Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'kaspersky'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 130 results

  1. Kaspersky [Medicine-Discussion-Knowledge Base Info] ================================================================= Official Download Links: ---------------------------------------- Download Links: Kaspersky 2018 MR0 [en-us] l KIS l KAV l KTS l KFA l release notes l Alternative Direct Download Links: http://txt.do/dkw40 Removal tool for Kaspersky Lab products l 91 Days OEM Trial Keys ================================================================= Kaspersky 2017 MR0 en-us l KIS l KAV l KTS5 l KSOS l release notes l Kaspersky KAV,KIS,KTS 2017 Inc. Patch E Without Secure Connection [English] Kaspersky 2016 MR1 en-us l KIS l KAV l KTS5 l release notes l Kaspersky 2015 MR2 en-us l KIS l KAV l KTS5 l release notes l ================================================================= Kaspersky 2017 MR0 Other Available Languages Official Download Links Kaspersky 2016 MR1 Other Available Languages Official Download Links If you already had previous version of Kaspersky I strongly suggest to use Removal tool to Uninstall Kaspersky Lab products >>> [More Info & Download Link] KIS/KAV 2014-2015-2016-2017 90 Days OEM Trial Keys: ---------------------------------------------- ================================================================= Kaspersky 2016 Activation Medicine: ----------------------------------- Kaspersky Reset Trial [Multi]: ----------------------------------------- OS: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003Bit OS: 32 (x86), 64 (x64) Development Team: leo1961 >> , Streamdat, Maksim1876. : ) Interface Screenshots: Supported anti-virus products / Version History Instruction: ------------ Download Link: ------------- Kaspersky Reset Trial ================================================================= Kaspersky Promotions / Giveaways: ============================ Kaspersky Total Security - Multi-Device 90 Days Activation Code ================================================================= Kaspersky 2015 MR2 >>> ================================================================= Kaspersky Tools/Important Post Replies/Knowledge Base Information's: ------------------------------------------------------------ Kaspersky Small Office Security (5) Final Kaspersky 2015 MR2 (Android) Kaspersky Antivirus & Security Kaspersky 2018.0.0.405 Technical Release With Patch "A" (en-US) ------------------------------------------------------------ Kaspersky Virus Removal Tool [Free] Some Useful Kaspersky Product Tools Kaspersky 2017 Dark Skin How to Stop and Disable Kaspersky 2017/2018 Secure Connection How to disable daily trial notification in Kaspersky 2018 v18.0.0.x products [KTS/KIS/KAV] How to disable daily trial notification in Kaspersky 2017 v17.0.0.x products [KTS/KIS/KAV] Kaspersky prevents the opening of some sites and Google Search How to restore default settings -Import-Export Setting in Kaspersky Kaspersky Extract Code by leo1961 How to manually install Kaspersky Beta Patch Disable registration requirement in Kaspersky 2016 v16.0.1.x products [KTS-KIS-KAV] How to create exclusion rules in Kaspersky Kaspersky Trial is expired and disable and Self-Defense function not available Kaspersky 2016 Official Useful Info's - Tips - Instructions How to block Internet access using Firewall How to configure Kaspersky Internet Security 2016 for better performance of your computer How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2016 How to change the network status How to disable news/promotional notification How To Disable Last License Notification Time Kaspersky 2016 Private Browsing [New Feature] & Pop Up Blocking Option Version designations of Kaspersky How to enable or disable downloading new versions of Kaspersky Migration Upgrading Between Kaspersky 2016 Product KIS-KAV-KTS Compatibility of Kaspersky Anti-Virus and Comodo Firewall How To Gather Offline Databases From Previous Installed Kaspersky Products How To activate Kaspersky & Bypass Region Mismatch Error Kaspersky Small Office Security Final How to use .lic file to activate Kaspersky Product & activation backup / restore Kaspersky application automatically downloads new version and installs it on top of the current one Kaspersky Rescue Disk 10.x.xx.xx [updated every Sunday] Kaspersky Anti-Virus 2016 for free for three months [French Promotion] Kaspersky Free Anti-Virus (KFA) / 365 2016 MR1 [EN Localization] How to create and open Sharecode.! ================================================================= november_ra1n 17 July 2015 =================================================================
  2. Two months ago, Russian security software firm Kaspersky Labs filed antitrust complaints against Microsoft in Europe, alleging that the software giant was favoring its own Windows Defender over third-party anti-virus software in Windows 10. In response to that lawsuit, Microsoft has made changes to how the forthcoming Windows 10 Fall Creators Update works with anti-virus software, and an appeased Kaspersky has dropped its complaint. Writing about the situation, Rob Lefferts, Partner Director, Windows Enterprise and Security, says "Our top priority is and always will be to protect our customers with security innovations for the Windows platform, increase our customers’ pre- and post-breach security stance, and provide a platform that offers choice. We work closely with AV partners like Kaspersky Lab, and at our Microsoft Virus Initiative forum last month, we made great progress in building upon our shared understanding of how we deliver Windows 10 updates and security experiences that help ensure the ongoing safety of Windows customers." As a result of these discussions, Microsoft says it plans to make the following changes: We will work more closely with AV vendors to help them with compatibility reviews in advance of each feature update becoming available to customers. This means customers can expect we will have worked through compatibility issues with AV providers before offering the update to customers running that AV. We will give AV partners better visibility and certainty around release schedules for feature updates. This includes increasing the amount of time AV partners will have to review final builds before the next Windows 10 feature update is rolled out to customers. We will enable AV providers to use their own alerts and notifications to renew antivirus products before and after they have expired. We have modified how Windows will inform users when their antivirus application has expired and is no longer protecting them. Instead of providing an initial toast notification that users could ignore, the new notification will persist on the screen until the user either elects to renew the existing solution or chooses to rely on Windows Defender or another solution provider. Article source Windows Blogs: Evolving our Windows approach to AV, thanks to partner feedback
  3. Kaspersky Endpoint Security 10 Service Pack 2 for Windows Kaspersky Endpoint Security 10 Support >>> hOMEPAGE: http://aes.kaspersky-labs.com/english/endpoints/kes10windows/ Kaspersky Endpoint Security 10 SP2 English Download Link: AES256 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes256.exe ES56 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes56.exe Other Languages Download Links: Other Languages Download Links: http://aes.kaspersky-labs.com/ Release Notes: Kaspersky Endpoint Security 10 Service Pack 2 for Windows Version 03/28/2017 How to activate using key files: 1. Click License Tab on the left corner 2. Click red cross delete the existing trial or block keys. 3. Hit Activate the application under a new license 4. Click activate with a key file and browse the key file Next to activate How to renew activation code for Kaspersky Endpoint Security 10 for Windows Activate Via Key File: https://support.kaspersky.com/us/13085#block1 MEDICINE: .lic file download Links see the topic reply there --> How to Activate Via Key File
  4. Kaspersky’s antivirus software has received the maximum points in the most recent Windows 10 antivirus tests performed by German labs AV-TEST, along with security products from Symantec and Trend Micro. Kaspersky’s security products have recently been banned by the US government over concerns of possible ties with the Russian government, despite comments issued by the company denying any collaboration with state agencies. And despite being banned by the US authorities, Kaspersky continues to be one of the top security vendors on the market, with both Endpoint Security and Small Office Security being rewarded with the maximum 18 points following their performance in protection, performance, and usability tests. Symantec’s Endpoint Protection and Endpoint Protection Cloud also got the top score, just like Trend Micro’s Office Scan that received 6 out of 6 points for each of the three tests. Microsoft gets the lowest score Bitdefender, which continues to be one of the most powerful security vendors in the world, is also among the best, with its Endpoint Security solution getting 17.5 points, only one 0.5 points behind leader Kaspersky. Bitdefender got 6 points for protection and performance, but lost 0.5 points in usability. As far as Microsoft’s very own System Center Endpoint Protection solution is concerned, it received just 14.5 points, which is the lowest score a security product got in the latest round of tests. Specifically, Microsoft’s tool received 5 points for protection and performance, and 4.5 points for usability. This means not only that it slows down the system, but it also let some malware samples pass through, which is worrying to say the least. The only solution that also received the minimum 14.5 points score is F-Secure Client Security, which got 6 points for protection, but 4 and 4.5 points for performance and usability, respectively. All these security products have been tested on Microsoft’s Windows 10 Creators Update, also known as version 1703, and which was released in April this year. < Here >
  5. Comes just weeks after US government cracked down on Russian firm THE UK'S NATIONAL CYBER SECURITY CENTRE (NCSC) has this week that it has never certified Kaspersky's security software, just a week after the Trump administration booted the firm from two of its approved suppliers lists. "The NCSC certifies products through a range of initiatives, and vendors apply to have their products certified via one of our accredited lab partners," the organisation said in a short statement to Reuters on Tuesday. "We certify products through a range of initiatives, but the NCSC has never had products listed from Kaspersky." The certification process is used, for example, to certify routers and other networking equipment deployed by BT and other network operators in the UK. Before the establishment of the NCSC, it was a function of the communications agency GCHQ. The admission by the UK's state-run IT security organisation comes after authorities in the US removed Kaspersky from two public sector purchasing lists. That decision meant that government bodies in large swathes of the US public sector are barred from buying Kaspersky products, although they can continue using Kaspersky software that is already installed. The GSA's priorities "are to ensure the integrity and security of US government systems and networks", a spokesperson told Reuters. Kaspersky responded to the decision by claiming that it was caught in the crossfire of a US-Russia geopolitical battle. "Kaspersky Lab has no ties to any government, and the company has never helped, nor will help, any government in the world with its cyberespionage efforts," the company's press spokesperson told the RIA news agency. "Kaspersky Lab has no ties to any government, and the company has never helped, nor will help, any government in the world with its cyber espionage efforts," the company's press spokesperson told the RIA news agency. The UK's NCSC was only established as part of GCHQ in October 2016 following an announcement by the Chancellor in November 2015. At the time, the government said that it would "bring the UK's cyber expertise together to transform how the UK tackles cyber security issues". The statement continued: "It will be the authoritative voice on information security in the UK… Our objectives are to raise awareness of government intent; undertake genuine dialogue that shapes service delivery; demonstrate serious commitment to listen; and develop sustainable engagement channels." Article source
  6. Kaspersky Lab Products Remover 1.0.1266.0 Portable Kaspersky is one of the leading antivirus companies with a very good background in antivirus solutions.Kaspersky offers its customers state of the art antivirus solutions and security products to keep their systems safe from all kinds of digital threats. Kaspersky is one of the leading antivirus companies with a very good background in antivirus solutions.Kaspersky offers its customers state of the art antivirus solutions and security products to keep their systems safe from all kinds of digital threats. Unfortunately, when you try to uninstall these products via the built-in uninstaller in Windows, various errors may occur. The applications might not be uninstalled completely and remnants of the programs may still be found on your system. Kaspersky Anti-Virus Remover is a small utility that enables you to easily uninstall various Kaspersky products from your computer. The application can remove the following programs from your PC: Kaspersky Small Office Security 2 for Personal Computer / for File Server, Kaspersky PURE / PURE R2, Kaspersky Anti-Virus (all versions), Kaspersky Internet Security (all versions), Kaspersky Password Manager (all versions), AVP Tool driver and Kaspersky Lab Network Agent 8. By default, the application automatically detects Kaspersky programs and offers to uninstall them. However, if the product was not detected, you can manually select it from the given list. When you are not sure about which Kaspersky product is installed on your machine the “Remove all known products” option can come in handy. Selecting it automatically removes all traces of all the supported applications from your system without the need of pointing it to any of them. After you have chosen the desired product you have to enter a security code in order to start the removal process. If you want to safely uninstall your Kaspersky products and remove all traces from your hard drive, Kaspersky Anti-Virus Remover will do the trick. The removal utility can be used to remove the following products: AVP Tool Driver KPM 8 MR1/MR2 Kaspersky Anti-Virus 2009 Kaspersky Anti-Virus 2010 Kaspersky Anti-Virus 6.0 FS MP4 Kaspersky Anti-Virus 6.0 SOS MP4 Kaspersky Anti-Virus 6.0 WKS MP4 Kaspersky Anti-Virus 6.0 for Windows Servers Kaspersky Anti-Virus 6.0 for Windows Workstations Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) MR1 Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) SP2 Kaspersky Anti-Virusflnternet Security 2011 Kaspersky Anti-Virusflnternet Security 2012 Kaspersky Anti-Virusflnternet Security 2013 Kaspersky Anti-Virusflnternet Security 2014 Kaspersky Anti-Virusflnternet Security 2015 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security Kaspersky Anti-VirusInternet SecurityKaspersky Total Security Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2016 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2017 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2018 Kaspersky Endpoint Security 10 for Windows Kaspersky Endpoint Security 10 for Windows Service Pack 1 MRl Kaspersky Endpoint Security 8 Kaspersky Fraud Prevention for Endpoint Kaspersky Fraud Prevention for Endpoint 2015 Kaspersky Fraud Prevention for Endpoint 2016 Kaspersky Internet Security 2009 Kaspersky Internet Security 2010 Kaspersky Lab Network Agent 8,9 Kaspersky Network Agent 10 Kaspersky PURE 2.0 / CRYSTAL Kaspersky PURE 3.0 / CRYSTAL Kaspersky PURE/CRYSTAL Kaspersky Password Manager 4/5 Kaspersky Security Scan Kaspersky Small Office Security Kaspersky Small Office Security Kaspersky Small Office Security 3 Nifty Security24 Internet Security Nifty Security24 Internet Security 2013 How to use: Homepage: http://www.kaspersky.com/ Download EXE: http://media.kaspersky.com/utilities/ConsumerUtilities/kavremvr.exe Download ZIP: http://media.kaspersky.com/utilities/consumerutilities/kavremvr.zip
  7. [An informative article:] Eugene Kaspersky, the CEO of the Russian cyber-security software firm that bears his name, had a big American dream. He wanted his company to go beyond selling antivirus software to consumers and small businesses and become a major vendor to the US government - one of the world's biggest buyers of cyber-security tools. Kaspersky set up a US subsidiary, KGSS, in Arlington, Virginia that would be focused on winning that business. He sponsored flashy conferences with high-profile speakers -including Michael Flynn, who was briefly President Donald Trump's national security adviser - sought to join US trade groups and even underwrote programming on National Public Radio. All of this was done to burnish Kaspersky's image and help it become an accepted vendor for the US government despite its Russian roots, according to people familiar with the strategy. But Eugene Kaspersky was never able to overcome lingering suspicions among US intelligence officials that he and his company were, or could become, pawns of Russia's spy agencies. Kaspersky "has never helped, nor will help, any government in the world with its cyberespionage efforts," the company said. Kaspersky's American ambitions were further eroded by the sharp deterioration in US-Russia relations following Russia's invasion of Crimea in 2014, and later when US intelligence agencies concluded that Russia had hacked the 2016 US presidential election. Testifying before the US Congress in May, US intelligence chiefs for the first time publicly expressed doubt that Kaspersky products could be trusted. FBI agents last month interviewed Kaspersky employees, asking whether they reported to Russia-based executives and how much data from American customers could be seen by Russian employees, according to three current and former employees. The FBI declined to comment on Thursday. On Tuesday, the US General Services Administration, the government agency that manages the federal bureaucracy, removed Kaspersky from a list of approved vendors, saying GSA's mission was to ensure the security of US government systems. There is also a bill before Congress that would explicitly bar the Defense Department from using any Kaspersky products. Kaspersky says his company is being targeted for political reasons. "These reckless actions negatively impact global cyber-security by limiting competition, slowing down technology innovations and ruining the industry and law enforcement agency cooperation required to catch the bad guys," he said in a statement to Reuters. The Arlington offices of KGSS were empty when a Reuters reporter visited them on Thursday. A Kaspersky spokeswoman said most of the staff, which number less than 10, often work from home. The US clampdown comes even though officials have offered no public evidence to suggest the company has done anything untoward or that the Russian government is using its software to launch cyber-attacks. Two former employees and a person briefed on the FBI case told Reuters that Kaspersky software has at times inappropriately inspected and removed files from users' machines in its hunt for alleged cyber criminals, even when those files were not corrupted by viruses. "Kaspersky Lab believes it is completely unacceptable that the company is being unjustly accused without any hard evidence to back up these false allegations," the Kaspersky spokeswoman said in response in an email. Unusual step It is extremely rare for a company to be singled out for federal buying restrictions in the absence of clear evidence of wrongdoing. "This sets a really dangerous precedent" where other nations could make similar, unsubstantiated claims against US vendors, said Robert M. Lee, a former cyberwarfare operative for US intelligence and now CEO of cyber-security startup Dragos. The Russian government has denounced the Kaspersky crackdown and said it does not rule out retaliatory measures. Officials at US tech companies with significant operations in Russia say they fear they could become targets. Federal contracting databases reviewed by Reuters show only a few hundred thousand dollars in purchases from Kaspersky, and an employee confirmed the company's federal government revenue was "miniscule." But Kaspersky also sells to federal contractors and third-party software companies that incorporate its technology in their products, so its technology may be more widely used in government than it appears from the contracting databases, US officials say. Founded in 1997, Kaspersky grew rapidly through the 2000s to become one of the world's leading anti-virus software companies. But the company was dogged from the start by suspicions about its ties to Russia's Federal Security Service (FSB), the main successor to the KGB. Eugene Kaspersky attended a KGB school and the company has acknowledged doing work for the FSB. As the company grew, Kaspersky was determined to overcome those fears. "We have to be more American than Americans," Kaspersky told Reuters in 2013, when a US goodwill offensive began. "Public shaming" A cornerstone of the effort was a series of KGSS-hosted conferences in Washington where prominent US officials including Flynn, a former Defense Intelligence Agency director, former CIA and NSA Director Michael Hayden and House of Representatives Homeland Security Committee Chairman Michael McCaul discussed cyber-security issues. The company privately courted US intelligence and law enforcement officials by sending experts to brief them on nation-state hacking campaigns uncovered by the firm, according to people present at those meetings. "They came to us and said, 'We want to change our image, we know people don't trust us'," said one former senior Obama administration official who took part in some of those meetings. But the suspicions never subsided. When the company sought to join one Washington-based technology trade organization, it was "politely told it couldn't happen," according to an industry source with direct knowledge of the matter. The source said industry group officials had an inside joke: "Kaspersky (membership) is like having the Kremlin join." Not coincidentally, Kaspersky's government sales effort never gained traction. In an email to Reuters, the company noted "complexities associated with doing business with North America's government sector." Privately held Kaspersky said its US revenue, most of which comes from selling antivirus software to consumers and small businesses, slipped from $164 million in 2014 to about $156 million in 2016. Some US national security experts say Kaspersky is being treated unfairly. Lee said he has long been bothered by the "public shaming" of Kaspersky by people who make allegations without presenting evidence. The US government has the right to choose not to use Kaspersky products for any reason, he said, but "the way they are doing it" is wrong. "I don't believe in geographic restrictions that say, 'Because Kaspersky is a Russian-based company, therefore it is bad,'" said former White House cyber-security policy coordinator Michael Daniel. "You would want your decision to be based on actual corporate bad behavior." < Here >
  8. The Trump administration is on the verge of deciding whether to block all federal agencies from using products developed by a popular Russian cyber-security firm, which is under increasing scrutiny for alleged ties to Russian intelligence services, government sources familiar with the matter told ABC News. A final decision could be made in the coming days over whether to strip the Moscow-based firm, Kaspersky Lab, from the General Services Administration's (GSA) list of outside vendors whose products are approved for use by government agencies, the sources said. "That's a big move and is going to have some legal implications," one senior U.S. intelligence official told ABC News. Removing Kaspersky Lab from the list -- known as the "GSA Schedule" -- would likely only impact future contracts, ABC News was told. If the Trump administration does move to block government agencies from using the company's products, it would mark the most significant and far-reaching response yet to concerns among current U.S. officials that Russian intelligence services could try to exploit Kaspersky Lab's anti-virus software to steal and manipulate users' files, read private emails or attack critical infrastructure in the United States. For weeks, the White House, Department of Homeland Security, GSA and other federal agencies have been conducting an "interagency review" of the matter, sources said. The company has repeatedly insisted it poses no threat to U.S. customers and would never allow itself to be used as a tool of the Russian government. Kaspersky Lab's CEO, Eugene Kaspersky, recently said any concerns about his company are based in "ungrounded speculation and all sorts of other made-up things," adding that he and his company "have no ties to any government, and we have never helped, nor will help, any government in the world with their cyber-espionage efforts." Nevertheless, the FBI has been pressing ahead with a long-running counterintelligence probe of the company, and in June FBI agents interviewed about a dozen U.S.-based Kaspersky Lab employees at their homes, ABC News was told. In addition, as ABC News reported in May, the Department of Homeland Security in February issued a secret report on the matter to other government agencies. And three months ago, the Senate Intelligence Committee sent a secret memorandum to Director of National Intelligence Dan Coats and Attorney General Jeff Sessions demanding that the Trump administration address "this important national security issue." Despite all the private expressions of concern, the issue was first brought into public view by key members of the Senate Intelligence Committee, who began asking questions about Kaspersky Lab during recent hearings covering global threats to U.S. national security. Lawmakers and other U.S. officials point to Kaspersky Lab executives with previous ties to Russian intelligence and military agencies as reason for concern. Three weeks ago, Sen. Jeanne Shaheen, D-N.H., took legislative steps to ban the U.S. military from using Kaspersky Lab products. There is "a consensus in Congress and among administration officials that Kaspersky Lab cannot be trusted to protect critical infrastructure," Jeanne Shaheen, a New Hampshire Democrat and key member of the Senate Armed Services Committee, said in a statement after introducing an amendment to a Pentagon spending bill. Eugene Kaspersky called Shaheen’s move "an extreme new measure." "Kaspersky Lab is facing one of the most serious challenges to its business yet, given that members of the U.S. government wrongly believe the company or I or both are somehow tied to the Russian government," he recently wrote on his blog. "Basically, it seems that because I'm a self-made entrepreneur who, due to my age and nationality, inevitably was educated during the Soviet era in Russia, they mistakenly conclude my company and I must be bosom buddies with the Russian intelligence agencies. ... Yes it is that absurdly ridiculous." U.S. officials have yet to publicly present any evidence indicating concerning links between Kaspersky Lab employees and elements of the Russian government. But one senior U.S. intelligence official said the fact that the U.S. government is considering the drastic step of removing Kaspersky Lab from the GSA's list of approved vendors shows that such concerns are "non-trivial." A company lands on the list after hammering out deals with the GSA, which uses "the government's buying power to negotiate discounted pricing," according to the GSA. Hundreds of "federal customers," and in some cases state and local governments, can then purchase the company's products without having to each negotiate their own prices, the GSA said in a 2015 brochure about its operations. "The buying process is simplified because GSA has completed the bulk of the procurement process on behalf of government buyers," the brochure noted. As of a few years ago, the information technology portion of the GSA Schedule accounted for more than $14 billion of the federal budget, the brochure said. An ABC News investigation earlier this year found that -- largely through outside vendors -- Kaspersky Lab software has been procured by many federal agencies, including the U.S. Bureau of Prisons and some segments of the Defense Department. Kaspersky Lab products are also used in countless American homes, and in state and local agencies across the country. "[W]e've offered the U.S. government any assistance it might need to help clarify the ongoing confusion regarding the falsely perceived threat they wrongly believe our products and technologies pose," Eugene Kaspersky wrote on his blog. "We're even willing to meet with any of them and give them our source code to thoroughly review it, as we’ve got nothing to hide. We want the government, our users and the public to fully understand that having Russian roots does not make us guilty." < Here >
  9. While Rendition Infosec commends Eugene Kaspersky’s move of transparency for a code audit, this won’t really ensure security. Eugene Kaspersky has also offered to testify in front of Congress, but it seems doubtful that his testimony would sway many people on this. What about a code audit? And a code audit is not really the issue here. For one thing, a source code audit occurs at a point in time. What we see today may not be the code used to build the product tomorrow. No matter what we see in the source, Kaspersky will have to add code over time to update features. That’s how software engineering works. Suppose they then offer to send updated source code for audit. That’s great, but who is really auditing it? This becomes a full time job. Also, backdoors in code are particularly difficult to detect and can be extremely carefully obfuscated to make them resistant to static code analysis. There are other problems with a code audit as well and we shouldn’t equate a code audit with true security. The compiled code may contain backdoors not in the originally compiled source. These are non-trivial to detect and require a whole different set of specialized skills to find (the person performing the analysis must understand programming AND reverse engineering). Reverse engineering is an order of magnitude harder than code auditing, but if doubts exist about a foreign government influencing the software, this is practically required. A final problem is that an antivirus program like Kaspersky is effectively a kernel mode rootkit with remote update functionality. The remote update functionality is important. With remote update functionality, even if someone audits the code the best possible outcome would be “no backdoors were found, but Kaspersky could install malware on or completely disable any machine it is running on at will.” While any software that implements auto-update functionality could conceivably install a malicious update (as we saw with MeDoc being used to deploy the NotPetya cyberattack against Ukraine). Reverse engineering would now need to be performed not once, but on a regular basis to identify the inclusion of new backdoors built into updates. The difference between software like MeDoc and Kaspersky having auto-update functionality is that antivirus software is supposed to detect threats. Users are advised against running multiple antivirus software packages on their machines due to performance issues and potential conflicts between the AV vendors that may cause system instability. If another program’s auto-updates include malware, antivirus should catch it (eventually). In this case, the fear is that the antivirus is deploying the malware and therefore will ignore it. The very thing that is the last line of defense becomes the exploitation vector. Does this mean we shouldn’t use Kaspersky? Rendition is definitely not saying that. Read this post for nothing more than it is, an explanation of why a code audit and congressional testimony aren’t enough to allay fears. Eugene Kaspersky understands the futility of his offers better than most. It is likely that his offer is a publicity stunt more than anything else. That said, it remains an open question whether Kaspersky software is truly a threat to DoD. Russia is internalizing some of its software, in part due to security concerns. Maybe DoD should do the same. In any case, the “proof” offered by the Senate for this action is far from conclusive. It is hardly convincing to say “Eugene Kaspersky was trained by Russian intelligence therefore his software is open to influence from the Russian government.” Any number of US companies could be blackballed from participating in the global software market using the same standard as the Senate is currently basing . While there is no standard for the level of proof required in a case like this, it is probably safe to say that what has been offered so far falls short. The intent of this post is not to say Kaspersky software is bad, Rendition has no formal opinion on that one way or the other. It is simply to offer education to Rendition’s clients and the public about why a software source code audit isn’t a feasible to allay the fears stated by the Senate. Rendition encourages a thorough discussion on the topic with appropriate levels of disclosure to back claims that Kaspersky software poses a bonafide threat to DoD networks. Source
  10. File Size: 114 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  11. MOSCOW -- The chief executive of Russia's Kaspersky Lab says he's ready to have his company's source code examined by U.S. government officials to help dispel long-lingering suspicions about his company's ties to the Kremlin. In an interview with The Associated Press at his Moscow headquarters, Eugene Kaspersky said Saturday that he's also ready to move part of his research work to the U.S. to help counter rumours that he said were first started more than two decades ago out of professional jealousy. "If the United States needs, we can disclose the source code," he said, adding that he was ready to testify before U.S. lawmakers as well. "Anything I can do to prove that we don't behave maliciously I will do it." Kaspersky, a mathematical engineer who attended a KGB-sponsored school and once worked for Russia's Ministry of Defence, has long been eyed suspiciously by his competitors, particularly as his anti-virus products became popular in the U.S. market. Some speculate that Kaspersky, an engaging speaker and a fixture of the conference circuit, kept his Soviet-era intelligence connections. Others say it's unlikely that his company could operate independently in Russia, where the economy is dominated by state-owned companies and the power of spy agencies has expanded dramatically under President Vladimir Putin. No firm evidence has ever been produced to back up the claims. But this has not stopped what was once gossip at tech conferences from escalating into public accusations from American politicians and intelligence officials amid rising concerns over Russian interference in the United States. Senior U.S. intelligence officials have advised Congress to steer well clear of Kaspersky's products and Congress is weighing a proposal to ban the company from the Pentagon. Law enforcement seems to be taking a hard look at the company as well. On Wednesday, NBC news reported that at least a dozen U.S. employees of Kaspersky were visited at their homes by FBI agents. Kaspersky confirmed the NBC report, although he said he didn't know what the focus of the FBI's questioning was. He did say his relationship with the FBI was now shot. "Unfortunately, now the links to the FBI are completely ruined," he said, explaining that the agency had frozen out his company, one of the few connected to both U.S. and Russian law enforcement. "It means that if some serious crime happens that needs Russian law enforcement to co-operate with FBI, unfortunately it's not possible." The FBI didn't immediately return a message seeking comment, but agents are unlikely to lose much sleep over that. Kaspersky allowed that co-operation between Russia and the United States on cybercrime has often been "far from perfect." But lawmakers' moves to single out the company for special punishment worries even Kaspersky's critics, who note that it would set an unfavourable precedent for American technology firms -- many of whom are known to work closely with the U.S. National Security Agency. Kaspersky defended his work during the interview, saying he never benefited from official protection of any kind. "I do understand why we look strange. Because for Russia it's very unusual, a Russian IT that's very successful everywhere around the world. But it's true," he said. Kaspersky said his company does exclusively defensive work, although under questioning he allowed that some unnamed governments had tried to nudge him toward hacking -- what he calls "the dark side." "There were several times it was close to that," he said, adding that the officials involved weren't Russian. He said in one case a discussion about defensive cybersecurity co-operation "turned to the offensive." "I stopped that immediately. I don't even want to talk about it," he said. Kaspersky's offer to have his code audited may not quiet all the skeptics, some of whom are concerned less about the integrity of the company's software and more about the company's staff and the data they gather. Like many cybersecurity outfits in the U.S. and elsewhere, some Kaspersky employees are former spies. Kaspersky acknowledged having ex-Russian intelligence workers on his staff, mainly "in our sales department for their relationship with the government sector." But he added that his company's internal network was too segregated for a single rogue employee to abuse it. "It's almost not possible," he said. "Because to do that, you have to have not just one person in the company, but a group of people that have access to different parts of our technological processes. It's too complicated." And he insisted his company would never knowingly co-operate with any country's offensive cyber operations. "We stay on the bright side," he said, "And never, never go to the dark side." < Here >
  12. Any “unilateral administrative sanctions” by the U.S. may provoke a response from Russia, whose administration systems use “a large proportion of American software and hardware solutions in the IT sphere, also in very sensitive areas,” Nikiforov told in an interview on Friday. He refused to identify U.S. software products that may be moved by any complementary sanctions. A country’s use of “foreign software isn’t fundamentally about data risks as it undergoes screening and certification systems” against possible secret code that may threaten the security of computer networks, he said. Amid political debate in the U.S. over computer hacking and alleged Kremlin interference in the 2016 presidential elections, the Senate Armed Services Committee has suggested banning the Pentagon “from utilizing software platforms developed by Kaspersky Lab due to statements that the Moscow-based organization might be vulnerable to Russian government authority.” Kaspersky Lab said it doesn’t assist with any government in cyber-espionage, the Interfax news service reported Thursday. FBI agents questioned at least a dozen employees of Kaspersky Lab in the U.S. this week as a role of a counterintelligence inquiry, according to NBC News, which published that the company has “long been of interest” to the governments. There’s no sign the records were linked to a U.S. investigation into alleged Russian meddling in the elections, the broadcaster reported. < Here >
  13. Redmond says its antivirus plays nice with third-party apps Microsoft has finally issued a response to Kaspersky’s EU complaint, after the Russian security vendor requested an antitrust investigation over the way the software giant deals with third-party antivirus in its own Windows operating system. In a long statement whose role is to defend the Windows 10 antivirus and to explain how Microsoft is working with security vendors on making the operating system play nice with third-party solutions, Rob Lefferts, Partner Director, Windows & Devices Group, Security & Enterprise, explains that Windows Defender is currently one of the top solutions on the market, with over 99 percent detection rates. “We built Windows Defender Antivirus to make a promise to our customers that every Windows 10 device ALWAYS has protection from viruses and malware. Through our continued investments, our test results are among the top of security industry leaders,” he said. Lefferts then goes on to point out Microsoft is collaborating with nearly 80 independent software vendors as part of the so-called Microsoft Virus Initiative (MVI) program, which makes it possible for antivirus vendors to prepare for the release of new Windows versions and optimize their solutions to prevent any compatibility issues that might be experienced. Furthermore, Microsoft says that antivirus companies can also test compatibility with new Windows versions thanks to the Windows Insider program, a program that also involves millions of users who can send feedback on any problem that might arise. 95 percent of antivirus products compatible with Creators Update Lefferts responds to Kaspersky’s claim that Microsoft disables antivirus software when updating Windows by going back to the Windows 10 Creators Update released on April 11. No less than 95 percent of the Windows 10 PCs getting the update were running antivirus compatible with the Creators Update, Microsoft says. “For the small number of applications that still needed updating, we built a feature just for AV apps that would prompt the customer to install a new version of their AV app right after the update completed. To do this, we first temporarily disabled some parts of the AV software when the update began. We did this work in partnership with the AV partner to specify which versions of their software are compatible and where to direct customers after updating,” the company exec says. In the end, Lefferts emphasizes that Microsoft is always working closely with antivirus vendors to make sure not only that no compatibility issues are experienced when updating Windows, but also that users remain protected all the time. This is the reason Windows Defender kicks in when third-party antivirus is removed or expires, Lefferts added, again responding to Kaspersky who claimed that Windows 10 blocks expiring subscription notifications. Microsoft has been trying to reach out to Kaspersky several times, according to reports, but the Russian security company decided to pursue legal action. The EU is yet to announce whether an antitrust investigation would start or not. < Here >
  14. Kaspersky Lab, the security software company, announced Tuesday (June 20) a new State of Industrial Cybersecurity 2017 security survey, which found that over half (54 percent) of ICS companies interviewed have experienced at least one cyber attack in the last 12 months — with one in five (21 percent) experiencing two incidents in the same timeframe. What’s more, half of the companies surveyed experienced between one and five IT security incidents in the past 12 months. “As cyberattacks and the growing connected environments of industrial organizations evolve, the ICS organization will continue to face new challenges, and it’s essential that security strategies be reassessed now before it is too late,” said Clint Bodungen, senior researcher, critical infrastructure threat analysis at Kaspersky Lab, said in a press release announcing the results. “Preparedness among all departments in the organization — such as executive leaders, engineers, IT security teams and more — is key to protecting against cyberattacks. Businesses managing ICS environments need to put the necessary policies, procedures, technology and training in place immediately to properly manage these risks before they have an opportunity to damage the business.” Kaspersky Lab and Business Advantage conducted a security survey of 359 industrial cyber security practitioners from 21 countries from February to April 2017. The survey also revealed that ICS companies are aware of the potential risk of a cyber attack, with 74 percent saying they expect an attack on their infrastructure. The misunderstanding comes when prioritizing what risks they are facing. According to the research, while there is a lot of awareness about ransomware and targeted attacks, the biggest pain still comes from conventional malware, the security company said. Among survey respondents, conventional malware and virus outbreaks were the top incident concern for 56 percent, with threats from third parties concerning 44 percent of survey respondents and other intentional physical damage by external actors worrying 41 percent of those polled. The survey results also show there is confusion surrounding employee errors and unintentional actions, which are far more threatening to ICS organizations. What’s more, Kaspersky Lab found that struggling with a lack of IT security expertise, both internally and externally, is a major concern for ICS companies. “This finding is worrisome as it indicates that industrial organizations are not always ready to fight attacks, while they are certainly vulnerable to being compromised by outside and internal employee cyber threats,” Kaspersky Lab said. Article source
  15. File Size: 113 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  16. Kaspersky Files Antitrust Complaint Against Microsoft over Windows 10 Antivirus - Updated Legal complaints filed with EU and German watchdog Kaspersky claims that Microsoft is turning to unfair tactics to force users to stick with Windows Defender, the default antivirus in Windows 10. In a blog post today, Kaspersky accuses the Redmond-based software giant of removing third-party antivirus when upgrading to Windows 10, using its dominant position to promote its own security product. “Microsoft’s antivirus is hardwired into all versions of Windows 10 for home users: it’s impossible to turn it off completely, impossible to delete. Until recently no one asked you if you needed it or not. There was a time when, even if you used a different security solution, Microsoft’s own AV all the same periodically ran scans,” Kaspersky says. Kaspersky: Other security companies must support us Microsoft is mostly doing this because its antivirus has failed to remain competitive and because third-party security products are a lot more powerful, he continues, blaming the software giant for using its position only against antivirus products because this is a market where others are leading. “Such restriction is applied only to antiviruses - with which Microsoft has been trying to compete (and not doing very well at) for years. But in previous (pre-10) versions of Windows there were no such special measures. Thus, it looks like, after years with no success (in competing with other antiviruses), Microsoft has resorted to the use of alternative, OS-empowered (in our view - underhand) tactics,” he adds. Microsoft not only removes third-party antivirus products from Windows when the upgrade is performed but the company isn’t giving vendors enough time to prepare their security software for new versions of Windows. And this is one of the reasons they are eventually blocked when the upgrade is performed, he says. Kaspersky ends his plea by calling for Microsoft to support fair and healthy competition, while also asking other security vendors to join this effort and file antitrust complaints against the software giant. “We want Microsoft to stop misleading and misinforming our - and not only our - users. We want to see all security solutions being able to work on the Windows platform on a level playing field. And we want to see users being able to decide for themselves what they want and consider important to them,” Kaspersky added. Microsoft has already released a statement, saying that it does not infringe competition rules and it’s willing to work with antitrust bodies on addressing all these claims. UPDATE: Microsoft has provided us with an updated statement, explaining that it tried to reach out to Kaspersky to discuss the said concerns, but a meeting is yet to take place. Furthermore, the firm emphasized that existing Windows 10 security features do not violate any competition rules. Source
  17. File Size: 113 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  18. Kaspersky Lab is announcing the beta testing of Kaspersky Anti-Ransomware tool. Testing is scheduled for 09/08/2016 - 31/12/2016 Kaspersky Anti-Ransomware Tool for Business is a program designed to protect the users’ computers from known malware of ransomware type. KEY FEATURES • Freeware and lightweight solution • Ransomware detection close to premium business product (KES for Windows) • Protection technologies: File AV (KSN based) + System watcher • Compatible with 3rd party Endpoint security solutions • Most popular client OS support: Win 7-10 (Including Anniversary Update) • Email reports on detection to Administrator LIMITATIONS • No central management (remote silent install, configuration) • No technical support (forum support for public beta will be available) • Localizations: English only DOWNLOADTo download product you need to perform initial registration.Please kindly visit the following site and perform all registration steps:https://go.kaspersky.com/Anti-ransomware-tool.html More info: https://forum.kaspersky.com/index.php?showtopic=355273 & http://www.kaspersky.com/about/news/product/2016/kaspersky-anti-ransomware-tool-available-free-of-charge-for-businesses
  19. Microsoft has already made some changes to address complaints, Kaspersky says Security vendor Kaspersky Lab won’t file a complaint against Microsoft for its antivirus practices in Windows 10, as the software company has made changes to address a number of reported problems, founder and Chief Executive Eugene Kaspersky was quoted as saying by Reuters. In a blog post published last November, Kaspersky accused Microsoft of abusing its dominant position in the software market to push Windows Defender as the preferred antivirus solution in Windows 10, while also explaining that users end up being exposed to security risks due to some third-party security products being removed when updating to newer OS releases. Kaspersky called Microsoft’s approach abusive, describing how Windows Defender is automatically enabled on a Windows system when licenses for their third-party antivirus are close to coming to an end. “It’s a big deal because this is the crucial period during which a significant number of users seek extensions of their security software licenses. And if a user forgets to renew a license, then Microsoft deactivates the existing AV, and turns on Defender,” he said. Microsoft makes changes to address complaints It turns out, however, that Microsoft has contacted Kaspersky and the two companies worked together on a number of improvements that are already implemented, though no specifics on this have been provided. “They are listening to us and they made a few changes. It's an ongoing process. Of course if Microsoft agrees to all our requests we will not file it,” Kaspersky said. Although Kaspersky now says that no antitrust complaint would be submitted to the European Commission, his initial announcement in late 2016 revealed some antitrust bodies had already been notified. “We’ve taken the decision to address official bodies in various countries (including the EU and Russia) with a request to oblige Microsoft to cease its violation of anti-competition legislation and to remove the consequences of that violation,” he said at that point. Microsoft hasn’t yet issued a statement on the possible collaboration with Kaspersky, and the European Commission also refused to confirm whether a complaint was received or not. Source
  20. https://translate.yandex.com/translate?url=http%3A%2F%2Fe-kaspersky.livejournal.com%2F371109.html&lang=ru-en
  21. Kaspersky Small Office Security (5) Final Kaspersky Small Office Security 5 Build: Date: 7/4/2016 More Screenshots: Release Notes WHAT'S NEW IN KASPERSKY SMALL OFFICE SECURITY Download Links: ============== Kaspersky KAV,KIS,KTS,KSOS 2017 Inc. Patch D Without Secure Connection ENG http://textuploader.com/d5e91 Thanks to @vkarthik posting files.. : ) Offline Download Links [All Available Languages]: https://www.kaspersky.com/small-business-security/downloads/small-office-security ============================================================================ Medicine: Kaspersky Reset Trial [Multi] see the link in dedicated Kasperksy Topic posted there --> ============================================================================ KSOS 5 --> 90 days Trial Keys 5 Device: ============================================================================
  22. Details regarding the investigation are murky, but according to the Russian newspaper who quotes anonymous sources, Stoyanov was involved in facilitating the transfer of funds from foreign companies to Mikhailov's accounts. According to Stoyanov's LinkedIn account, before serving as Head of the Computer Incidents Investigation Team at Kaspersky, he worked as Deputy Director for a company called Indrik, but also as a Major in the Ministry of Interior's Cyber Crime Unit. In the past few years, Kaspersky Lab has worked very closely with Russian authorities to track down and help authorities arrest criminals spread across Russia. The most recent high-profile arrests where Kaspersky collaborated with Russian law enforcement includes the apprehension of over 50 individuals in May 2016, tied to the creation of the Lurk banking trojan and the Angler exploit kit. Article source
  23. Kaspersky is moving to fix a bug that disabled certificate validation for 400 million users. Discovered by Google's dogged bug-sleuth Tavis Ormandy, the flaw stems from how the company's antivirus inspects encrypted traffic. Since it has to decrypt traffic before inspection, Kaspersky presents its certificates as a trusted authority. If a user opens Google in their browser, for example, the certificate will appear to come from Kaspersky Anti-Virus Personal Root. The problem Ormandy identified is that those internal certificates are laughably weak. "As new leaf certificates and keys are generated, they're inserted using the first 32 bits of MD5(serialNumber||issuer) as the key ... You don't have to be a cryptographer to understand a 32bit key is not enough to prevent brute-forcing a collision in seconds. In fact, producing a collision with any other certificate is trivial," he writes here. Ormandy's bug report gave, by way of demonstration, a collision between Hacker News and manchesterct.gov: "If you use Kaspersky Antivirus in Manchester, Connecticut and were wondering why Hacker News didn't work sometimes, it's because of a critical vulnerability that has effectively disabled SSL certificate validation for all 400 million Kaspersky users." Kaspersky fixed the issue on December 28. Source
  24. At last – we’ve done it! I’ve anticipated this day for ages – the day when the first commercially available mass market hardware device based our own secure operating system landed on my desk. And here she is, the beaut. This unassuming black box is a protected layer 3 switch powered by Kaspersky OS and designed for networks with extreme requirements for data security. And there’s plenty more in the pipeline where this came from too, meaning the tech will be applied in other Internet-connected bits of kit, aka the Internet of Things (IoT). Why? Because this OS just so happens to be ideal for applications where a small, optimized and secure platform is required. The operating system boasts several distinctive features. Let me run through the main ones briefly… First, it’s based on microkernel architecture, which allows to assemble ‘from blocks’ different modifications of the operating system depending on a customer’s specific requirements. Second, there’s its built-in security system, which controls the behavior of applications and the OS’s modules. In order to hack this platform a cyber-baddie would need to break the digital signature, which – any time before the introduction of quantum computers – would be exorbitantly expensive. Third, everything has been built from scratch. Anticipating your questions: not even the slightest smell of Linux. All the popular operating systems aren’t designed with security in mind, so it’s simpler and safer to start from the ground up and do everything correctly. Which is just what we did. And just the other day we celebrated the birth of this new OS! The very first meeting held regarding this project took place 14 (fourteen!) years ago almost to the day – on November 11! Not that we’ve been diligently coding and testing since then; in that amount of time with sufficient resources you could see several projects through to the end and update and improve them all several times over! No, in the first several years not a single line of code was written. We met from time to time, discussed technical details, architecture, and drew pretty pictures on large sheets of paper. Then we built up a team – very slowly, since OS specialists are few and far between. And onwards we move, slowly but surely. Fast forward several years, and today we aren’t simply celebrating the latest team discussion, but our first commercial hardware device actually ready! November 11 is of course easy to remember as it’s 11-11. Which is birthday of our big, ambitious project. Indeed, within the company the project is known simply as ’11-11′. 14 years is a serious age for any project. Looking back it seems so quaint now how at the start we argued about the architecture and the basic parameters of the future OS and felt a little bit like… alchemists with compasses trying to make squares out of circles. The question to which we were searching for an answer was this: how can we build an operating system that will be impossible to hack in principle? Is it possible in practice? Meanwhile, all around this alchemy folks were fairly astonished: just what were we thinking? We’d decided to make an unhackable platform and ruin our other security business model?! Indeed, we were often asked why such an OS is really necessary. Here’s why: Once, cyberthreats targeting critical infrastructure, telecoms and other modern-life-essential systems looked mostly like science fiction. No one – besides us paranoids (actually, and also the most advanced hackers, cyber-spies and cyber-militaries) really had any idea that data security could directly affect physical security. Nor were they aware that literally all digital systems in existence around the world can be hacked. After all, we started our project long before Stuxnet, and even before Die Hard 4, where the cyber-baddies hacked and wrecked critical infrastructure. But as time has passed the general level of understanding of the threats has gradually – and increasingly conspicuously – risen… The serious problem of security of critical infrastructure started to be discussed at high-profile international conferences. Then, gradually, the topic started to spread into the imaginations of Hollywood (Die Hard 4, Skyfall…). Next, literally in the last year to 18 months, attention has risen still further – exponentially – to finally make the topic of cybersecurity one of the main topics at various top-level international summits and meetings of world leaders. Meanwhile, quietly in the background all this time, alchemists KL experts were toiling away in their workshops edging ever nearer to the unveiling of our very own OS! We realized that the operating system needed to have lots of different applications. First, it should provide a basis for the development of protected industrial control systems. Second, it should provide a basis for the development of protected embedded devices, including the IoT. Btw, the recent DDoS attack on Dyn’s DNS servers, which brought down sites like Amazon and Twitter, was carried out by a botnet that had infected ‘smart’ (actually, rather stupid:) devices like IP-cameras. The attack generated an astounding 1.2 terabytes a second – the biggest DDoS in history. So, I’m hoping it’s obvious by now how protecting the IoT and, of course, critical infrastructure (industry, transport, telecoms, etc.) from IT threats is simply mandatory. I also hope it’s clear that it’s better – no matter how difficult – to build IoT/infrastructure devices from the very beginning in such a way that hacking them is practically impossible. Indeed, that is a fundamental goal with Kaspersky OS. That was all mostly a teaser really. Coming up soon – more details about our secure operating system. Article source