2016-4306, and CVE-2016-4307) affecting the product's KLIF, KLDISK and KL1 drivers, used to interact with underlying Windows APIs. One bug is an information disclosure vulnerability, and the other three are DoS (Denial of Service) issues that crash the application. DoS bugs are considered annoying at best and are low-priority security issues in most software applications, but this doesn't apply to antivirus engines (or "security systems," since nobody calls them antiviruses anymore). "Although these vulnerabilities are not particularly severe, administrators should be aware that security systems can be used by threat actors as part of an attack, and keep such systems fully patched," the Cisco Talos team notes in their advisory. DoS bugs can have serious consequences in AV products An attacker who can run code on a machine with the Kaspersky antivirus installed could feed the antivirus malicious code that could crash the security product, which would allow them to run further malicious code without the antivirus blocking their actions. The information leak bug could also be used to leak data from the memory and gain details about where certain processes are executing, data needed to plan further attacks and craft targeted exploits. Kaspersky has addressed all issues with updates to its Internet Security Suite. Earlier this month, at the Black Hat USA 2016 security conference in Las Vegas, Kaspersky announced it was starting a bug bounty program that would reward security researchers for finding and privately disclosing security bugs in its software. Kaspersky's decision was overshadowed by Apple's similar announcement, the Cupertino tech giant announcing a bug bounty program of its own. Article source
  23. There are many different ways to get a strong password – there are online password generators (like the Norton password generator), there are offline password generators tools (like our PassGen tool), some of the web browsers like Google Chrome come with an automatic password suggestion feature and then there are smartphone apps that can generate passwords for you. On top of all these, you can also manually make your own password by following a set of rules (for example, use a password of at least 8-12 characters long, use mixed case letters, numerals and special characters, do not repeat characters and do not use the dictionary words). But how would you know if the password that you have created is really strong enough to withstand the brute-force attacks by the powerful modern processors. While you are patting your back at successfully making up a password that you think is very strong, the password could be easily brute-forced even by the cheapest notebook computers. An easy way to get an idea of the strength of your password is by using the Kaspersky Secure Password Check web app. On this web app, all you have to do is enter your password and it will tell you of the password security and if it suffers from some known problems (like dictionary words or repeated letters). However, Kaspersky Secure Password Check web page warns you not to enter your actual password as the service exists only for educational purpose (to learn how to get the securest and strongest passwords). On the top it displays how much time an average home computer will take to crack down your password. At the bottom, it displays a colorful bar chart about how much time it will take for various systems to brute-force your password. It shows the time duration that would be taken by now-discontinued 1980’s computer, by Macbook Pro, by Conficker botnet and by Tianhe 2 -the most powerful supercomputer in the world. You can use Secure Password Check tool to understand the basics of password security like how many characters you should use, the character set you should use, whether repeated or common known passwords reduce password security, whether dictionary words make the password weaker and so on. Visit the Kaspersky Secure Password Check. Article source
  24. Beginning more than a decade ago, one of the largest security companies in the world, Moscow-based Kaspersky Lab, tried to damage rivals in the marketplace by tricking their antivirus software programs into classifying benign files as malicious, according to two former employees. They said the secret campaign targeted Microsoft Corp (MSFT.O), AVG Technologies NV (AVG.N), Avast Software and other rivals, fooling some of them into deleting or disabling important files on their customers' PCs. Some of the attacks were ordered by Kaspersky Lab's co-founder, Eugene Kaspersky, in part to retaliate against smaller rivals that he felt were aping his software instead of developing their own technology, they said. "Eugene considered this stealing," said one of the former employees. Both sources requested anonymity and said they were among a small group of people who knew about the operation. Kaspersky Lab strongly denied that it had tricked competitors into categorizing clean files as malicious, so-called false positives. "Our company has never conducted any secret campaign to trick competitors into generating false positives to damage their market standing," Kaspersky said in a statement to Reuters. "Such actions are unethical, dishonest and their legality is at least questionable." Executives at Microsoft, AVG and Avast previously told Reuters that unknown parties had tried to induce false positives in recent years. When contacted this week, they had no comment on the allegation that Kaspersky Lab had targeted them. The Russian company is one of the most popular antivirus software makers, boasting 400 million users and 270,000 corporate clients. Kaspersky has won wide respect in the industry for its research on sophisticated Western spying programs and the Stuxnet computer worm that sabotaged Iran's nuclear program in 2009 and 2010. The two former Kaspersky Lab employees said the desire to build market share also factored into Kaspersky's selection of competitors to sabotage. "It was decided to provide some problems" for rivals, said one ex-employee. "It is not only damaging for a competing company but also damaging for users' computers." The former Kaspersky employees said company researchers were assigned to work for weeks or months at a time on the sabotage projects. Their chief task was to reverse-engineer competitors' virus detection software to figure out how to fool them into flagging good files as malicious, the former employees said. The opportunity for such trickery has increased over the past decade and a half as the soaring number of harmful computer programs have prompted security companies to share more information with each other, industry experts said. They licensed each other's virus-detection engines, swapped samples of malware, and sent suspicious files to third-party aggregators such as Google Inc's (GOOGL.O) VirusTotal. By sharing all this data, security companies could more quickly identify new viruses and other malicious content. But the collaboration also allowed companies to borrow heavily from each other's work instead of finding bad files on their own. Kaspersky Lab in 2010 complained openly about copycats, calling for greater respect for intellectual property as data-sharing became more prevalent. In an effort to prove that other companies were ripping off its work, Kaspersky said it ran an experiment: It created 10 harmless files and told VirusTotal that it regarded them as malicious. VirusTotal aggregates information on suspicious files and shares them with security companies. Within a week and a half, all 10 files were declared dangerous by as many as 14 security companies that had blindly followed Kaspersky's lead, according to a media presentation given by senior Kaspersky analyst Magnus Kalkuhl in Moscow in January 2010. When Kaspersky's complaints did not lead to significant change, the former employees said, it stepped up the sabotage. INJECTING BAD CODE In one technique, Kaspersky's engineers would take an important piece of software commonly found in PCs and inject bad code into it so that the file looked like it was infected, the ex-employees said. They would send the doctored file anonymously to VirusTotal. Then, when competitors ran this doctored file through their virus detection engines, the file would be flagged as potentially malicious. If the doctored file looked close enough to the original, Kaspersky could fool rival companies into thinking the clean file was problematic as well. VirusTotal had no immediate comment. In its response to written questions from Reuters, Kaspersky denied using this technique. It said it too had been a victim of such an attack in November 2012, when an "unknown third party" manipulated Kaspersky into misclassifying files from Tencent (0700.HK), Mail.ru (MAILRq.L) and the Steam gaming platform as malicious. The extent of the damage from such attacks is hard to assess because antivirus software can throw off false positives for a variety of reasons, and many incidents get caught after a small number of customers are affected, security executives said. The former Kaspersky employees said Microsoft was one of the rivals that were targeted because many smaller security companies followed the Redmond, Washington-based company's lead in detecting malicious files. They declined to give a detailed account of any specific attack. Microsoft's antimalware research director, Dennis Batchelder, told Reuters in April that he recalled a time in March 2013 when many customers called to complain that a printer code had been deemed dangerous by its antivirus program and placed in "quarantine." Batchelder said it took him roughly six hours to figure out that the printer code looked a lot like another piece of code that Microsoft had previously ruled malicious. Someone had taken a legitimate file and jammed a wad of bad code into it, he said. Because the normal printer code looked so much like the altered code, the antivirus program quarantined that as well. Over the next few months, Batchelder's team found hundreds, and eventually thousands, of good files that had been altered to look bad. Batchelder told his staff not to try to identify the culprit. "It doesn't really matter who it was," he said. "All of us in the industry had a vulnerability, in that our systems were based on trust. We wanted to get that fixed." In a subsequent interview on Wednesday, Batchelder declined to comment on any role Kaspersky may have played in the 2013 printer code problems or any other attacks. Reuters has no evidence linking Kaspersky to the printer code attack. As word spread in the security industry about the induced false positives found by Microsoft, other companies said they tried to figure out what went wrong in their own systems and what to do differently, but no one identified those responsible. At Avast, a largely free antivirus software maker with the biggest market share in many European and South American countries, employees found a large range of doctored network drivers, duplicated for different language versions. Avast Chief Operating Officer Ondrej Vlcek told Reuters in April that he suspected the offenders were well-equipped malware writers and "wanted to have some fun" at the industry's expense. He did not respond to a request on Thursday for comment on the allegation that Kaspersky had induced false positives. WAVES OF ATTACKS The former employees said Kaspersky Lab manipulated false positives off and on for more than 10 years, with the peak period between 2009 and 2013. It is not clear if the attacks have ended, though security executives say false positives are much less of a problem today. That is in part because security companies have grown less likely to accept a competitor's determinations as gospel and are spending more to weed out false positives. AVG's former chief technology officer, Yuval Ben-Itzhak, said the company suffered from troves of bad samples that stopped after it set up special filters to screen for them and improved its detection engine. "There were several waves of these samples, usually four times per year. This crippled-sample generation lasted for about four years. The last wave was received at the beginning of the year 2013," he told Reuters in April. AVG's chief strategy officer, Todd Simpson, declined to comment on Wednesday. Kaspersky said it had also improved its algorithms to defend against false virus samples. It added that it believed no antivirus company conducted the attacks "as it would have a very bad effect on the whole industry." "Although the security market is very competitive, trusted threat-data exchange is definitely part of the overall security of the entire IT ecosystem, and this exchange must not be compromised or corrupted," Kaspersky said. Article source