Jump to content

Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates


Please note: Unfortunetely due to some server side issues, registration via Hotmail / Outlook email addresses do not work, members are requested to use some other email addresses like Gmail to register here.

Search the Community

Showing results for tags 'kaspersky'.

The search index is currently processing. Current results may not be complete.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 12 results

  1. Kaspersky [Medicine-Discussion-Knowledge Base Info] ================================================================= Official Download Links: ---------------------------------------- Download Links: Kaspersky 2018 MR0 [en-us] l KIS l KAV l KTS l KFA l release notes l Alternative Direct Download Links: http://txt.do/dkw40 Removal tool for Kaspersky Lab products l 91 Days OEM Trial Keys ================================================================= Kaspersky 2017 MR0 en-us l KIS l KAV l KTS5 l KSOS l release notes l Kaspersky KAV,KIS,KTS 2017 Inc. Patch E Without Secure Connection [English] Kaspersky 2016 MR1 en-us l KIS l KAV l KTS5 l release notes l Kaspersky 2015 MR2 en-us l KIS l KAV l KTS5 l release notes l ================================================================= Kaspersky 2017 MR0 Other Available Languages Official Download Links Kaspersky 2016 MR1 Other Available Languages Official Download Links If you already had previous version of Kaspersky I strongly suggest to use Removal tool to Uninstall Kaspersky Lab products >>> [More Info & Download Link] KIS/KAV 2014-2015-2016-2017 90 Days OEM Trial Keys: ---------------------------------------------- ================================================================= Kaspersky 2016 Activation Medicine: ----------------------------------- Kaspersky Reset Trial [Multi]: ----------------------------------------- OS: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003Bit OS: 32 (x86), 64 (x64) Development Team: leo1961 >> , Streamdat, Maksim1876. : ) Interface Screenshots: Supported anti-virus products / Version History Instruction: ------------ Download Link: ------------- Kaspersky Reset Trial ================================================================= Kaspersky Promotions / Giveaways: ============================ Kaspersky Total Security - Multi-Device 90 Days Activation Code ================================================================= Kaspersky 2015 MR2 >>> ================================================================= Kaspersky Tools/Important Post Replies/Knowledge Base Information's: ------------------------------------------------------------ Kaspersky Small Office Security (5) Final Kaspersky 2015 MR2 (Android) Kaspersky Antivirus & Security Kaspersky 2018.0.0.405 Technical Release With Patch "A" (en-US) ------------------------------------------------------------ Kaspersky Virus Removal Tool [Free] Some Useful Kaspersky Product Tools Kaspersky 2017 Dark Skin How to Stop and Disable Kaspersky 2017/2018 Secure Connection How to disable daily trial notification in Kaspersky 2018 v18.0.0.x products [KTS/KIS/KAV] How to disable daily trial notification in Kaspersky 2017 v17.0.0.x products [KTS/KIS/KAV] Kaspersky prevents the opening of some sites and Google Search How to restore default settings -Import-Export Setting in Kaspersky Kaspersky Extract Code by leo1961 How to manually install Kaspersky Beta Patch Disable registration requirement in Kaspersky 2016 v16.0.1.x products [KTS-KIS-KAV] How to create exclusion rules in Kaspersky Kaspersky Trial is expired and disable and Self-Defense function not available Kaspersky 2016 Official Useful Info's - Tips - Instructions How to block Internet access using Firewall How to configure Kaspersky Internet Security 2016 for better performance of your computer How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2016 How to change the network status How to disable news/promotional notification How To Disable Last License Notification Time Kaspersky 2016 Private Browsing [New Feature] & Pop Up Blocking Option Version designations of Kaspersky How to enable or disable downloading new versions of Kaspersky Migration Upgrading Between Kaspersky 2016 Product KIS-KAV-KTS Compatibility of Kaspersky Anti-Virus and Comodo Firewall How To Gather Offline Databases From Previous Installed Kaspersky Products How To activate Kaspersky & Bypass Region Mismatch Error Kaspersky Small Office Security Final How to use .lic file to activate Kaspersky Product & activation backup / restore Kaspersky application automatically downloads new version and installs it on top of the current one Kaspersky Rescue Disk 10.x.xx.xx [updated every Sunday] Kaspersky Anti-Virus 2016 for free for three months [French Promotion] Kaspersky Free Anti-Virus (KFA) / 365 2016 MR1 [EN Localization] How to create and open Sharecode.! ================================================================= november_ra1n 17 July 2015 =================================================================
  2. Kaspersky Endpoint Security 10 Service Pack 2 for Windows Kaspersky Endpoint Security 10 Support >>> hOMEPAGE: http://aes.kaspersky-labs.com/english/endpoints/kes10windows/ Kaspersky Endpoint Security 10 SP2 English Download Link: AES256 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes256.exe ES56 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes56.exe Other Languages Download Links: Other Languages Download Links: http://aes.kaspersky-labs.com/ Release Notes: Kaspersky Endpoint Security 10 Service Pack 2 for Windows Version 03/28/2017 How to activate using key files: 1. Click License Tab on the left corner 2. Click red cross delete the existing trial or block keys. 3. Hit Activate the application under a new license 4. Click activate with a key file and browse the key file Next to activate How to renew activation code for Kaspersky Endpoint Security 10 for Windows Activate Via Key File: https://support.kaspersky.com/us/13085#block1 MEDICINE: .lic file download Links see the topic reply there --> How to Activate Via Key File
  3. Kaspersky Lab Products Remover 1.0.1275.0 Portable Kaspersky is one of the leading antivirus companies with a very good background in antivirus solutions.Kaspersky offers its customers state of the art antivirus solutions and security products to keep their systems safe from all kinds of digital threats. Unfortunately, when you try to uninstall these products via the built-in uninstaller in Windows, various errors may occur. The applications might not be uninstalled completely and remnants of the programs may still be found on your system. Kaspersky Anti-Virus Remover is a small utility that enables you to easily uninstall various Kaspersky products from your computer. The application can remove the following programs from your PC: Kaspersky Small Office Security 2 for Personal Computer / for File Server, Kaspersky PURE / PURE R2, Kaspersky Anti-Virus (all versions), Kaspersky Internet Security (all versions), Kaspersky Password Manager (all versions), AVP Tool driver and Kaspersky Lab Network Agent 8. By default, the application automatically detects Kaspersky programs and offers to uninstall them. However, if the product was not detected, you can manually select it from the given list. When you are not sure about which Kaspersky product is installed on your machine the “Remove all known products” option can come in handy. Selecting it automatically removes all traces of all the supported applications from your system without the need of pointing it to any of them. After you have chosen the desired product you have to enter a security code in order to start the removal process. If you want to safely uninstall your Kaspersky products and remove all traces from your hard drive, Kaspersky Anti-Virus Remover will do the trick. The removal utility can be used to remove the following products: AVP Tool Driver KPM 8 MR1/MR2 Kaspersky Anti-Virus 2009 Kaspersky Anti-Virus 2010 Kaspersky Anti-Virus 6.0 FS MP4 Kaspersky Anti-Virus 6.0 SOS MP4 Kaspersky Anti-Virus 6.0 WKS MP4 Kaspersky Anti-Virus 6.0 for Windows Servers Kaspersky Anti-Virus 6.0 for Windows Workstations Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) MR1 Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) SP2 Kaspersky Anti-Virusflnternet Security 2011 Kaspersky Anti-Virusflnternet Security 2012 Kaspersky Anti-Virusflnternet Security 2013 Kaspersky Anti-Virusflnternet Security 2014 Kaspersky Anti-Virusflnternet Security 2015 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security Kaspersky Anti-VirusInternet SecurityKaspersky Total Security Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2016 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2017 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2018 Kaspersky Endpoint Security 10 for Windows Kaspersky Endpoint Security 10 for Windows Service Pack 1 MRl Kaspersky Endpoint Security 8 Kaspersky Fraud Prevention for Endpoint Kaspersky Fraud Prevention for Endpoint 2015 Kaspersky Fraud Prevention for Endpoint 2016 Kaspersky Internet Security 2009 Kaspersky Internet Security 2010 Kaspersky Lab Network Agent 8,9 Kaspersky Network Agent 10 Kaspersky PURE 2.0 / CRYSTAL Kaspersky PURE 3.0 / CRYSTAL Kaspersky PURE/CRYSTAL Kaspersky Password Manager 4/5 Kaspersky Security Scan Kaspersky Small Office Security Kaspersky Small Office Security Kaspersky Small Office Security 3 Nifty Security24 Internet Security Nifty Security24 Internet Security 2013 Changelog: New in version 1.0.1275.0 Added deletion: Kaspersky Anti-Virus \ Internet Security 2018 for Nifty Home Kaspersky Lab Products Remover - Service Articles - Guide/Manual - Official Download - EXE Download - ZIP
  4. BERLIN (Reuters) - Germany’s BSI federal cyber agency said on Wednesday it had no evidence to back media reports that Russian hackers used Kaspersky Lab antivirus software to spy on U.S. authorities. “There are no plans to warn against the use of Kaspersky products since the BSI has no evidence for misconduct by the company or weaknesses in its software,” BSI said in an emailed response to questions about the latest media reports. “The BSI has no indications at this time that the process occurred as described in the media.” The New York Times reported on Tuesday that Israeli intelligence officials spying on Russian government hackers found they were using Kaspersky software as a sort of Google search to find sensitive data stored by U.S. government agencies and others. It said the Russian operation also stole classified documents from a U.S. National Security Agency employee who had improperly stored them on his home computer, which had Kaspersky antivirus software installed on it. The U.S. government last month ordered Kaspersky software removed from government computers, saying it was concerned the Moscow-based cyber security firm was vulnerable to Kremlin influence. Kaspersky Lab has repeatedly denied any knowledge of, or involvement in, Russian hack1ing. ”Kaspersky Lab has never helped, nor will help, any government in the world with its cyberespionage efforts,” a company statement said on Tuesday in response to the New York Times report. Germany’s BSI, which also uses Kaspersky products for technical analyses, said it was in touch with U.S. officials and other security agencies about the issue so it could take action and issue a warning on short notice if required. It said German government agencies could use software protection for clients and servers that is offered by CANCOM online GmbH, which works together with Trend Micro (4704.T). < Here >
  5. Kaspersky Lab, a cybersecurity firm still under fire in the United States, announced a new threat sharing agreement with Interpol on Thursday. "INTERPOL's new agreement with Kaspersky Lab is an additional step in our continued efforts to ensure law enforcement worldwide has access to the information they need to combat cyberthreats," said Noboru Nakatani, executive director of the Interpol's Global Complex for Innovation. "We have seen how cooperation with the private sector is essential in effectively tackling this global phenomenon which continues to grow in scale and complexity." A recent spate of news stories has suggested Russian intelligence leveraged Kaspersky Lab antivirus's ability to scan files to search for documents and source code related to United States intelligence operations. This included a New York Times report that Israeli intelligence officials hacked into Kaspersky Lab's systems, where they witnessed Russian agents acting against the U.S. in real time. Those reports follow the Department of Homeland Security barring federal agencies from using Kaspersky products this September. At a conference earlier this weak, Nakatani said Interpol had received no intelligence from the United States to suggest that Kaspersky was a threat. < Here >
  6. How long can Kaspersky survive the assault on its business in America? It's already been thrown out of Best Buy stores, is close to being expelled from U.S. government networks and even private industry are being told to stop using the Russian company's anti-virus tools. Then yesterday another bombshell, the biggest so far regarding the company's alleged links to Russian government hackers: an NSA employee was compromised by Russians who allegedly used Kaspersky to determine there were files of interest related to the intelligence agency's cyber operations on the victim's computer. Nail after nail has been put in Kaspersky's American coffin, but is it going six feet under on these shores? Not yet. There's enough wiggle room left open by the reporting, largely and understandably based on anonymous sources, for the Russian security giant, led by billionaire CEO Eugene Kaspersky, to keep alive. Just. To recall the accusations in the WSJ's report: in 2015 a substantial but unspecified number of files were stolen from an NSA contractor's PC. The hackers were alerted "to the presence of files that may have been taken from the NSA," the report noted, citing according to anonymous sources. A subsequent Washington Post article confirmed this leak, the third major breach of sensitive NSA data in the last decade after the Edward Snowden and Harold T. Martin III incidents, the hacked party was a Vietnamese national who worked in the NSA's elite hacking division, Tailored Access Operations. Previous reports suggested he was a contractor. The government investigation is ongoing. A billionaire's fury There's little detail on what role Kaspersky or its software played in the breach. In the worst case scenario for Kaspersky, it would've actively colluded with the Russian government, purposefully passing on data collected by its antivirus systems to pinpoint which computers contained NSA cyber tools, most likely those it researched, such as those produced by the Equation Group. Kaspersky Lab was the first to detail the tools of that latter crew, widely believed to belong to the NSA and which a shady crew called the Shadow Brokers claimed to have stolen. The group subsequently leaked cyber tools, most notoriously those targeting Microsoft Windows that ended up being adapted to spread the WannaCry ransomware. Or it may be that whoever hacked Kaspersky in 2015 managed to pilfer that information and pass it on to the Kremlin's digital sleuths. The hackers might also have exploited Kaspersky as a way into the contractor's PC; researchers have found multiple vulnerabilities in the anti-virus in recent years, including recent finds by Google and one hole that tricked Kaspersky into funnelling stolen data out of a hacked computer via its own cloud. Finally, it's possible Russian spies intercepted the data after it was flagged on the user's PC by Kaspersky and sent to the company's Russian servers for analysis, a typical process in anti-virus systems. But there's no evidence indicating any of those three scenarios happened, and Eugene Kaspersky, who's repeatedly been the subject of reports linking him to Russian intelligence agencies, didn't give much credence to them. Quite the opposite. Not long after Thursday's story broke, the chief issued another vociferous response, having previously defended his company and his reputation on Forbes. He labelled the report "sensationalist," and at the heart of his defense was his note that Kaspersky has to have deep access to a computer's files in order to determine what was malicious. It appeared to the CEO that a Kaspersky tool did its job in finding possible NSA malware (he also cited the Equation Group research, but didn't link it to the agency) and that some added "fictional" information made it seem like the company was somehow complicit in helping Russian government hackers. "While protecting our customers, we do – as any other cybersecurity vendors – check the health of a computer. It works like an X-ray: the security solution can see almost everything in order to identify problems, but it cannot attribute what it sees to a particular user," he wrote. "If our technologies detect anything suspicious and this object is identified as malware, in a matter of minutes ALL our clients no matter who and where they are, will receive protection from this threat. Citing a tweet from former GCHQ cyber specialist Matt Tait that Kaspersky could've simply detected NSA spy tools on the infected computer, the CEO added: "The new allegations look to me like that: someone just took this process of how we deal with a threat, added some fictional details, and here we go – the new C level movie script is ready." Kaspersky also issued an official response, questioning the anonymous sources in the WSJ report and reiterating it had no inappropriate ties to government. "The only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight," the company said. Western defenders? But Kaspersky isn't definitively done in America. It has its supporters in the west, despite the government's apparent antipathy. Former NSA staffer and long-time cyber specialist for the U.S. government, Jake Williams, said the allegations were "certainly damning if true." But he feared confirmation bias on behalf on the analysts who looked into the hack of the contractor's PC. "I would be skeptical of any forensic analyst who says they can tie the theft of files on the machine to Kaspersky software. Now if the intelligence community has additional collection that proves those files were collected by Kaspersky, then that's something else entirely," Williams told Forbes. "As it stands, this sounds like it could be a case of confirmation bias. The contractor took classified documents home, those documents were found to have been compromised, and when it was discovered they were running Kaspersky on their machine an analyst said 'aha, it was Kaspersky that enabled hackers to compromise the machine.'" Thomas Rid, a professor at Kings College London who's worked alongside Kaspersky researchers, concurred there weren't enough facts to kill Kaspersky. "Not if you're assessing the evidence on its merits," he added. "But that is so old-fashioned." < Here >
  7. Russian government-backed hackers stole highly classified U.S. cyber secrets in 2015 from the National Security Agency after a contractor put information on his home computer, two newspapers reported on Thursday. As reported first by The Wall Street Journal, citing unidentified sources, the theft included information on penetrating foreign computer networks and protecting against cyber attacks and is likely to be viewed as one of the most significant security breaches to date. In a later story, The Washington Post said the employee had worked at the NSA’s Tailored Access Operations unit for elite hackers before he was fired in 2015. The NSA declined to comment, citing agency policy “never to comment on our affiliates or personnel issues.” Reuters was not able to independently verify the reports. If confirmed, the hack would mark the latest in a series of breaches of classified data from the secretive intelligence agency, including the 2013 leaks of data on classified U.S. surveillance programs by contractor Edward Snowden. Another contractor, Harold Martin, is awaiting trial on charges that he took classified NSA material home. The Washington Post reported that Martin was not involved in the newly disclosed case. Republican U.S. Senator Ben Sasse, a member of the Senate Armed Services Committee, said in a statement responding to the Journal report that, if true, the details were alarming. ”The NSA needs to get its head out of the sand and solve its contractor problem,“ Sasse said. ”Russia is a clear adversary in cyberspace and we can’t afford these self-inflicted injuries.” Tensions are already high in Washington over U.S. allegations of a surge in hacking of American targets by Russians, including the targeting of state election agencies and the hacking of Democratic Party computers in a bid to sway the outcome of the 2016 presidential election in favor of Republican Donald Trump. Citing unidentified sources, both the Journal and the Post also reported that the contractor used antivirus software from Moscow-based Kaspersky Lab, the company whose products were banned from U.S. government networks last month because of suspicions they help the Kremlin conduct espionage. Kaspersky Lab has strongly denied those allegations. Russian government officials could have used flaws in Kaspersky software to hack into the machine in question, security experts told Reuters. They could also have intercepted traffic from the machine to Kaspersky computers. Kaspersky said in a statement on Thursday that it found itself caught in the middle of a geopolitical fight. “Kaspersky Lab has not been provided any evidence substantiating the company’s involvement in the alleged incident reported by the Wall Street Journal,” it said. “It is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company.” The Department of Homeland Security on Sept. 13 banned Kaspersky products in federal networks, and the U.S. Senate approved a bill to ban them from use by the federal government, citing concerns the company may be a pawn of the Kremlin and poses a national security risk. James Lewis, a cyber expert with the Washington-based Center for Strategic and International Studies, said the report of the breach sounded credible, though he did not have firsthand information on what had transpired. “The baffling parts are that he was able to get stuff out of the building and that he was using Kaspersky, despite where he worked,” Lewis said. He said that intelligence agencies have considered Kaspersky products to be a source of risk for years. Democratic Senator Jeanne Shaheen, who led calls in Congress to purge Kaspersky Lab products from government networks, on Thursday called on the Trump administration to declassify information about threats posed by Kaspersky Lab. “It’s a disservice to the public and our national security to continue withholding this information,” Shaheen said in a statement. https://venturebeat.com/2017/10/05/russian-hackers-reportedly-stole-nsa-data-in-2015-likely-via-kaspersky-software/
  8. File Size: 126 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  9. Public beta-testing of Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security and Kaspersky Small Office Security A beta-version is an officially released version of the product meant for external testing which should elicit bugs and defects of the products as well as gather different opinions and suggestions. Once technical release appears in the end of the product development process the most active beta-testers who make a major contribution to testing of the product will be rewarded with one year license for the tested product. Beta-version specifics: - the build is activated only with beta-key and doesn't allow commercial (release) activation codes; - signature database updates may be not as frequent as on released Kaspersky products; - product traces and Application Verifier may be enabled by default after the install. download Kis Kav KTS SAAS Activation Only beta version Don't even think about it Kis Kav KTs KSOS Source: https://forum.kaspersky.com/index.php?/topic/161942-kavkis-beta-testing-guide-important/
  10. ..and it shouldn't be good enough for you. What's odd is that if the Americans are so worried about Kaspersky products, wouldn't it also make sense for other countries to also be wary of their industries relying on the software? When will we see the British, the French, the Australians, the Germans also boycott Kaspersky? Or will they instead wait until there is some convincing evidence that something bad is afoot at Kaspersky HQ? A witch hunt against a long-established major player in the infosecurity space should be soemthing that brings the industry together. So it galls me to see McAfee use the situation to its advantage, by engaging in some really tacky promotions. I've seen some really tacky things from the anti-virus industry over the last 25 years, but I think this possibly reaches a new low. That's pretty shitty McAfee. If McAfee is such a great product they should be comfortable extolling their virtues and benefits, rather than dancing a jig of glee at a rival struggling with a changing geo-political landscape. Article source
  11. Eugene Kaspersky has denied that the cyber-security firm he founded is close to the Russian government and insists it poses no danger to its American customers. Mr Kaspersky told the BBC that the Trump administration's move to ban government agencies from using his products was an "uncomfortable situation". The US has said it is concerned that Kaspersky is vulnerable to influence from the Kremlin. But the company's founder said that while he lived in Moscow and his firm co-operated with Russian law enforcement on cyber-security, there were no deeper ties. "When they say we have strong ties with Russian espionage it's not true," he told me via a video call from Argentina. "We co-operate with many law enforcement agencies around the world - in the past with the US as well." 'Unfair competition' The American store chain Best Buy has stopped selling Kaspersky products, but Mr Kaspersky said he had had positive discussions with other retailers. The Kremlin has criticised the US government's actions, describing the ban as unfair competition. Eugene Kaspersky said he wanted relations between the two countries to improve and called for international co-operation on cyber-security - he insisted that "only the bad guys are happy with this situation". The problem for the company is that Russia is now seen as a haven for hackers and cyber-criminals, and its government is widely accepted to have interfered in last year's American presidential election. That means that a Russian business offering cyber-security software may struggle to convince American consumers to buy products that their own government suggests are unsafe. But Mr Kaspersky said the Americans could have full access to his company's activities: "We will open every door, check everything. We don't have any secrets, we don't do anything bad against our customers and against governments." While he described the revenue his firm earns from the US government as "close to zero", the wider US market accounts for about a quarter of Kaspersky's sales. He had this appeal to his American customers: "Please stay with us - you can trust us." < Here >
  12. The Russian Company That Is a Danger to Our Security By JEANNE SHAHEEN SEPT. 4, 2017 The Kremlin hacked our presidential election, is waging a cyberwar against our NATO allies and is probing opportunities to use similar tactics against democracies worldwide. Why then are federal agencies, local and state governments and millions of Americans unwittingly inviting this threat into their cyber networks and secure spaces? That threat is posed by antivirus and security software products created by Kaspersky Lab, a Moscow-based company with extensive ties to Russian intelligence. To close this alarming national security vulnerability, I am advancing bipartisan legislation to prohibit the federal government from using Kaspersky Lab software. Kaspersky Lab insists that it has “no inappropriate ties with any government.” The company’s products, which are readily available at big-box American retailers, have more than 400 million users around the globe. And it provides security services to major government agencies, including the Department of State, the National Institutes of Health and, reportedly, the Department of Defense. But at a public hearing of the Senate Intelligence Committee in May, six top intelligence officials, including the heads of the F.B.I., C.I.A. and National Security Agency, were asked if they would be comfortable with Kaspersky Lab software on their agencies’ computers. Each answered with an unequivocal no. I cannot disclose the classified assessments that prompted the intelligence chiefs’ response. But it is unacceptable to ignore questions about Kaspersky Lab because the answers are shielded in classified materials. Fortunately, there is ample publicly available information to help Americans understand the reasons Congress has serious doubts about the company. The firm’s billionaire founder, Eugene Kaspersky, graduated from the elite cryptology institute of the K.G.B., the Soviet Union’s main intelligence service, and was a software engineer for Soviet military intelligence. He vehemently dismisses concerns that his company assists Russia’s intelligence agencies with cyberespionage and claims that he is the target of Cold War-style conspiracy theories. But Kaspersky Lab has Bloomberg recently reported on emails from October 2009 in which Mr. Kaspersky directs his staff to work on a secret project “per a big request on the Lubyanka side,” a reference to the F.S.B.’s Moscow offices. The McClatchy news service uncovered records of the official certification of Kaspersky Lab by Russian military intelligence, which experts in this field call “persuasive public evidence” of the company’s links to the Russian government. The challenge to United States national security grew last year when the company launched a proprietary operating system designed for electrical grids, pipelines, telecommunications networks and other critical infrastructure. The Defense Intelligence Agency recently warned American companies that this software could enable Russian government hackers to shut down critical systems. Beyond the evidence of direct links between Mr. Kaspersky and the Russian government, we cannot ignore the indirect links inherent in doing business in the Russia of President Vladimir Putin, where oligarchs and tycoons have no choice but to cooperate with the Kremlin. Steve Hall, former C.I.A. station chief in Moscow, told a reporter: “These guys’ families, their well-being, everything they have is in Russia.” He added that he had no doubt that Kaspersky Lab “could be, if it’s not already, under the control of Putin.” The technical attributes of antivirus software amplify the dangers from Kaspersky Lab. Mr. Kaspersky might be correct when he says that his antivirus software does not contain a “backdoor”: code that deliberately allows access to vulnerable information. But a backdoor is not necessary. When a user installs Kaspersky Lab software, the company gets an all-access pass to every corner of a user’s computer network, including all applications, files and emails. And because Kaspersky’s servers are in Russia, sensitive United States data is constantly cycled through a hostile country. Under Russian laws and according to Kaspersky Lab’s certification by the F.S.B., the company is required to assist the spy agency in its operations, and the F.S.B. can assign agency officers to work at the company. Russian law requires telecommunications service providers such as Kaspersky Lab to install communications interception equipment that allows the F.S.B. to monitor all of a company’s data transmissions. The Senate Armed Services Committee in June adopted my measure to prohibit the Department of Defense from using Kaspersky Lab software, to limit fallout from what I fear is already a huge breach of national security data. When broad defense legislation comes before the Senate in the weeks ahead, I hope to amend it to ban Kaspersky software from all of the federal government. Americans were outraged by Russia’s interference in our presidential election, but a wider threat is Russia’s doctrine of hybrid warfare, which includes cybersabotage of critical American infrastructure from nuclear plants to electrical grids. Kaspersky Lab, with an active presence in millions of computer systems in the United States, is capable of playing a powerful role in such an assault. It’s time to put a stop to this threat to our national security. https://www.nytimes.com/2017/09/04/opinion/kapersky-russia-cybersecurity.html