Jump to content

Search the Community

Showing results for tags 'kaspersky'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 123 results

  1. Kaspersky Endpoint Security 10 Service Pack 2 for Windows Kaspersky Endpoint Security 10 Support >>> hOMEPAGE: http://aes.kaspersky-labs.com/english/endpoints/kes10windows/ Kaspersky Endpoint Security 10 SP2 English Download Link: AES256 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes256.exe ES56 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes56.exe Other Languages Download Links: Other Languages Download Links: http://aes.kaspersky-labs.com/ Release Notes: Kaspersky Endpoint Security 10 Service Pack 2 for Windows Version 10.3.0.6294 03/28/2017 How to activate using key files: 1. Click License Tab on the left corner 2. Click red cross delete the existing trial or block keys. 3. Hit Activate the application under a new license 4. Click activate with a key file and browse the key file Next to activate How to renew activation code for Kaspersky Endpoint Security 10 for Windows Activate Via Key File: https://support.kaspersky.com/us/13085#block1 MEDICINE: .lic file download Links see the topic reply there --> How to Activate Via Key File
  2. Kaspersky [Medicine-Discussion-Knowledge Base Info] ================================================================= Official Download Links: ---------------------------------------- Download Links: Kaspersky 2018 MR0 18.0.0.405ab [en-us] l KIS 18.0.0.405ab l KAV 18.0.0.405ab l KTS 18.0.0.405ab l KFA 18.0.0.405ab l release notes l Alternative Direct Download Links: http://txt.do/dkw40 Removal tool for Kaspersky Lab products l 91 Days OEM Trial Keys ================================================================= Kaspersky 2017 MR0 17.0.0.611abcd en-us l KIS 17.0.0.611abcde l KAV 17.0.0.611abcde l KTS5 17.0.0.611abcde l KSOS 17.0.0.611 l release notes l Kaspersky KAV,KIS,KTS 2017 Inc. Patch E Without Secure Connection [English] Kaspersky 2016 MR1 16.0.1.445 en-us l KIS 16.0.1.445 l KAV 16.0.1.445 l KTS5 16.0.1.445 l release notes l Kaspersky 2015 MR2 15.0.2.361 en-us l KIS 15.0.2.361 l KAV 15.0.2.361 l KTS5 15.0.2.361 l release notes l ================================================================= Kaspersky 2017 17.0.0.611 MR0 Other Available Languages Official Download Links Kaspersky 2016 16.0.1.445 MR1 Other Available Languages Official Download Links If you already had previous version of Kaspersky I strongly suggest to use Removal tool to Uninstall Kaspersky Lab products >>> [More Info & Download Link] KIS/KAV 2014-2015-2016-2017 90 Days OEM Trial Keys: ---------------------------------------------- ================================================================= Kaspersky 2016 Activation Medicine: ----------------------------------- Kaspersky Reset Trial 5.1.0.39 [Multi]: ----------------------------------------- OS: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2003Bit OS: 32 (x86), 64 (x64) Development Team: leo1961 >> , Streamdat, Maksim1876. : ) Interface Screenshots: Supported anti-virus products / Version History Instruction: ------------ Download Link: ------------- Kaspersky Reset Trial 5.1.0.39 ================================================================= Kaspersky Promotions / Giveaways: ============================ Kaspersky Total Security - Multi-Device 90 Days Activation Code ================================================================= Kaspersky 2015 15.0.2.361 MR2 >>> ================================================================= Kaspersky Tools/Important Post Replies/Knowledge Base Information's: ------------------------------------------------------------ Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky 2015 15.0.2.361 MR2 (Android) Kaspersky Antivirus & Security Kaspersky 2018.0.0.405 Technical Release With Patch "A" (en-US) ------------------------------------------------------------ Kaspersky Virus Removal Tool [Free] Some Useful Kaspersky Product Tools Kaspersky 2017 Dark Skin How to Stop and Disable Kaspersky 2017/2018 Secure Connection How to disable daily trial notification in Kaspersky 2018 v18.0.0.x products [KTS/KIS/KAV] How to disable daily trial notification in Kaspersky 2017 v17.0.0.x products [KTS/KIS/KAV] Kaspersky prevents the opening of some sites and Google Search How to restore default settings -Import-Export Setting in Kaspersky Kaspersky Extract Code 1.0.0.9 by leo1961 How to manually install Kaspersky Beta Patch Disable registration requirement in Kaspersky 2016 v16.0.1.x products [KTS-KIS-KAV] How to create exclusion rules in Kaspersky Kaspersky Trial is expired and disable and Self-Defense function not available Kaspersky 2016 Official Useful Info's - Tips - Instructions How to block Internet access using Firewall How to configure Kaspersky Internet Security 2016 for better performance of your computer How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2016 How to change the network status How to disable news/promotional notification How To Disable Last License Notification Time Kaspersky 2016 Private Browsing [New Feature] & Pop Up Blocking Option Version designations of Kaspersky How to enable or disable downloading new versions of Kaspersky Migration Upgrading Between Kaspersky 2016 Product KIS-KAV-KTS Compatibility of Kaspersky Anti-Virus and Comodo Firewall How To Gather Offline Databases From Previous Installed Kaspersky Products How To activate Kaspersky & Bypass Region Mismatch Error Kaspersky Small Office Security 15.0.2.361 Final How to use .lic file to activate Kaspersky Product & activation backup / restore Kaspersky application automatically downloads new version and installs it on top of the current one Kaspersky Rescue Disk 10.x.xx.xx [updated every Sunday] Kaspersky Anti-Virus 2016 for free for three months [French Promotion] Kaspersky Free Anti-Virus (KFA) / 365 2016 MR1 16.0.1.445 [EN Localization] How to create and open Sharecode.! ================================================================= november_ra1n 17 July 2015 =================================================================
  3. It feels like there's a moral here IF YOUR MANAGER is pressuring you to take work home with you, you now have a ready-made excuse as to why that isn't a good idea. Ex-NSA employee Nghia Hoang Pho has been sentenced to five and a half years for taking top-secret defence files home - an act which ultimately saw US secrets being leaked. 68-year-old Pho maintained in court that he only took the files home to work on out of the office, with the aim of getting a promotion. If this was the case, it turned out to be a catastrophic error of judgement, as the Kaspersky Lab antivirus software on his computer hoovered up top secret information. Whether the reasoning for that is because the software liked or didn't like what it saw depends on who you believe, with Kaspersky claiming the NSA code was lifted for legitimate security analysis, rather than on behalf of the Russian government. Either way, it triggered a chain reaction which culminated in Kaspersky software being banned from government computers. However the secret information got into the wrong hands, in the court's eyes the root cause was the same. By taking the work home for five years, Pho was nonchalantly risking national security because, unsurprisingly, your off-the-shelf antivirus software isn't quite as effective as the NSA's own solutions. "Removing and retaining such highly classified material displays a total disregard of Pho's oath and promise to protect our nation's national security," said Maryland district attorney Robert Hur. "As a result of his actions, Pho compromised some of our country's most closely held types of intelligence, and forced NSA to abandon important initiatives to protect itself and its operational capabilities, at great economic and operational cost." Despite this, the five-and-a-half-year sentence is actually quite a bit lower than the maximum punishment of 10, and even the eight which prosecutors were pushing for. All the same, the moral of the story is don't take your work home with you. It can end very badly. Source
  4. Russian security firm Kaspersky just launched a new version of Kaspersky Security Cloud Free, a free cloud-based security solution for Windows devices. One question that may come up is how Security Cloud Free differs from Kaspersky's Free Antivirus solution the company revealed in 2016 and rolled out to a worldwide audience in 2017. The product's name reveals the core difference between the two free security products. Kaspersky Security Cloud Free, also known as Adaptive Security, gives you remote control and management options that Kaspersky Free Antivirus does not support. Kaspersky notes that Security Cloud gets all new tools and features first before any other product. Kaspersky Security Cloud Free requires a (free) Kaspersky account to use the program whereas Free Antivirus has no such requirement. Kaspersky Security Cloud Free review You are asked to sign in to a Kaspersky account or create a new one on start of the program. In fact, you cannot do anything until you sign in to the account. The program displays a series of screens on first sign in that highlights the program's core functionality and some of the features reserved to the paid versions. The interface holds no surprises. You can run a scan directly from the startpage or check the recommendations the program has for you. Kaspersky recommended to configure backup and restore which is a feature of the software program, and to install the company's password manager application and Internet Explorer extension. The backup functionality is basic but sufficient for creating backups of important files on the system. Kaspersky displays options to back up four different file types or locations, and an option to select custom locations for backup. The four available types are: All files in My Documents and on the Desktop. All pictures and photos. All movies and videos. All music files. You can select one of the options only at a time which is a usability issue. The best option that you have is to use the custom folder selector as it supports adding multiple locations to a single backup job. Data can be backed up to a location on the device or online storage space that Kaspersky provides (for a price). Antivirus protection works as you'd expect it to. Kaspersky Security Cloud Free runs automatic scans regularly to find threats and eliminate them. You can run full, quick, and custom scans manually at any time, and schedule scans so that they run based on your preferences. The Password Manager and Secure Connection links work but both features are limited. Kaspersky displays links to two features in the main interface that are not available in the free version. Prompts to upgrade to a paid version are displayed when you select Privacy Protection or Safe Money. The My Tools link opens a new page with a large assortment of tools and information. Some of the tools are reserved for paying customers though. Weak Settings Control -- Scans the computer for weak settings such as "file extensions are not displayed for known file types" so that they can be adjusted to improve security. My Kaspersky -- Option to open the web interface and to disconnect the installation. Cloud Protection -- Checks the connection status and displays stats. Quarantine -- Manage quarantined items. Kaspersky Rescue Disk -- create a rescue disk so that you can boot into a rescue environment when Windows does not boot anymore. My Network -- Paid options to list connected devices in the network and includes network monitoring. Manage Applications -- Paid options to check for software updates, control applications and to enable trusted applications mode to allow only trusted programs to run. Data Protection -- The file shredder to delete files securely and the on-screen keyboard are available in the free version. Paid versions get scheduled backups, data encryption, and a health monitor for hard drives as well. Clean and optimize -- Includes various tools to remove temporary data and improve privacy. PC Cleaner tool reserved for paying customers. Security Cloud Free supports additional features that you find highlighted in the program settings under protection. The app includes network attack blocker, system watcher, instant messenger anti-virus, and mail anti-virus protection. Not mentioned are the new Exploit Prevention feature and ransomware protection. The program works out of the box for the most part. While you can make some modifications, e.g. turn off select protective components, most users probably keep everything as is. The differences Kaspersky Security Cloud Free has limited functionality when compared to the Personal and Family versions. It features antivirus protection and the secure connection feature. The built-in password manager is limited to 15 passwords which makes it unusable for most users. Secure Connection is a VPN service that users of the software may connect to. The free version is good for 200 Megabytes of data per day and lacks paid options such as the selection of regions to connect. Kaspersky may suggest to connect to the VPN automatically based on the device's connections status. If the device is connected to an Open WiFi network, Kaspersky may suggest to establish a VPN connection using Secure Connection to protect data and improve privacy. Features such as privacy protection, a built-in firewall, family sharing, kids protection, or safe money are reserved for paying customers. Web Management One of the core differences to Free Antivirus is the new web management functionality that Kaspersky baked into Security Cloud Free. You can sign in to your account and manage all devices connected to it. Management includes interesting options such as running full or quick scans, running database updates, or managing components. You get status information, e.g. the product is up to date or "no threats detected", on top of that. Options to link more devices to an account are provided and the web management interface's use increases with every device you add to it as it provides you with better manageability options. Criticism and issues Kaspersky Security Cloud Free requires registration and enables remote management of connected devices automatically. Users who dislike the functionality may select Free Antivirus instead which comes without it. It is understandable that Kaspersky wants to earn money from its products but the main interface needs information about the "only in paid version" icon that is displayed on some of the options. Kaspersky highlights what the icon means on the "more tools" page but not on the main page. Kaspersky Labs has been in the news lately because of alleged ties to the Russian government and bans on Kaspersky products for government use in the United States and other regions. Closing Words and verdict Kaspersky Security Cloud Free or Kaspersky Free Antivirus? The choice depends on whether you require remote management capabilities or not. The core functionality is nearly identical and while users of Security Cloud Free may get new features before Free Antivirus users, included protective features are mostly identical. Security Cloud is available for Android and iOS as well so that these may be managed from the management interface on the Kaspersky website. Kaspersky is always doing well in tests and Security Cloud Free is no exception to that as it shares protective features with other Kaspersky products. You can check out how Kaspersky products are ranked on AV-Test or AV Comparatives. Source
  5. I have some activation codes of Kaspersky Internet Security for Android for 1 year. Today, I want to give 5 codes to members as a gift. Just reply to this topic then I'll send code via PM. First come first served * Requirement: Must be a member in nsane at least for 6 months.
  6. US govt bans agencies from using Russian outfit's wares The US government issued an interim rule this morning prohibiting agencies from using products or services that have pretty much anything to do with Kaspersky Lab. The Federal Acquisition Regulation (FAR) comes into effect from 16 July 2018 and is a result of the National Defense Authorization Act (NDAA), which prohibits any part of the US Federal government from using the antivirus vendor's wares. The prohibition comes into effect from 1 October, and the FAR is a clear signal that, yes, it is really going to happen. Any solicitations issued on or after 16 July will include an anti-Kaspersky clause and anything issued before will need modifications to reflect the US government's stance. The FAR for the Department of Defense (DoD), the General Services Administration (GSA) and NASA also applies to any companies contracted by the agencies. So anyone hoping to grab some taxpayer dollars should probably make sure Kaspersky Lab's products have been stripped from equipment doing government work. Astronauts aboard the International Space Station will be relieved to know that they shouldn't have to perform any tricky uninstalling. In 2008, NASA used Norton (PDF), and ever since then it has used "an antivirus". A source, who spent a substantial chunk of his career dealing with contracts for the UK's Ministry of Defence, told The Register that such clauses were nothing unusual and recalled rooms or even buildings full of workstations cleaned to government requirements, with snap audits by officials being commonplace. As such, third parties may simply opt to play it safe and remove any trace of Kaspersky Lab in order to avoid a difficult chat with the men and women in black. This would, of course, be bad news for the Russian software vendor, which is already engaged in legal action against the prohibition. Kaspersky Lab, battered by a European vote earlier this week, took the news badly. A spokesperson told El Reg: The lack of concrete evidence of what Kaspersky Lab is actually alleged to have done to merit this action continues to vex the Russian outfit. Thanks to the secretive nature of intelligence agencies and the potential sensitivity of the alleged stolen data, that evidence is unlikely to be shared any time soon. ® < Here >
  7. Kaspersky Lab announced it was temporarily halting its cooperation with Europol following the voting of a controversial motion in the European Parliament today. The motion was voted today in a plenary session of the European Parliament and received 476 votes in favor, 151 against, while 36 MEPs (Members of the European Parliament) abstained. The motion is A8-0189/2018 [1, 2, 3], an advisory-level document that puts forward a general strategy and guidelines for an EU-wide joint plan on cyber defense. Among the motion's clauses is one that calls on EU states to review the software and equipment they use in the IT infrastructure of EU institutions. The document advises EU states to exclude and ban programs and equipment that have been confirmed as malicious. Document specifically mentions Kaspersky Lab software The issue that angered Kaspersky Lab officials was that this particular clause specifically mentioned the Russian-based antivirus vendor by name when the motion's authors attempted to give an example of a product "confirmed as malicious." Having been called out in an official EU document, albeit one with no legislative power, did not stand well with Kaspersky officials. The company has been one of the first antivirus companies who signed collaboration agreements with Europol and state-level law enforcement agencies. In addition, together with Europol, Dutch Police, and McAfee (formerly Intel Security), Kaspersky was one of the founding members of NoMoreRansom, a project that helps ransomware victims by providing free decrypters. The European Parliament Research Services recognized the NoMoreRansom project as a successful case of public-private cooperation in a recent report. Kaspersky halts Europol and NoMoreRansom cooperation Ensuing today's vote, Kaspersky Lab formally announced it would temporarily halt its cooperation with Europol officials and work on the NoMoreRansom project. "We have protected the EU for 20 years working with law enforcement leading to multiple arrests of CYBERCRIMINALS," Kaspersky Lab CEO, Eugene Kaspersky wrote today on Twitter, following the EU Parliament vote. "Based upon today’s decision from the EU Parliament, we are forced to freeze our cooperation with orgs including Europol & NoMoreRansom," he added. "The way we conducted [this] public-private partnership is unfortunately ceased until the withdraw of the European Parliament decision." "Although this report has no legislative power it demonstrates a distinct lack of respect for the company which has been a firm friend of Europe in the fight against cybercrime," a Kaspersky spokesperson added to the CEO's opinion later today. EU at fault for the fallout The entire fault of this debacle strictly falls on the EU Parliament and its Foreign Affairs Commission, which was responsible for wording the report. The inclusion of Kaspersky's name on the report is mindboggling. In April this year, before the motion's last wording, an EU representative answered a question about the rumors that Russian intelligence used Kaspersky products to gain access to classified information. The EU spokesperson, answering on behalf of the Commission, said "the Commission [had] no indication for any danger associated with [the Kaspersky] anti-virus engine." In spite of this, the company's name was later included as an example of "confirmed as malicious" programs in the motion's final text. The Russian AV vendor is now in danger that EU states looking into enforcing the joint cyber defense strategy may be taking the report a little bit too literally and may enforce bans without being given any palpable evidence, just by going on its text. The Russian antivirus vendor has been trying to clear its name for months after its products have been banned on US and Dutch government networks, and the UK has also advised against using the company's software. Source
  8. A Washington, D.C. court has dismissed two lawsuits filed by the Moscow-based computer security company Kaspersky Labs that sought to overturn a U.S. ban on Kaspersky software within U.S. government networks. In a written ruling Wednesday, U.S. District Judge Colleen Kollar-Kotelly upheld a law requiring federal agencies to identify and purge Kaspersky code from U.S. networks by October 1 of this year. The judge also rejected Kaspersky’s argument that the Department of Homeland Security exceeded its authority in ordering a similar ban last September. “The United States government’s networks and computer systems are extremely important strategic national assets,” wrote Kollar-Kotelly in a 55-page opinion. “Threats to these systems are constantly expanding and evolving. Their security depends on the government’s ability to act swiftly against perceived threats and to take preventive action to minimize vulnerabilities.” “These defensive actions may very well have adverse consequences for some third-parties,” the judge continued. “But that does not make them unconstitutional.” Both bans were enacted in response to long-simmering concerns over Kaspersky Labs’ links to Russia’s intelligence community, and fears that the company could be compelled under Russian law to weaponize their code to spy on U.S. government networks. < Here >
  9. Security researchers have found a backdoor account in the firmware of D-Link DIR-620 routers that allows hackers to take over any device reachable via the Internet. Discovered by Kaspersky Lab researchers, this backdoor grants an attacker access to the device's web panel, and there's no way in which device owners can disable this secret account. The only way to protect devices from getting hacked is to avoid having the router expose its admin panel on the WAN interface, and hence, reachable from anywhere on the Internet. To prevent abuse, Kaspersky researchers have refrained from disclosing the backdoor's account username and password. One other vulnerability can disclose Telnet credentials The backdoor account (CVE-2018-6213) is just one of four vulnerabilities Kaspersky researchers found in the firmware of these devices following a recent security audit. The other three flaws include: Both CVE-2018-6210 and CVE-2018-6213 are considered dangerous flaws as they allow attackers easy access to the device. Not that many devices left around to exploit The good news is that D-Link DIR-620 devices are older router models and there aren't that many around to exploit. Most of these devices were deployed by Russian, CIS, and Eastern European ISPs as on-premise equipment provided to broadband customers. The vast majority of these devices are located in Russia, and Kaspersky said it already contacted ISPs to inform them of the issue. Shodan searches for these devices reveal less than 100 DIR-620 routers available online, showing that most ISPs have headed Kaspersky's warnings and restricted access to these devices on their networks. D-Link won't release firmware updates for such an old device Kaspersky experts said they've also contacted D-Link about the discovered issues, but the company said it did not intend to issue new firmware updates for such an older model unless one of the ISPs it has as an enterprise customer specifically request a security update for these devices. Researchers said they tested the following DIR-620 firmware versions and found that they included the four flaws, in various degrees: Source
  10. The law says American agencies must eliminate the use of Kaspersky Lab software by October. U.S. officials say that’s impossible—it’s embedded too deep in our infrastructure. Federal agencies are so far unable to comply with a law banning Kaspersky Lab software from U.S. government networks by October, The Daily Beast has learned. Multiple divisions of the U.S. government are confronting the reality that code written by the Moscow-based security company is embedded deep within American infrastructure, in routers, firewalls, and other hardware—and nobody is certain how to get rid of it. “It’s messy, and it’s going to take way longer than a year,” said one U.S. official. “Congress didn’t give anyone money to replace these devices, and the budget had no wiggle-room to begin with.” At issue is a provision of the National Defense Authorization Act (NDAA) enacted last December that requires the government to fully purge itself of “any hardware, software, or services developed or provided, in whole or in part,” by Kaspersky Lab. The law was a dramatic expansion of an earlier DHS directive that only outlawed “Kaspersky-branded” products. Both measures came after months of saber rattling by the U.S., which has grown increasingly anxious about Kaspersky’s presence in federal networks in the wake of Russia’s 2016 election interference campaign. America’s intelligence chiefs have, too, issued public warnings about Kaspersky software. When asked by Sen. Marco Rubio (R-FL) at an intelligence committee hearing last year whether they would be comfortable using Kaspersky software on their computers, all six of the top intelligence leaders—from the Central Intelligence Agency chief to the director of National Intelligence—had the same answer: No. While Kaspersky Lab is well respected in security circles, in some quarters of the U.S. national security community the company has long been tainted by perceived ties to Russian intelligence and the Kremlin—charges that the company denies. Even less hawkish U.S. officials worry that the company could be compelled under Russian law to weaponize their code to spy on U.S. government networks. The company works so closely with Russia’s Federal Security Service, or FSB, that agents are sometimes embedded in the firm’s Moscow headquarters. And like virtually all anti-virus products, Kaspersky’s has complete access to any computer on which it’s running, including the ability to riffle through files and, depending on the configuration, upload them to Kaspersky’s servers in Russia. It can also execute arbitrary instructions transmitted from the company’s headquarters. But despite company founder Eugene Kaspersky’s training at a KGB-sponsored institute, despite his close parroting of Kremlin rhetoric, and despite his team’s habit of exposing the most sensitive of U.S. cyber-espionage operations, there’s no public, conclusive evidence that these capabilities have ever been co-opted by Moscow. (Eugene Kaspersky frequently points out, accurately, that the company has revealed cyber-espionage campaigns originating from a multitude of countries, including some linked to the Russian government.) However, the anti-Kaspersky train picked up steam following revelations last year of a bizarre incident in which the company slurped up classified documents and source code from the home computer of a National Security Agency contractor running Kaspersky Internet Security software. That contractor, Nghia Hoang Pho, pleaded guilty last year to willfully mishandling classified material by taking it home. The source code was for an NSA hacking tool, which Kaspersky’s product properly flagged for analysis by malware researchers. But because the code was bundled in a ZIP archive with the classified documents, Kaspersky’s software uploaded the entire thing. When Eugene Kaspersky realized what had happened, he ordered his researchers to immediately delete their copy of the documents and code, the company asserted in a blog post last year. “The archive was not shared with any third parties,” the company wrote. In September, the brewing controversy came to a head when then-acting Homeland Security chief Elaine Duke issued a formal “binding operational directive” (BOD) requiring agencies to remove Kaspersky-branded software from their networks. The BOD followed a legislative push by Sen. Jeanne Shaheen (D-NH) to codify a more extensive Kaspersky ban into law. The senator’s effort culminated in section 1634 of the NDAA, mandating a full government purge of Kaspersky code by Oct. 1 of this year. Unlike the BOD, this ban is not limited to software bearing the Kaspersky name, which was relatively easy to find and remove. It also extends to any Kaspersky code embedded in third-party products, and specifically includes hardware. Kaspersky filed a lawsuit to try and overturn the ban. Kaspersky’s website showcases scores of technology partners who’ve used the company’s software development kits to bake Kaspersky code into their own products. That includes big names in services or software like Amazon and Microsoft, and networking hardware firms like D-Link, Check Point, and Allied Telesis—a major government supplier—that have baked Kaspersky’s code into firewall appliances. The networking giant Juniper Networks offered Kaspersky a full range of routers, gateways, and firewalls. Broadcom, which makes everything from Wi-Fi chips to fiber optic components, is listed as a technology partner, though it’s not clear for what product, and Broadcom declined comment. It’s unclear if the list on Kaspersky’s website is comprehensive—the company isn’t saying—and at press time Kaspersky was redirecting U.S. visitors to an identical webpage without the list of partners. With a dearth of good information, the picture painted by sources in the executive branch and on Capitol Hill is of an IT directive transformed by uncertainty into a sprawling cyber snipe hunt, with officials looking for Russian code in unlikely places like smartphone chipsets. Five congressional sources charged with overseeing the government’s compliance with section 1634 told The Daily Beast that they’ve grown concerned in recent weeks that the Department of Homeland Security has not raised red flags about these known hardware issues preventing the department from fully implementing the NDAA provision—leading many of them to doubt whether the government will be able to meet the Oct. 1 deadline. DHS is responsible for overseeing the ban’s implementation for all agencies except the Pentagon. Homeland Security Secretary Kirstjen Nielsen acknowledged the difficulty of the job during a Senate appropriations subcommittee hearing earlier this month. “Unfortunately for many of the third-party providers, they weren’t even aware they had Kaspersky on their systems and within their products,” Nielsen said. “It’s very important for us to understand not only who our contractors are contracting with, but when they provide a service or software, what’s embedded there within.” Nielsen added that the department has conducted “assessments and modeling” to try and pinpoint Kaspersky code. When Shaheen pressed Nielsen for a progress report on the purge, the director replied that she wasn’t prepared with specifics. “I can’t get you the exact figures, which I’m happy to do later today,” she answered in the May 8 hearing. Two weeks later, Shaheen’s office has not received that information, and the silence is raising alarm among staffers and lawmakers who worry that the U.S. may be incapable of even discovering whose code is running the government’s infrastructure. Two congressional sources who deal with the Kaspersky issue told The Daily Beast that they were uncertain if DHS even maintains data on third-party software and hardware with Kaspersky under the hood. The Department of Homeland Security declined to comment for this story, citing the pending legal actions by Kaspersky. The Pentagon, which heads the military portion of the Kaspersky ban, was unable to comment before press time. Kaspersky has filed a separate lawsuit seeking to overturn the NDAA ban. “Kaspersky Lab maintains that these provisions are unconstitutional and unfairly target the company for legislative punishment, without any meaningful fact-finding or evidence,” a company spokesperson said in a statement. A U.S. official with direct knowledge of the ban’s implementation says there’s plenty of blame to go around in the debacle. The law ordering the full ban didn’t come with an appropriation to replace any products found inexorably entwined with the outlawed code. Moreover, confusion reigns over the entire matter of government cybersecurity. “There are so many subcommittees claiming jurisdiction over cybersecurity issues that there are different panels of oversight, different pots of money,” said the official. “The executive branch is being torn in different directions… The legislative branch, in their refusal to effectively organize on this issue, shares equal responsibility with the executive for failures in U.S. government cybersecurity.” In the end, the official said, the U.S. can’t police its infrastructure without more transparency from its vendors about the code they’re selling. “This is not about one particular company… Industry should be leading the way on supply-chain risk management, and if they don’t the government is going to step up to fill that role, and it won’t be elegant.” Lawmakers have pushed for transparency from third-party vendors, but to no avail. In 2014, Rep. Ed Royce (R-CA) introduced the Cyber Supply Chain Management and Transparency Act, which would have required third-party contractors to disclose “each binary component that is used in the software, firmware, or product.” That legislation never went anywhere and, in the meantime, lawmakers have been exploring other reforms to supplement last year’s NDAA provision. “Implementation challenges should lead the U.S. government to increase vigilance on supply chain vulnerabilities and cybersecurity,” Shaheen told The Daily Beast. “Similar to the productive cooperation to ban Kaspersky Lab products across the federal government, Congress and this administration should continue to work together to harden federal cyber defenses, and look at reforms to the acquisition process so that we’re not unintentionally inviting adversaries into our most sensitive systems.” In the wake of the twin bans, some vendors are distancing themselves from Kaspersky, dropping the company from new products and posting instructions on uninstalling the Russian firm’s code. “Juniper is no longer providing Kaspersky in our active products,” said Juniper spokesperson Leslie Moore in an email. “In older products that may have utilized Kaspersky, it was not shipped nor turned on by default—the user had to choose to activate it, and we always provided clear instructions on how to remove it.” < Here >
  11. The U.S. government is considering sanctions against Russian cybersecurity company Kaspersky Lab as part of a wider round of action carried out against the Russian government, according to U.S. intelligence officials familiar with the matter. The sanctions would be a considerable expansion and escalation of the U.S. government’s actions against the company. Kaspersky, which has two ongoing lawsuits against the U.S. government, has been called “an unacceptable threat to national security” by numerous U.S. officials and lawmakers. Officials told CyberScoop any additional action against Kaspersky would occur at the lawsuits’ conclusion, which Kaspersky filed in response to a stipulation in the 2018 National Defense Authorization Act that bans its products from federal government networks. If the sanctions came to fruition, the company would be barred from operating in the U.S. and potentially even in U.S. allied countries. Sen. Jeanne Shaheen, D-N.H., authored legislation to ban Kaspersky, which was eventually introduced into the NDAA. In public, she’s been one of the most vocal anti-Kaspersky crusaders in U.S. government, including writing a New York Times op-ed on the subject last year. Sanctions are necessary, she said, and it’s exactly the sort of thing Congress laid the groundwork for last year. “The evidence of close ties and cooperation between Kaspersky Lab and the Kremlin is overwhelming, which is why I led efforts in Congress to rid Kaspersky products from federal systems. Sanctioning Kaspersky Lab is a logical next step,” Shaheen told CyberScoop. “Congress provided the administration with the necessary authority to sanction Kaspersky Lab and its CEO through the Countering America’s Adversaries Through Sanctions Act. It is now time that they take this step. The administration must show no hesitancy in sending a strong message that Putin’s near-constant cyber-attacks and intrusions against U.S. and NATO systems and institutions will not be tolerated.” The Kaspersky news comes as the Trump administration has publicly and privately gone back and forth on new sanctions against Russia, an ongoing process that currently has no permanent resolution. The prospect of new sanctions against Russia has loomed especially large since recent U.S. military strikes against Syria, where Russian companies have been accused of aiding Syria’s chemical weapons program. The process has been publicly disjointed and dramatic. Trump’s stated goal since he was a candidate has been to improve relations with Russia. The U.S. has enacted two rounds of sanctions against Russia in recent weeks including sanctions for 2016 election meddling and sanctions singling out Putin’s Russian allies. The ongoing process to consider and craft sanctions against Kaspersky has thus far fallen in large part to White House Cybersecurity Coordinator Rob Joyce. Joyce’s work on the matter comes as reports surface of an ongoing power struggle inside the National Security Council to determine the future of U.S. cybersecurity policy. The National Security Council, Treasury Department and Department of Homeland Security declined to comment. The fact that additional sanctions against Kaspersky are now being weighed means that the company’s fortunes in the U.S. and around the world risk falling even further than they already have. The FBI has long been advising private sector firms to cut ties with the company, a policy that has directly steered American companies from completing business deals with Kaspersky in the last year. Retailers like Best Buy removed Kaspersky from their shelves in 2017 while utility companies, power companies and even other nations followed suit. Last week, it was revealed that Twitter banned Kaspersky from advertising on the platform as a result of U.S. government statements against the company. Controversy also enveloped the company when CyberScoop reported last month that Kaspersky research exposed an active U.S.-led counterterrorism operation targeting ISIS and al-Qaeda members in the Middle East. The revelation sparked a debate on whether private companies should publicly share research, despite indications that it could burn sensitive counterterrorism operations. Company founder and namesake Eugene Kaspersky defended the research. Kaspersky, which has consistently denied any wrongdoing whatsoever, said the federal ban impacted only a tiny sliver of the company’s overall business. The company and Russian officials have both called the ban a “politicized decision.” While many of the details of the U.S. government’s case against Kaspersky remain classified, officials in both the U.S. and the United Kingdom have pointed directly to Russian law as a fundamental root of Kaspersky’s problem. Analysis of Russian law has been at the heart of the U.S. government’s legal strategy in defending against Kaspersky’s ongoing lawsuits. Western officials argue that Russia requires private enterprises, including Kaspersky, to hand data over to Russian intelligence with no court order. Kaspersky has in the past repeatedly denied that such laws apply to them. “The reason is the Russian legal framework as much as it is about the activities of any one company,” said Ciaran Martin, the director of the UK’s National Cyber Security Centre. “Russian law works in a way that means — and this is overt and open source — the state can suborn antivirus companies to provide data in a way we view as harmful so we recommended they are not used in sensitive government networks.” CyberScoop spoke with a Kaspersky spokesperson at a private event in San Francisco. The spokesperson said the company had “no comment.” No additional response was shared with CyberScoop prior to this article’s publication. Moscow’s tightening grip on the internet has repeatedly stoked global controversy. The encrypted messaging app Telegram was recently banned in Russia for refusing to give the Russian government the ability to read encrypted messages. Several years beforehand, Telegram CEO Pavel Durov ran VKontakte, the largest Russian-language social media network. Durov, once a celebrated Russian tech icon, was effectively exiled from his home country for publicly refusing to cooperate with Moscow’s demands for data from and control of the website. In 2014, after a lengthy struggle, Durov sold his last stake of VKontakte to allies of Russian president Vladimir Putin. Update: Kaspersky Lab provided CyberScoop with a statement Monday afternoon that reads: “The continued actions by the U.S. government against Kaspersky Lab lack sufficient basis, have been taken without any evidence of wrongdoing by the company, and rely upon subjective, non-technical public sources, such as uncorroborated and often anonymously sourced media reports and rumors, which is why the company has challenged the validity of these actions in federal court. Kaspersky Lab welcomes calls to declassify any credible information that can shed light on the government’s concerns regarding its operations or its products as a public good, so that the company can responsively address said concerns and the general public can better understand this matter without the ongoing obfuscation.” < Here >
  12. Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky Small Office Security 5 Build: 17.0.0.611.0.95.0 Date: 7/4/2016 More Screenshots: Release Notes WHAT'S NEW IN KASPERSKY SMALL OFFICE SECURITY Download Links: ============== Kaspersky KAV,KIS,KTS,KSOS 2017 Inc. Patch D Without Secure Connection ENG http://textuploader.com/d5e91 Thanks to @vkarthik posting files.. : ) Offline Download Links [All Available Languages]: https://www.kaspersky.com/small-business-security/downloads/small-office-security ============================================================================ Medicine: Kaspersky Reset Trial 5.1.0.35 [Multi] see the link in dedicated Kasperksy Topic posted there --> ============================================================================ KSOS 5 --> 90 days Trial Keys 5 Device: ============================================================================
  13. Kaspersky Rescue Disk 10.0.32.17 (Build 2018.02.27) Create a disk image to boot from and safely remove viruses from your computer in a non-dangerous environment provided by Kaspersky Kaspersky Rescue Disk is a virus removal solution for critical situations. It was designed to be used when regular antivirus software fails in detecting and cleaning a system of various infections. If you own Kaspersky antivirus or Kaspersky Internet Security , the Rescue Disk can be recorded directly via these products. If not, the ISO can be burned on a CD/DVD using your disc burner or choice. It can also be placed on a bootable USB device and launched from there. Here’s how it works: set your system to boot from the CD / DVD/ USB device, insert the disc or the stick and restart the system. After a quick loading process, you are acquainted with the interface of Kaspersky Rescue Disc. You simply select the objects Kaspersky should process (disk boot sectors, hidden startup objects, or local hard drives), and hit the scan button. The Rescue Disk then delivers a report of all malicious objects found in your system, such as viruses and Trojans, but also adware and other similar software. Infected files can be quarantined, disinfected, or removed. The Settings menu allows you to configure the current security level, file types, scan optimization (i.e. skip files scanned longer than a given number of seconds), archive scanning, installation packages, and others. Updates are done on a regular basis, and notifications can be set for malware detection or modifications, obsolete databases, failed tasks, or others. In conclusion, Kaspersky Rescue Disk is a great way to remove threats that can’t be cleaned by standard antivirus solution. It requires quite the amount of effort (burning the CD / DVD), but it succeeds where other security solutions fail. How to start a virus scan using Kaspersky Rescue Disk: https://support.kaspersky.com/8097 UserGuide: https://media.kaspersky.com/downloads/consumer/kasp10.0_rescuedisk_en.pdf Home: https://support.kaspersky.com/viruses/rescuedisk Download ISO (331 MB): http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso
  14. Kaspersky Rescue Disk 10.0.32.17 (Build 2018.02.01) Create a disk image to boot from and safely remove viruses from your computer in a non-dangerous environment provided by Kaspersky Kaspersky Rescue Disk is a virus removal solution for critical situations. It was designed to be used when regular antivirus software fails in detecting and cleaning a system of various infections. If you own Kaspersky antivirus or Kaspersky Internet Security , the Rescue Disk can be recorded directly via these products. If not, the ISO can be burned on a CD/DVD using your disc burner or choice. It can also be placed on a bootable USB device and launched from there. Here’s how it works: set your system to boot from the CD / DVD/ USB device, insert the disc or the stick and restart the system. After a quick loading process, you are acquainted with the interface of Kaspersky Rescue Disc. You simply select the objects Kaspersky should process (disk boot sectors, hidden startup objects, or local hard drives), and hit the scan button. The Rescue Disk then delivers a report of all malicious objects found in your system, such as viruses and Trojans, but also adware and other similar software. Infected files can be quarantined, disinfected, or removed. The Settings menu allows you to configure the current security level, file types, scan optimization (i.e. skip files scanned longer than a given number of seconds), archive scanning, installation packages, and others. Updates are done on a regular basis, and notifications can be set for malware detection or modifications, obsolete databases, failed tasks, or others. In conclusion, Kaspersky Rescue Disk is a great way to remove threats that can’t be cleaned by standard antivirus solution. It requires quite the amount of effort (burning the CD / DVD), but it succeeds where other security solutions fail. How to start a virus scan using Kaspersky Rescue Disk: https://support.kaspersky.com/8097 UserGuide: https://media.kaspersky.com/downloads/consumer/kasp10.0_rescuedisk_en.pdf Home: https://support.kaspersky.com/viruses/rescuedisk Download ISO (326 MB): http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso
  15. File Size: 136 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Detects viruses and other infections that may have reached your computer with the aid of different scan modes provided by Kaspersky No matter how carefully one uses the computer, they are still exposed to online threats and malware attacks, so the importance of having a correctly-configured antivirus solution should not be underestimated. However, in case the infection has already reached the PC and the security software app has been neutralized, there is one more tool that can be tested: Kaspersky Virus Removal Tool. Install the removal tool even on infected systems In most cases, when the virus is already on the target PC, there is nothing much one can do because the malware typically does not allow users to install or update any antivirus software. Kaspersky’s tool on the other hand has taken some protective measures: it can be installed on infected computers, even in Safe Mode, and it can automatically remove viruses, Trojans, rootkits, adware or spyware. User-friendly layout and fast scan process Installation is extremely quick and the scan process is very fast, with the application remaining quite friendly with the computer resources. The interface of Kaspersky Virus Removal Tool is equally intuitive, and users can only press the Scan button and continue with their work, as the process will run in the background. Activate the in-depth analysis mode If the results of the automatic scan are not satisfactory, one can also try the Manual Disinfection which performs an in-depth analysis of the computer, then generates a detailed report that can be sent to Kaspersky for further processing. Specify the target location Alternatively, one can also choose the target type of data that needs to be scanned, thus restricting the area of analysis, and the time of the scan, but this is only advisable when users are aware of the location of the infection. Also, modifying the security level to High can result in longer scanning times. Last but not least, Kaspersky Virus Removal Tool allows users to choose the action they want to take when a threat is detected, so experts can attempt to manually process the issue. Bottom line Overall, in case viruses and other infections have reached one's computer, Kaspersky’s tool can come to the rescue. But one should note that keeping a computer clean comes down to installing a full version of an antivirus solution, with real-time protection and periodic updates. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  16. straycat19

    Hypocrites and Kaspersky

    It is amazing the number of comments that have been made on Nsane over the last 8 months or so about the U.S. banning Kaspersky AV from government systems or systems that connect to government networks. Most of them relating the loss of financial gain (i.e. customers) and how unfair it is to put them out of business. Yet here are 123 pages of how to steal Kaspersky software. And then more patches here. So it really doesn't make any difference what you say since actions speak louder than words. If your support for Kaspersky is as strong as your posted words then buy their software, don't steal it.
  17. Russian government-backed hackers stole highly classified U.S. cyber secrets in 2015 from the National Security Agency after a contractor put information on his home computer, two newspapers reported on Thursday. As reported first by The Wall Street Journal, citing unidentified sources, the theft included information on penetrating foreign computer networks and protecting against cyber attacks and is likely to be viewed as one of the most significant security breaches to date. In a later story, The Washington Post said the employee had worked at the NSA’s Tailored Access Operations unit for elite hackers before he was fired in 2015. The NSA declined to comment, citing agency policy “never to comment on our affiliates or personnel issues.” Reuters was not able to independently verify the reports. If confirmed, the hack would mark the latest in a series of breaches of classified data from the secretive intelligence agency, including the 2013 leaks of data on classified U.S. surveillance programs by contractor Edward Snowden. Another contractor, Harold Martin, is awaiting trial on charges that he took classified NSA material home. The Washington Post reported that Martin was not involved in the newly disclosed case. Republican U.S. Senator Ben Sasse, a member of the Senate Armed Services Committee, said in a statement responding to the Journal report that, if true, the details were alarming. ”The NSA needs to get its head out of the sand and solve its contractor problem,“ Sasse said. ”Russia is a clear adversary in cyberspace and we can’t afford these self-inflicted injuries.” Tensions are already high in Washington over U.S. allegations of a surge in hacking of American targets by Russians, including the targeting of state election agencies and the hacking of Democratic Party computers in a bid to sway the outcome of the 2016 presidential election in favor of Republican Donald Trump. Citing unidentified sources, both the Journal and the Post also reported that the contractor used antivirus software from Moscow-based Kaspersky Lab, the company whose products were banned from U.S. government networks last month because of suspicions they help the Kremlin conduct espionage. Kaspersky Lab has strongly denied those allegations. Russian government officials could have used flaws in Kaspersky software to hack into the machine in question, security experts told Reuters. They could also have intercepted traffic from the machine to Kaspersky computers. Kaspersky said in a statement on Thursday that it found itself caught in the middle of a geopolitical fight. “Kaspersky Lab has not been provided any evidence substantiating the company’s involvement in the alleged incident reported by the Wall Street Journal,” it said. “It is unfortunate that news coverage of unproven claims continue to perpetuate accusations about the company.” The Department of Homeland Security on Sept. 13 banned Kaspersky products in federal networks, and the U.S. Senate approved a bill to ban them from use by the federal government, citing concerns the company may be a pawn of the Kremlin and poses a national security risk. James Lewis, a cyber expert with the Washington-based Center for Strategic and International Studies, said the report of the breach sounded credible, though he did not have firsthand information on what had transpired. “The baffling parts are that he was able to get stuff out of the building and that he was using Kaspersky, despite where he worked,” Lewis said. He said that intelligence agencies have considered Kaspersky products to be a source of risk for years. Democratic Senator Jeanne Shaheen, who led calls in Congress to purge Kaspersky Lab products from government networks, on Thursday called on the Trump administration to declassify information about threats posed by Kaspersky Lab. “It’s a disservice to the public and our national security to continue withholding this information,” Shaheen said in a statement. https://venturebeat.com/2017/10/05/russian-hackers-reportedly-stole-nsa-data-in-2015-likely-via-kaspersky-software/
  18. More than a month has passed since the antivirus giant Kaspersky Lab had its US government business executed without a trial. But while American federal agencies remove all traces of one of the world's most popular pieces of security software from their networks, they have yet to explain exactly what merits that Government Services Administration ban. And as the rest of the world decides whether it needs to similarly rid itself of all Kaspersky code, it's starting to get impatient for answers. For years, rumors have followed Kaspersky and its billionaire founder, Eugene Kaspersky, regarding ties to Russian intelligence agencies. Last month's GSA edict put an official stamp on those suspicions, but without any official explanation as to what exactly the Moscow-based cybersecurity firm has done to merit them. Stories in the New York Times and Wall Street Journal have since cited anonymous sources accusing Kaspersky of siphoning American secrets, including the files of an NSA staffer, to its own servers, where the Russian government then accessed them. But it's still not clear whether Kaspersky has been actively collaborating with or unwillingly compromised by the Kremlin, or, based on a new statement Kaspersky posted in its own defense Wednesday, whether it was the Russian government's source for those NSA files at all. All of that has led to a growing chorus from the security community, and now even a US senator, calling on US intelligence agencies to make a clear statement about what exactly they know Kaspersky to be doing—and whether that behavior merits US companies and consumers jettisoning it as urgently as the feds have. "Our government hasn't even been clear about what they're accusing Kaspersky of," says Rob Graham, a security consultant for the firm Erratasec. "We’re just getting propaganda on this issue and no hard data. And that’s bad." An Opaque Process It's still not publicly understood, for instance, whether Kaspersky simply performed its intended antivirus function of identifying NSA-created malware and uploading it to its servers for analysis—which could explain how NSA tools on a staffer's home machine ended up in the hands of the Russian government—or whether it's acting as a more comprehensive search engine of its users' secrets, allowing Russian spies to reach into millions of computers around the world. If the latter, Graham says, "that’s terrible, that’s the worst possible thing you could say about them, and everyone should delete Kaspersky from their machine." But if it's the former, "these insinuations and accusations don’t have merit. It’s a key sticking point that we need more information about," Graham says. 'We’re just getting propaganda on this issue and no hard data. And that’s bad.' Rob Graham, Erratasec On Wednesday morning, ahead of a hearing in the House of Representatives' Science, Space, and Technology Committee about the Kaspersky scandal, senator Jeanne Shaheen of New Hampshire published an open letter to the Department of Homeland Security and Office of the Director of National Intelligence asking those same questions. "While I commend the administration for...ordering the removal of Kaspersky Labs products from federal agencies, I remain concerned about their use in non-governmental systems," Shaheen's letter reads. "I write to urge you to declassify information on Kaspersky Lab and its products in order to allow the American people to make informed decisions about risks to their privacy and security." Even without declassifying secrets, the US intelligence community could share more, argues Matt Tait, a former staffer at the British intelligence service GCHQ. "If Kaspersky is acting on behalf of the Russian government, I think the US government should be brave enough to put an official stamp on it and say it out loud," Tait told the security-focused podcast Risky Business. "I’m not convinced they need to declassify why they think it’s the case, but they need to say out loud that they do think it’s the case." After all, Tait points out, if Kaspersky does collude with Russian intelligence, that matters not only to the US federal government, but to state governments, defense contractors, and foreign governments. Wednesday's hearing, meanwhile, produced virtually no new information about Kaspersky as a security threat, classified or not. All of the witnesses, who included officials from the National Institute of Standards and Technology and the Government Services Administration, quickly disclaimed any knowledge of classified matters. The House committee members called Kaspersky a "wolf in sheep's clothing" and insinuated that its headquarters in Moscow and Eugene Kaspersky's education at a KGB cryptography school sufficiently demonstrated the company's collusion with the FSB, but without substantiating those accusations. Conflicting Stories If anything, solid official claims about Kaspersky's alleged misbehavior have only become more noticeably absent, as the web of conflicting and ambiguous reports and claims about the company grows. Earlier this month, the Wall Street Journal reported that Kaspersky's software had helped to steal a collection of highly secret documents brought home by a staffer working for the NSA's elite Tailored Access Operations hacking division, who had run the Kaspersky software on a home computer. The New York Times followed up with a report that Israeli intelligence had compromised Kaspersky, and found evidence that it was spying on behalf of Russian intelligence, which it then shared with US officials. On Wednesday, Kaspersky published a blog post telling its own, very different account of that NSA staffer incident, based on its internal investigation and records of its malware uploads. According to Kaspersky, the NSA staffer had in 2014 run a pirated version of Microsoft Word, along with a so-called "keygen" tool used to register it with a spoofed key, and which was infected with malware that included a "full blown backdoor" capable of allowing the theft of the NSA tools by any third party that controlled the malware. While the NSA staffer had in fact installed Kaspersky's antivirus software, he or she had it turned off at that time, Kaspersky says, and only turned it on again in November of 2014. Kaspersky acknowledges that on another occasion, the Kaspersky software did detect and upload a trove of NSA hacking tools from the staffer's computer, but asserts that Eugene Kaspersky himself ordered them deleted, without sharing them with any other organization. In the vacuum of any official statement from the US government to sort out those narratives, everyone else is left to make our decisions about whether to exile Kaspersky from their PCs with incomplete information. But as unfair as it may seem, better to treat Kaspersky as guilty until proven innocent, says Nicholas Weaver, a security-focused computer science researcher at University of California at Berkeley. "It is really disappointing and frustrating that the only statements are really innuendo, [but] for the average consumer it probably is irrelevant," Weaver says. "When your license comes up for renewal, the negligible cost difference and interchangeability suggest: Go with somebody else." Nonetheless, he'd still like to see a clear statement from the government explaining exactly what warrants the switch. "It is critical to publicize it because it will cause people to change behavior, even if it has no effect on the future risk calculation," he says. If the feds know enough to be sure that Kaspersky's products are tainted, they should share enough to let the rest of us come to the same conclusion. Article
  19. Kaspersky Lab has released the results of an internal investigation into the suspected theft by Russian spies of NSA hacking tools from a contractor’s laptop, which seem to clear it of wrongdoing alleged in US media reports. The Moscow-headquartered vendor has been under fire over the past few months after reports in various outlets including the Washington Post and Wall Street Journal indicated its products may have been used by Russian intelligence to harvest the data; potentially with the firm’s knowledge. A New York Times story earlier this month then claimed that Israeli spies which had also compromised Kaspersky Lab software had spotted Kremlin hackers using its tools, evidence it passed on to Washington, which then banned federal use of all products. However, Kaspersky Lab now says it has reviewed telemetry logs in relation to “alleged 2015 incidents described in the media”. Most notably, it claims the NSA worker in question, who took home the stolen classified materials, disabled the Kaspersky Lab software running on his PC after it detected new versions of Equation APT – malware linked to the US spy agency. It continues: “Following these detections, the user appears to have downloaded and installed pirated software on his machines, as indicated by an illegal Microsoft Office activation key generator (aka ‘keygen’) which turned out to be infected with malware. Kaspersky Lab products detected the malware with the verdict Backdoor.Win32.Mokes.hvl. To install and run this keygen, the user appears to have disabled the Kaspersky products on his machine. Our telemetry does not allow us to say when the anti-virus was disabled, however, the fact that the keygen malware was later detected as running in the system suggests the antivirus had been disabled or was not running when the keygen was run. Executing the keygen would not have been possible with the anti-virus enabled.” This “full blown backdoor” could have allowed third parties to access the user’s machine, Kaspersky Lab claimed. An unspecified time later, the same user re-enabled Kaspersky Lab and new malicious variants of Equation APT were sent back to the vendor’s servers for analysis. “After discovering the suspected Equation malware source code, the analyst reported the incident to the CEO,” it added. “Following a request from the CEO, the archive was deleted from all our systems. The archive was not shared with any third parties.” Kaspersky Lab claimed no further detections were received from the user in 2015 and there have been no other incidents or third-party intrusions to date, except the “Duqu 2.0” intrusion thought to be the work of Israeli spies. What’s more, Kaspersky Lab confirmed it has never created any detection of non-malicious documents in its products based on keywords like “top secret” and “classified”, as alleged in a WSJ story. The only question mark remains around the timing of the incident. Most reports have it as 2015, while Kaspersky Lab claimed it happened in 2014. The firm went public with its findings on the NSA’s Equation Group in February 2015. As part of its efforts to prove its innocence, Kaspersky Lab this week launched a Global Transparency Initiative under which it plans to offer its source code for independent third party review. < Here >
  20. Under-fire cybersecurity giant Kaspersky Lab has launched a new transparency initiative which will see its source code offered up for independent review. The firm’s Global Transparency Initiative aims to restore trust in the company at a time when its products have been banned by the US government amid reports of Russian intelligence using them to spy on targets. The initiative promises an independent review of the vendor’s source code by Q1 2018, to be followed by similar reviews of its software updates and threat detection rules after that. Kaspersky Lab also set out plans for an independent assessment of its secure development lifecycle processes and its software and supply chain risk mitigation strategies by Q1 next year, and claimed it will ask an independent third party to test compliance with a newly developed set of controls governing data processing practices. Other aspects of the initiative include the creation of three new Transparency Centres where trusted partners can access reviews of the company’s code, software updates, and threat detection rules, among other things. These will be located in the US, APAC and Europe, with the first center planned to launch next year. The Moscow-headquartered vendor also announced an increase in bug bounty payments for its Coordinated Vulnerability Disclosure program to £75,000 ($100,000). The transparency initiative can be seen in the context of a raft of bad publicity for the firm stemming from Washington’s ban on its products for federal use. It has been reported that this decision was influenced by intelligence from Israeli spies, who spotted Russian agents using Kaspersky Lab AV to scan for and steal information on top secret US government programs. This apparently led to the theft of classified material from an NSA contractor’s home. Kaspersky Lab has always maintained its innocence, and it is entirely feasible that Russian intelligence compromised its products without its knowledge; just as the Israelis are alleged to have done. Chairman and CEO, Eugene Kaspersky, argued in a statement that there’s a strong need to re-establish trust between companies, governments and citizens. “That’s why we’re launching this Global Transparency Initiative: we want to show how we’re completely open and transparent. We’ve nothing to hide. And I believe that with these actions we’ll be able to overcome mistrust and support our commitment to protecting people in any country on our planet,” he added. < Here > and < Here >
  21. Kaspersky Rescue Disk 10.0.32.17 (Build 2017.10.23) Create a disk image to boot from and safely remove viruses from your computer in a non-dangerous environment provided by Kaspersky Kaspersky Rescue Disk is a virus removal solution for critical situations. It was designed to be used when regular antivirus software fails in detecting and cleaning a system of various infections. If you own Kaspersky antivirus or Kaspersky Internet Security , the Rescue Disk can be recorded directly via these products. If not, the ISO can be burned on a CD/DVD using your disc burner or choice. It can also be placed on a bootable USB device and launched from there. Here’s how it works: set your system to boot from the CD / DVD/ USB device, insert the disc or the stick and restart the system. After a quick loading process, you are acquainted with the interface of Kaspersky Rescue Disc. You simply select the objects Kaspersky should process (disk boot sectors, hidden startup objects, or local hard drives), and hit the scan button. The Rescue Disk then delivers a report of all malicious objects found in your system, such as viruses and Trojans, but also adware and other similar software. Infected files can be quarantined, disinfected, or removed. The Settings menu allows you to configure the current security level, file types, scan optimization (i.e. skip files scanned longer than a given number of seconds), archive scanning, installation packages, and others. Updates are done on a regular basis, and notifications can be set for malware detection or modifications, obsolete databases, failed tasks, or others. In conclusion, Kaspersky Rescue Disk is a great way to remove threats that can’t be cleaned by standard antivirus solution. It requires quite the amount of effort (burning the CD / DVD), but it succeeds where other security solutions fail. How to start a virus scan using Kaspersky Rescue Disk: https://support.kaspersky.com/8097 UserGuide: https://media.kaspersky.com/downloads/consumer/kasp10.0_rescuedisk_en.pdf Home: https://support.kaspersky.com/viruses/rescuedisk Download ISO (320 MB): http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso
  22. Kaspersky Lab Products Remover 1.0.1275.0 Portable Kaspersky is one of the leading antivirus companies with a very good background in antivirus solutions.Kaspersky offers its customers state of the art antivirus solutions and security products to keep their systems safe from all kinds of digital threats. Unfortunately, when you try to uninstall these products via the built-in uninstaller in Windows, various errors may occur. The applications might not be uninstalled completely and remnants of the programs may still be found on your system. Kaspersky Anti-Virus Remover is a small utility that enables you to easily uninstall various Kaspersky products from your computer. The application can remove the following programs from your PC: Kaspersky Small Office Security 2 for Personal Computer / for File Server, Kaspersky PURE / PURE R2, Kaspersky Anti-Virus (all versions), Kaspersky Internet Security (all versions), Kaspersky Password Manager (all versions), AVP Tool driver and Kaspersky Lab Network Agent 8. By default, the application automatically detects Kaspersky programs and offers to uninstall them. However, if the product was not detected, you can manually select it from the given list. When you are not sure about which Kaspersky product is installed on your machine the “Remove all known products” option can come in handy. Selecting it automatically removes all traces of all the supported applications from your system without the need of pointing it to any of them. After you have chosen the desired product you have to enter a security code in order to start the removal process. If you want to safely uninstall your Kaspersky products and remove all traces from your hard drive, Kaspersky Anti-Virus Remover will do the trick. The removal utility can be used to remove the following products: AVP Tool Driver KPM 8 MR1/MR2 Kaspersky Anti-Virus 2009 Kaspersky Anti-Virus 2010 Kaspersky Anti-Virus 6.0 FS MP4 Kaspersky Anti-Virus 6.0 SOS MP4 Kaspersky Anti-Virus 6.0 WKS MP4 Kaspersky Anti-Virus 6.0 for Windows Servers Kaspersky Anti-Virus 6.0 for Windows Workstations Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) MR1 Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition (x64) SP2 Kaspersky Anti-Virusflnternet Security 2011 Kaspersky Anti-Virusflnternet Security 2012 Kaspersky Anti-Virusflnternet Security 2013 Kaspersky Anti-Virusflnternet Security 2014 Kaspersky Anti-Virusflnternet Security 2015 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 15.0.1.415 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 15.0.2.361 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2016 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2017 Kaspersky Anti-VirusInternet SecurityKaspersky Total Security 2018 Kaspersky Endpoint Security 10 for Windows Kaspersky Endpoint Security 10 for Windows Service Pack 1 MRl Kaspersky Endpoint Security 8 Kaspersky Fraud Prevention for Endpoint Kaspersky Fraud Prevention for Endpoint 2015 Kaspersky Fraud Prevention for Endpoint 2016 Kaspersky Internet Security 2009 Kaspersky Internet Security 2010 Kaspersky Lab Network Agent 8,9 Kaspersky Network Agent 10 Kaspersky PURE 2.0 / CRYSTAL Kaspersky PURE 3.0 / CRYSTAL Kaspersky PURE/CRYSTAL Kaspersky Password Manager 4/5 Kaspersky Security Scan Kaspersky Small Office Security Kaspersky Small Office Security 15.0.2.361 Kaspersky Small Office Security 3 Nifty Security24 Internet Security Nifty Security24 Internet Security 2013 Changelog: New in version 1.0.1275.0 Added deletion: Kaspersky Anti-Virus \ Internet Security 2018 for Nifty Home Kaspersky Lab Products Remover - Service Articles - Guide/Manual - Official Download - EXE Download - ZIP
  23. BERLIN (Reuters) - Germany’s BSI federal cyber agency said on Wednesday it had no evidence to back media reports that Russian hackers used Kaspersky Lab antivirus software to spy on U.S. authorities. “There are no plans to warn against the use of Kaspersky products since the BSI has no evidence for misconduct by the company or weaknesses in its software,” BSI said in an emailed response to questions about the latest media reports. “The BSI has no indications at this time that the process occurred as described in the media.” The New York Times reported on Tuesday that Israeli intelligence officials spying on Russian government hackers found they were using Kaspersky software as a sort of Google search to find sensitive data stored by U.S. government agencies and others. It said the Russian operation also stole classified documents from a U.S. National Security Agency employee who had improperly stored them on his home computer, which had Kaspersky antivirus software installed on it. The U.S. government last month ordered Kaspersky software removed from government computers, saying it was concerned the Moscow-based cyber security firm was vulnerable to Kremlin influence. Kaspersky Lab has repeatedly denied any knowledge of, or involvement in, Russian hack1ing. ”Kaspersky Lab has never helped, nor will help, any government in the world with its cyberespionage efforts,” a company statement said on Tuesday in response to the New York Times report. Germany’s BSI, which also uses Kaspersky products for technical analyses, said it was in touch with U.S. officials and other security agencies about the issue so it could take action and issue a warning on short notice if required. It said German government agencies could use software protection for clients and servers that is offered by CANCOM online GmbH, which works together with Trend Micro (4704.T). < Here >
  24. Kaspersky Lab, a cybersecurity firm still under fire in the United States, announced a new threat sharing agreement with Interpol on Thursday. "INTERPOL's new agreement with Kaspersky Lab is an additional step in our continued efforts to ensure law enforcement worldwide has access to the information they need to combat cyberthreats," said Noboru Nakatani, executive director of the Interpol's Global Complex for Innovation. "We have seen how cooperation with the private sector is essential in effectively tackling this global phenomenon which continues to grow in scale and complexity." A recent spate of news stories has suggested Russian intelligence leveraged Kaspersky Lab antivirus's ability to scan files to search for documents and source code related to United States intelligence operations. This included a New York Times report that Israeli intelligence officials hacked into Kaspersky Lab's systems, where they witnessed Russian agents acting against the U.S. in real time. Those reports follow the Department of Homeland Security barring federal agencies from using Kaspersky products this September. At a conference earlier this weak, Nakatani said Interpol had received no intelligence from the United States to suggest that Kaspersky was a threat. < Here >
  25. How long can Kaspersky survive the assault on its business in America? It's already been thrown out of Best Buy stores, is close to being expelled from U.S. government networks and even private industry are being told to stop using the Russian company's anti-virus tools. Then yesterday another bombshell, the biggest so far regarding the company's alleged links to Russian government hackers: an NSA employee was compromised by Russians who allegedly used Kaspersky to determine there were files of interest related to the intelligence agency's cyber operations on the victim's computer. Nail after nail has been put in Kaspersky's American coffin, but is it going six feet under on these shores? Not yet. There's enough wiggle room left open by the reporting, largely and understandably based on anonymous sources, for the Russian security giant, led by billionaire CEO Eugene Kaspersky, to keep alive. Just. To recall the accusations in the WSJ's report: in 2015 a substantial but unspecified number of files were stolen from an NSA contractor's PC. The hackers were alerted "to the presence of files that may have been taken from the NSA," the report noted, citing according to anonymous sources. A subsequent Washington Post article confirmed this leak, the third major breach of sensitive NSA data in the last decade after the Edward Snowden and Harold T. Martin III incidents, the hacked party was a Vietnamese national who worked in the NSA's elite hacking division, Tailored Access Operations. Previous reports suggested he was a contractor. The government investigation is ongoing. A billionaire's fury There's little detail on what role Kaspersky or its software played in the breach. In the worst case scenario for Kaspersky, it would've actively colluded with the Russian government, purposefully passing on data collected by its antivirus systems to pinpoint which computers contained NSA cyber tools, most likely those it researched, such as those produced by the Equation Group. Kaspersky Lab was the first to detail the tools of that latter crew, widely believed to belong to the NSA and which a shady crew called the Shadow Brokers claimed to have stolen. The group subsequently leaked cyber tools, most notoriously those targeting Microsoft Windows that ended up being adapted to spread the WannaCry ransomware. Or it may be that whoever hacked Kaspersky in 2015 managed to pilfer that information and pass it on to the Kremlin's digital sleuths. The hackers might also have exploited Kaspersky as a way into the contractor's PC; researchers have found multiple vulnerabilities in the anti-virus in recent years, including recent finds by Google and one hole that tricked Kaspersky into funnelling stolen data out of a hacked computer via its own cloud. Finally, it's possible Russian spies intercepted the data after it was flagged on the user's PC by Kaspersky and sent to the company's Russian servers for analysis, a typical process in anti-virus systems. But there's no evidence indicating any of those three scenarios happened, and Eugene Kaspersky, who's repeatedly been the subject of reports linking him to Russian intelligence agencies, didn't give much credence to them. Quite the opposite. Not long after Thursday's story broke, the chief issued another vociferous response, having previously defended his company and his reputation on Forbes. He labelled the report "sensationalist," and at the heart of his defense was his note that Kaspersky has to have deep access to a computer's files in order to determine what was malicious. It appeared to the CEO that a Kaspersky tool did its job in finding possible NSA malware (he also cited the Equation Group research, but didn't link it to the agency) and that some added "fictional" information made it seem like the company was somehow complicit in helping Russian government hackers. "While protecting our customers, we do – as any other cybersecurity vendors – check the health of a computer. It works like an X-ray: the security solution can see almost everything in order to identify problems, but it cannot attribute what it sees to a particular user," he wrote. "If our technologies detect anything suspicious and this object is identified as malware, in a matter of minutes ALL our clients no matter who and where they are, will receive protection from this threat. Citing a tweet from former GCHQ cyber specialist Matt Tait that Kaspersky could've simply detected NSA spy tools on the infected computer, the CEO added: "The new allegations look to me like that: someone just took this process of how we deal with a threat, added some fictional details, and here we go – the new C level movie script is ready." Kaspersky also issued an official response, questioning the anonymous sources in the WSJ report and reiterating it had no inappropriate ties to government. "The only conclusion seems to be that Kaspersky Lab is caught in the middle of a geopolitical fight," the company said. Western defenders? But Kaspersky isn't definitively done in America. It has its supporters in the west, despite the government's apparent antipathy. Former NSA staffer and long-time cyber specialist for the U.S. government, Jake Williams, said the allegations were "certainly damning if true." But he feared confirmation bias on behalf on the analysts who looked into the hack of the contractor's PC. "I would be skeptical of any forensic analyst who says they can tie the theft of files on the machine to Kaspersky software. Now if the intelligence community has additional collection that proves those files were collected by Kaspersky, then that's something else entirely," Williams told Forbes. "As it stands, this sounds like it could be a case of confirmation bias. The contractor took classified documents home, those documents were found to have been compromised, and when it was discovered they were running Kaspersky on their machine an analyst said 'aha, it was Kaspersky that enabled hackers to compromise the machine.'" Thomas Rid, a professor at Kings College London who's worked alongside Kaspersky researchers, concurred there weren't enough facts to kill Kaspersky. "Not if you're assessing the evidence on its merits," he added. "But that is so old-fashioned." < Here >
×