Jump to content

Search the Community

Showing results for tags 'kaspersky'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 71 results

  1. Kaspersky Endpoint Security 10 Service Pack 2 for Windows Kaspersky Endpoint Security 10 Support >>> hOMEPAGE: http://aes.kaspersky-labs.com/english/endpoints/kes10windows/ Kaspersky Endpoint Security 10 SP2 English Download Link: AES256 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes256.exe ES56 encryption (English) http://aes.kaspersky-labs.com/english/endpoints/kes10windows/kes10winsp2_en_aes56.exe Other Languages Download Links: Other Languages Download Links: http://aes.kaspersky-labs.com/ Release Notes: Kaspersky Endpoint Security 10 Service Pack 2 for Windows Version 10.3.0.6294 03/28/2017 How to activate using key files: 1. Click License Tab on the left corner 2. Click red cross delete the existing trial or block keys. 3. Hit Activate the application under a new license 4. Click activate with a key file and browse the key file Next to activate How to renew activation code for Kaspersky Endpoint Security 10 for Windows Activate Via Key File: https://support.kaspersky.com/us/13085#block1 MEDICINE: .lic file download Links see the topic reply there --> How to Activate Via Key File
  2. Russian security firm Kaspersky just launched a new version of Kaspersky Security Cloud Free, a free cloud-based security solution for Windows devices. One question that may come up is how Security Cloud Free differs from Kaspersky's Free Antivirus solution the company revealed in 2016 and rolled out to a worldwide audience in 2017. The product's name reveals the core difference between the two free security products. Kaspersky Security Cloud Free, also known as Adaptive Security, gives you remote control and management options that Kaspersky Free Antivirus does not support. Kaspersky notes that Security Cloud gets all new tools and features first before any other product. Kaspersky Security Cloud Free requires a (free) Kaspersky account to use the program whereas Free Antivirus has no such requirement. Kaspersky Security Cloud Free review You are asked to sign in to a Kaspersky account or create a new one on start of the program. In fact, you cannot do anything until you sign in to the account. The program displays a series of screens on first sign in that highlights the program's core functionality and some of the features reserved to the paid versions. The interface holds no surprises. You can run a scan directly from the startpage or check the recommendations the program has for you. Kaspersky recommended to configure backup and restore which is a feature of the software program, and to install the company's password manager application and Internet Explorer extension. The backup functionality is basic but sufficient for creating backups of important files on the system. Kaspersky displays options to back up four different file types or locations, and an option to select custom locations for backup. The four available types are: All files in My Documents and on the Desktop. All pictures and photos. All movies and videos. All music files. You can select one of the options only at a time which is a usability issue. The best option that you have is to use the custom folder selector as it supports adding multiple locations to a single backup job. Data can be backed up to a location on the device or online storage space that Kaspersky provides (for a price). Antivirus protection works as you'd expect it to. Kaspersky Security Cloud Free runs automatic scans regularly to find threats and eliminate them. You can run full, quick, and custom scans manually at any time, and schedule scans so that they run based on your preferences. The Password Manager and Secure Connection links work but both features are limited. Kaspersky displays links to two features in the main interface that are not available in the free version. Prompts to upgrade to a paid version are displayed when you select Privacy Protection or Safe Money. The My Tools link opens a new page with a large assortment of tools and information. Some of the tools are reserved for paying customers though. Weak Settings Control -- Scans the computer for weak settings such as "file extensions are not displayed for known file types" so that they can be adjusted to improve security. My Kaspersky -- Option to open the web interface and to disconnect the installation. Cloud Protection -- Checks the connection status and displays stats. Quarantine -- Manage quarantined items. Kaspersky Rescue Disk -- create a rescue disk so that you can boot into a rescue environment when Windows does not boot anymore. My Network -- Paid options to list connected devices in the network and includes network monitoring. Manage Applications -- Paid options to check for software updates, control applications and to enable trusted applications mode to allow only trusted programs to run. Data Protection -- The file shredder to delete files securely and the on-screen keyboard are available in the free version. Paid versions get scheduled backups, data encryption, and a health monitor for hard drives as well. Clean and optimize -- Includes various tools to remove temporary data and improve privacy. PC Cleaner tool reserved for paying customers. Security Cloud Free supports additional features that you find highlighted in the program settings under protection. The app includes network attack blocker, system watcher, instant messenger anti-virus, and mail anti-virus protection. Not mentioned are the new Exploit Prevention feature and ransomware protection. The program works out of the box for the most part. While you can make some modifications, e.g. turn off select protective components, most users probably keep everything as is. The differences Kaspersky Security Cloud Free has limited functionality when compared to the Personal and Family versions. It features antivirus protection and the secure connection feature. The built-in password manager is limited to 15 passwords which makes it unusable for most users. Secure Connection is a VPN service that users of the software may connect to. The free version is good for 200 Megabytes of data per day and lacks paid options such as the selection of regions to connect. Kaspersky may suggest to connect to the VPN automatically based on the device's connections status. If the device is connected to an Open WiFi network, Kaspersky may suggest to establish a VPN connection using Secure Connection to protect data and improve privacy. Features such as privacy protection, a built-in firewall, family sharing, kids protection, or safe money are reserved for paying customers. Web Management One of the core differences to Free Antivirus is the new web management functionality that Kaspersky baked into Security Cloud Free. You can sign in to your account and manage all devices connected to it. Management includes interesting options such as running full or quick scans, running database updates, or managing components. You get status information, e.g. the product is up to date or "no threats detected", on top of that. Options to link more devices to an account are provided and the web management interface's use increases with every device you add to it as it provides you with better manageability options. Criticism and issues Kaspersky Security Cloud Free requires registration and enables remote management of connected devices automatically. Users who dislike the functionality may select Free Antivirus instead which comes without it. It is understandable that Kaspersky wants to earn money from its products but the main interface needs information about the "only in paid version" icon that is displayed on some of the options. Kaspersky highlights what the icon means on the "more tools" page but not on the main page. Kaspersky Labs has been in the news lately because of alleged ties to the Russian government and bans on Kaspersky products for government use in the United States and other regions. Closing Words and verdict Kaspersky Security Cloud Free or Kaspersky Free Antivirus? The choice depends on whether you require remote management capabilities or not. The core functionality is nearly identical and while users of Security Cloud Free may get new features before Free Antivirus users, included protective features are mostly identical. Security Cloud is available for Android and iOS as well so that these may be managed from the management interface on the Kaspersky website. Kaspersky is always doing well in tests and Security Cloud Free is no exception to that as it shares protective features with other Kaspersky products. You can check out how Kaspersky products are ranked on AV-Test or AV Comparatives. Source
  3. Kaspersky denies it’s responsible for Windows 10 update fails as blame game commences Update was supposed to fix Kaspersky Rescue Disk (Image credit: Kaspersky) Microsoft has pulled a critical Windows 10 update that was causing installation issues, and while the update was supposed to fix a security issue with Kaspersky's Rescue Disk software, the security company is denying that it is the cause of the update's problem. Windows 10 KB4524244 was supposed to fix a security vulnerability in the Kaspersky Rescue Disk software, which was publicly disclosed in April 2019. Although Kaspersky claimed it fixed the issue in August 2019, in February 2020 Microsoft released the Windows 10 KB4524244 update that revokes the UEFI signatures in a bid to “prevent attacks against Secure Boot using doctored previous versions of Kaspersky Rescue Disk” according to Kaspersky. In classic Microsoft fashion, however, KB4524244 has been causing more issues than it fixes, with people reporting that their PCs no longer boot after installing the update, and Kaspersky is keen to highlight that it’s not to blame. Radio silence Kaspersky isn’t completely innocent in all this. After all, it did release a security tool with a glaring security vulnerability included, which is pretty much the last thing you’d want, but to be fair it fixed the problem back in 2019. And, while the update Microsoft issued was to further protect against the issue (though a few months after the issue itself was fixed), it’s likely the problem lies with Microsoft and not Kaspersky. Considering Microsoft’s poor run of faulty Windows 10 updates, it’s easy to lay the blame at Microsoft’s feet. There’s also the concerning revelation by Kaspersky that Microsoft did not contact the company about the update and the issue it was causing. As Softpedia reports, the security company has said that “Microsoft has not reached out to Kaspersky concerning the update issue. After detailed internal analysis, our experts concluded that Kaspersky products have not been a cause of this issue.” One of the biggest criticisms of how Microsoft is handing updates these days is its lack of communication and secrecy. If there was an issue with an update that concerns a particular bit of software, you’d have hoped that Microsoft would work with the software developer to come up with a fix. Frustratingly, that doesn’t seem to have happened. As for Windows 10 KB4524244, this is now yet another update that Microsoft has had to pull due to problems. The update doesn’t look like it will be rereleased, either, with Softpedia saying that Microsoft will instead release bug fixes in a future update. Let’s hope that one isn’t riddled with problems as well. Source: Kaspersky denies it’s responsible for Windows 10 update fails as blame game commences (TechRadar)
  4. KAV\KIS\KTS\KFA\KS\KSOS: 21.0.37.1270 Beta Good news for everyone! A new version of the beta build is available for download and testing. You can download the version from the links below Mirror - 1 Mirror - 2 Can be activated only through Internet. Beta-license is valid for 90 days. Before installation of the new build, please uninstall the previous build (sometimes kavremover may be needed) and reboot the system Advices for novice testers Do not proceed with testing without reading the instructions; All found bugs should be posted in the related topics so it would be wise to read their headers at first. Bug reports should contain all useful info (it will be clear after reading the instruction from p.1); The most convenient way to upload big files (traces or dumps): in .zip archive on OwnCloud.; Traces as well as app and driver verifiers are enable in this build. This area of forum is not connected to Tech Support (Bugs of Beta-products are collected here) Additional Information Please don't post on the beta forum if you are not participating in the beta testing. Source: KAV\KIS\KTS\KFA\KS\KSOS: 21.0.37.1270 (Dmitriy.Pisarets)
  5. Kaspersky Endpoint Security 11 for Windows v11.2.0.2254 What's new: Kaspersky Endpoint Security for Windows 11.2.0 offers the following features and improvements: Support for operating systems: Support for Windows 10 operating system version 1909 (19H2). The settings for Kaspersky Endpoint Security for Windows 11.2.0 can now be saved when upgrading Windows 7 / 8 / 8.1 to Windows 10. No additional configuration of the application is required after upgrading the operating system. Support for AM-PPL (Antimalware Protected Process Light) technology for the Windows Server 2019 operating system. Support was previously added for AM-PPL technology for Windows 10 version 1703 (RS2) or later operating systems. AM-PPL technology protects services of Kaspersky Endpoint Security against malicious actions. AM-PPL technology is enabled by default. You can turn off the technology by using setup.ini file. For more details about AM-PPL technology, please visit the Microsoft website. It is no longer necessary to decrypt hard drives when upgrading the Windows 10 operating system through WSUS (Windows Server Update Services) on computers that are protected by Kaspersky Disk Encryption technology. This feature is available for Windows 10 version 1607 (RS1) or later. Before upgrading earlier versions of the operating system, you need to first decrypt the data, upgrade the operating system, and then encrypt the data again. Support for Kaspersky Sandbox. Kaspersky Sandbox is a solution for detecting sophisticated threats. Kaspersky Sandbox runs suspicious objects on a virtual machine and analyzes their behavior. To start working with Kaspersky Sandbox, you need to install the Endpoint Agent component. The Endpoint Agent component is displayed separately in the list of installed applications of the operating system. For detailed information on the operation of Kaspersky Sandbox, please refer to Kaspersky Sandbox Help. Capability to use a task to delete data on users' computers. The task allows you to delete data in the following modes: immediate data deletion and delayed data deletion. In immediate data deletion mode, you can, for example, delete outdated data to free up disk space. In delayed deletion mode, you can, for example, protect data on a laptop in case of loss or theft. To do so, you can configure automatic data deletion if the laptop goes outside the boundaries of the corporate network and has not been synchronized with Kaspersky Security Center in a long time. To delete data on users' computers, you need to create and run a special task of Kaspersky Endpoint Security. Support for managing the application through the REST API. Using a third-party REST client, you can configure the settings of Kaspersky Endpoint Security, run a virus scan, update anti-virus databases, and perform other actions. To get started with the REST API, you need to enable the REST service when installing or upgrading the application. You can enable the REST service by using setup.ini file. Device Control: Notifications have been optimized for CD/DVD drives. Device Control does not display notifications if there is no disc in the CD/DVD drive or a disk image is not mounted for the virtual drive. Anti-Bridging settings are highlighted in a separate Device Control block. You can use a separate "lock" attribute to prohibit changes in the Anti-Bridging settings block in the child policies and local settings of the application. Other improvements: There is now the capability to monitor user activity on the Internet (Web Control). Kaspersky Endpoint Security logs data on user visits to all websites, including allowed websites. This enables you to obtain the complete history of browser views. To enable logging of events for visits to allowed websites in Kaspersky Endpoint Security, you need to configure Web Control. User access to application uninstallation, modification, and recovery operations (Password Protection) has been optimized. These operations are available not only to the KLAdmin user, but also to other users, including the Everyone group. Access to other application functions has also been optimized. There is now the capability to change the length of the encryption key (AES56 / AES256) through a Kaspersky Endpoint Security upgrade. However, there are limitations on changing the length of the encryption key through an application upgrade. Release date: 11 November 2019 Download: https://support.kaspersky.com/kes11#downloads or: keswin_11.2.0.2254_en_aes256.exe v11.2.0 PDF: https://help.kaspersky.com/KESWin/11.2.0/en-us/KESWin-11.2.0-en-US.pdf
  6. Updated: The internal API has been subject to not one, but multiple failed fix attempts. Vulnerabilities in Kaspersky software have left an internal API open to abuse by webmasters and attempts to patch have, so far, failed. On Monday, software developer Wladimir Palant documented the saga, which began after he began investigating Kaspersky Web Protection features included in software such as Kaspersky Internet Security 2019. The online protection functionality includes scans of search results to weed out potentially malicious links, ad blocking, and tracking prevention. In December last year, the developer found a set of vulnerabilities and security issues in the Web Protection feature, which can be enabled by any website. Web Protection needs to be able to communicate with the main Kaspersky application and a "secret" signature value, which in theory is not known to web domains, is enabled to ensure secure communication. However, a security flaw permitted websites to elicit this key "fairly easily," according to Palant, and "allow them to establish a connection to the Kaspersky application and send commands just like Web Protection would do." Chrome and Firefox extensions use native messaging to retrieve the signature, whereas Internet Explorer reads script injections. Without a browser extension, Kaspersky will inject its scripts directly into web pages, and this is where the first vulnerability of note, CVE-2019-15685, appeared through the abuse of URL Advisor and frames in order to extract the signature. "Websites could use this vulnerability, for example, to silently disable adblocking and tracking protection functionality," the developer says. "They could also do quite a few things where the impact wasn't quite as obvious." After the flaw was reported, Kaspersky developed a fix in July 2019 by blocking access to some functionality to websites in 2020 products. However, other commands could still be accepted, such as whitelisting websites on adblockers (CVE-2019-15686). A new issue also emerged due to the failed patch; websites were able to access user system data, including unique identifiers of the Kaspersky installation on a PC (CVE-2019-15687). "When I tried the new Kaspersky Internet Security 2020, extracting the secret from injected scripts was still trivial and the main challenge was adapting my proof-of-concept code to changes in the API calling convention," Palant says. "Frankly, I cannot blame Kaspersky developers for not even trying -- I think that defending their scripts in an environment that they cannot control is a lost cause." This inadvertently-introduced data leak was not the end of the story. Palant says that the patch also introduced a new vulnerability that could be used to trigger a crash in the antivirus process, leaving systems vulnerable to compromise, tracked as CVE-2019-15686. The cybersecurity firm then attempted another fix, resolving the data leak and "mostly" fixing the crash issue; websites no longer could trigger a crash, but browser extensions or local applications possibly could. A new patch has been developed and will be made available on November 28, but given a fallback script injection approach rather than relying purely on browser extensions, the developer isn't hopeful when it comes to the true resolution of the problem. "Maybe Kaspersky is so attached to scripts injected directly into web pages because these are considered a distinguishing feature of their product, it being able to do its job even if users decline to install extensions," the developer says. "But that feature also happens to be a security hazard and doesn't appear to be reparable." "One thing won't change, however: websites can still send commands to Kaspersky applications. Is all the functionality they can trigger there harmless? I wouldn't bet on it." Update 14.14 GMT: A Kaspersky spokesperson told ZDNet: "Kaspersky has fixed security issues in the web protection component in its products and product extensions for Google Chrome. These security issues were fixed by patches 2019 I, J and 2020 E, F, which were delivered to users through the automatic update procedures. A reboot may be required to apply these updates. The company also recommends that users make sure that Kaspersky protection extensions for web browsers are installed and enabled. Detailed information about the fixed issues is available on the Kaspersky website." Source
  7. The NSA had superior insight into foreign nation-state hacking operations than many cyber-security vendors. In 2017, a mysterious group of hackers known as the Shadow Brokers published online a data dump called "Lost in Translation." The data dump -- believed to have been obtained from the US National Security Agency (NSA) -- contained a collection of exploits and hacking tools, including the now-infamous EternalBlue, the exploit that provided the steam for the WannaCry, NotPetya, and Bad Rabbit ransomware outbreaks of 2017. However, one of the nuggets in the release was a file named sigs.py, a veritable treasure trove of signals intelligence data. This file worked as a built-in malware scanner that NSA hackers were using to scan computers they infected, looking for the presence of other APTs -- advanced persistent threats, a term often used to describe nation-state hacking groups. In total, the sigs.py script included signatures to detect 44 other APTs. Many were unknown to the cyber-security industry at the time of the leak, back in 2017, showing that the NSA had a leg up on the private sector, being aware and capable of detecting and tracking the operations of many hostile APTs. But in a report last month, GReAT, Kaspersky's elite hacker hunting unit, said they've finally managed to identify one of those mysterious APTs -- namely the group tracked through the sigs.py signature #27. Image: Kaspersky Kaspersky says signature #27 can identify files that are part of "DarkUniverse," a malware framework, and a name they are now also using to track the APT and its activities. Researchers say the DarkUniverse group has been active from 2009 to 2017, appearing to go silent after the ShadowBrokers leak. "The suspension of its operations may be related to the publishing of the 'Lost in Translation' leak, or the attackers may simply have decided to switch to more modern approaches and start using more widely available artefacts for their operations," the GReAT team said today in a blog post detailing the DarkUniverse malware framework. 20 victims identified across Africa and EMEA The company says it tracked down "around 20 victims geolocated in Syria, Iran, Afghanistan, Tanzania, Ethiopia, Sudan, Russia, Belarus and the United Arab Emirates." The victims included both civilian and military organizations, such as medical institutions, atomic energy bodies, military organizations and telecommunications companies. However, Kaspersky experts believe the actual number of victims may be much greater, due to the lapse of time and lack of further visibility into the group's operations. As for the DarkUniverse malware framework, Kaspersky said they found code overlap with the ItaDuke malware/APT -- which is known to have targeted China's Uyghur and Tibetan minorities. However, it is unclear if the DarkUniverse malware is the work of Chinese hackers. More clues will be needed apart from basic code overlap, which can be easily forged and is a common occurrence. Below are the capabilities of the DarkUniverse malware framework, a typical remote access trojan, and a pretty advanced one, according to Kaspersky's assessment. Image: Kaspersky Source
  8. Kaspersky fingers pro-G filters for letting cyber-muck through Spammers are abusing the preferential treatment Google affords its own apps to score free passes through Gmail's spam filters, it was claimed this week. The ad giant greases the wheels so that incoming messages involving Google Calendar and other Big-G appsvslide through the filters and appear in Gmail inboxes, to ensure stuff generated and shared via its applications aren't silenced by its own webmail product. This situation, according to Kaspersky bods this week, is being exploited by scam artists to lob spam, phishing pages, and links to malicious malware-flinging websites at netizens, in some cases without triggering Gmail's defenses. "The spammer’s main task is to bypass the spam filter and deliver email to your inbox," Kaspersky analyst Maria Vergelis helpfully reminded us. "As it happens, Google services often send email notifications to Gmail inboxes — and Google’s antispam module avoids flagging notifications from its own services as spam." Because Google usually allows these kinds of notifications through, scammers have found they can schedule a load of events in Google Calendar, inviting Gmail users en masse, and, when the set time draws near, generate a wave of reminders that include spam, phishing links, and so on, at least some of which slips through Gmail's filters. For example, the scammer could send a block of Gmail users a Calendar invite with the description being a link to a fake banking site. Rather than catch and filter out the e-nasty, Gmail would let the notification through and, when the person clicked the link, they would then go to the phony bank page. If the recipient has Calendar set to automatically accept invites, they would even get a pop-up notification of the spam message. It is not only Calendar that is being gamed by scam artists. Vergelis noted that Google Photos is also a popular method for evading filters. In that case, the spam would either be placed within the image file or its description – for example the image could be a picture of a check and the description would be instructions on how to claim it, which would typically involve handing over personal information for nothing in return. Again, thanks to Google's overly slick sharing features, the recipient would get a notification in their Gmail inbox that they had a shared photo waiting for them, and the spam itself would be delivered without being troubled by a filter. Additionally, Kaspersky's team said Google Forms is being used to serve up fake surveys that harvest personal information, and Google Drive is being abused to host phishing pages, malware, and ad pages. Even Google Analytics is being turned into a tool for criminals. Vergelis said her team reported seeing businesses targeted with visitor statistics PDF files containing the spammer's links or information. In short, pretty much any Google service that integrates with Gmail can and will be abused to get as much spam into your inbox as possible, and the same goes for other services like Facebook and Twitter that allow users to send each other event notifications. "The main problem is that messages sent through a legal service are assigned its standard headers, so spam filters often view them as harmless," Vergelis explained. "And spam subjects vary widely, so interception requires a high threshold level in the spam filter, which can lead to excessive false positives. Spammers take advantage of this to exploit public services for their own purposes." In response to Kaspersky's findings, a Google spokesperson provided the Russian antivirus biz the following statement, which was shared with El Reg: "Google’s Terms of Service and product policies prohibit the spreading of malicious content on our services, and we work diligently to prevent and proactively address abuse. "Combating spam is a never-ending battle, and while we've made great progress, sometimes spam gets through. We remain deeply committed to protecting all of our users from spam: we scan content on Photos for spam and provide users the ability to report spam in Calendar, Forms, Google Drive, and Google Photos, as well as block spammers from contacting them on Hangouts. "In addition, we offer security protections for users by warning them of known malicious URLs via Google Chrome's Safe Browsing filters." Source
  9. KRT CLUB 2.1.2.69 Homepage: http://krt-club.ru Release Notes: https://pastebin.com/raw/F4ZPjVZG Instructions: 1. Make sure that 'Protection' and 'Self Defence' options of Kaspersky program are disabled. 2. Download the trial reset from the links below. 3. Run the trial reset and click on the button shown below. 4. Confirm the action by selecting Yes and restart. 5. Open Kaspersky and enable protection & Self Defence. 6. Activate trial from program. Download (Language file Added & links updated (English, French, German, Hungarian, Portuguese, Russian, Spanish, Vietnamese) Site: https://www.upload.ee Sharecode: /files/9162909/KRT_CLUB_2.1.2.69n.zip.html Mirror: Site: https://www.mirrored.to Sharecode: /files/1XFYHQTV/KRT_CLUB_2.1.2.69n.zip_links
  10. EU: No evidence of Kaspersky spying despite 'confirmed malicious' classification European Commission "not in possession of any evidence regarding potential issues related to the use of Kaspersky Lab products." Logo: Kaspersky Lab // Composition: ZDNet In a document published today, the European Commission has revealed that they don't have any actual evidence of Kaspersky software being used for spying on behalf of the Russian government, as the US government alluded in 2017. The document was the Commission's reply to a series of questionssubmitted by Gerolf Annemans, a European Parliament member on behalf of Belgium, in March this year. The questions were related to a motion the European Parliament voted in June 2018 that put forward a general strategy and guidelines for an EU-wide joint plan on cyber defense. The document advised EU states to exclude and ban programs and equipment that have been "confirmed as malicious," naming Kaspersky as the only example. 2018 EU MOTION LABELED KASPERSKY AS "CONFIRMED AS MALICIOUS" The EU voted its motion at a time when the US had just banned the use of Kaspersky softwareon government systems on the premise that Kaspersky antivirus software had been used to steal sensitive documents from government computers. The US government never backed up its claims but did the opposite by pressuring companies in the private US sector to stop using the Russian company's software. A general red scare followed in the US, with Best Buy and Office Depot pulling Kaspersky products off their shelves and Twitter banning the company from advertising on its network. The anti-Kaspersky panic spread across the pond to Europe, where the UK warned state agencies and private companies against using Kaspersky software on systems storing sensitive information, and the Dutch government deciding to phase out the use of Kaspersky products on government networks altogether. Kaspersky denied all accusations of any wrongdoing and even opened a "Transparency Center" in Switzerland where European governments could come and inspect its source code, and where the company said it would store all data on European users, without sending it to its Russian servers. BELGIAN MP ASKED FOR EVIDENCE In his March 2019 letter to the European Commission, MP Annemans wanted to know on what grounds and what evidence the EU Parliament voted to recommend the banning of Kaspersky in June 2018, and why it classified the company as "confirmed as malicious," alluding that the EU might have gotten its facts from press articles instead of intelligence briefings. Annemans cited reports authored by the German, French, and Belgium government which found no evidence of any wrongdoing on Kaspersky's side. Almost a year after the EU recommended that national governments ban Kaspersky software, the Commission has now admitted its mistake. "The Commission is not in possession of any evidence regarding potential issues related to the use of Kaspersky Lab products," a representative for the European Commission told Annemans in a reply dated April 12. The EU letter, however, does not to repair Kaspersky's market share, which suffered considerably after the US government ban and the EU Parliament vote. However, it brings a sense of justice for the company. Maybe following the publication of this formal acknowledgment that Kaspersky did nothing wrong, the Russian antivirus vendor might re-think its decision to withdraw from its once fruitful Europol partnership that led to the arrest of countless cyber-criminals, and which also spawned the NoMoreRansom project. Speaking at the Kaspersky Security Analyst Summit this month, Eugene Kaspersky, the company's founder, said the US government ban made cybercriminals happy. Source
  11. Kaspersky: US security software ban just 'makes cybercriminals happy' Kaspersky Lab sees little prospect of the US government lifting the ban on using its security products. Moscow-based cybersecurity company Kaspersky Lab believes there's little hope the US government will stop blocking the use of its antivirus software by federal agencies. "Unless the political situation changes, we don't expect any change... For the next couple of years, it is going to be more or less the same," Kaspersky Lab's head of CEO office, Anton Shingarev, said at a briefing on Wednesday in Singapore, during the company's annual conference, Security Analyst Summit. Shingarev argued that the ban is not based on facts, but rather on geography and politics. And that his company can do little to change the situation. "It's really hard to influence politics. We don't want to and we don't have the resources," Shingarev said. Kaspersky Lab's products were banned at the end of 2017, when all government agencies in the US were asked to remove the company's antivirus software from their networks. US officials argued that the company's products could be under the influence of the Kremlin, and so represent a threat to US national security. These measures were taken following concerns that Russian nation-state hackers had influenced the 2016 presidential election. "The case against Kaspersky is well documented and deeply concerning," Democratic Senator Jeanne Shaheen said in 2017. Kaspersky Lab's repeated attempts to overturn the ban have so far proved unsuccessful. The company's CEO, Eugene Kaspersky, argued on Wednesday that this situation "makes cybercriminals happy", at a time when international collaboration between law-enforcement agencies to bring down hacking gangs faces additional challenges. In November last year, the Moscow-based business opened a 'transparency center' in Zurich, Switzerland, inviting companies and public entities to review the source code of its products and to air any concerns. "There are partners [and] customers who asked questions: how [the product] actually works, how the data collection works, and how you design a product," Shingarev, said. Another transparency center, in Madrid, Spain, will open in the next few weeks, and a third one will launch in southeast Asia by the end of the year. Kaspersky Lab's CEO, Eugene Kaspersky, said the US ban has not been critical for his company, although sales have decreased in 2018 in North America, which is one of its most important markets. "It's not minus 100 percent, it's minus 25 percent," he said. "We still have a lot of individuals and companies who are very loyal customers." Kaspersky Lab's recently announced financial data shows that it has increased its global unaudited IFRS revenue to a total of $726m in 2018, up four percent, year over year. Sales in the Middle East, Turkey, and Africa region have risen by 27 percent, while those in Europe, Asia-Pacific, and the region made up of Russia, Central Asia, and CIS have each grown by six percent. However, the company's performance has dropped by 11 percent in Latin America, a trend Kaspersky Lab attributes to local currency devaluation. Source
  12. Kaspersky files antitrust complaint against Apple in Russia After Spotify complained about Apple's unfair App Store policies to EU authorities, Kaspersky does the same in Russia. Russian cyber-security firm Kaspersky Lab filed today an antitrust complaint against Apple with Russian authorities in regards to the OS maker's monopolistic grip over its official App Store. Kaspersky claims that Apple used its power over the App Store and the entire iOS app ecosystem to force its engineers into removing two features from the Kaspersky Safe Kids iOS app --namely app control and Safari browser blocking. The company argues that Apple did so to eliminate competition for the "Screen Time" feature that the OS maker added in iOS 12 in September last year. APPLE IS SABOTAGING "SCREEN TIME" COMPETITORS In a blog post published today, Kaspersky said that other app makers like AdGuard and Kidslox also lost their abilities to restrict access to apps after interventions from Apple. Furthermore, the Russian firm claims that Apple has embarked on what appears to be a concerted effort to crack down, remove, or reject any third-party screen time apps that may compete with built-in iOS features. "By setting its own rules for that channel, [Apple] extends its power in the market over other, adjacent markets: for example, the parental control software market, where it has only just become a player," Kaspersky Lab said. "It is precisely in this extension of its leverage through possession of so-called 'key capacity' over other segments, leading to restriction and elimination of competition, that we see the essential elements of antitrust law violation, which consist of erecting barriers and discriminating against our software," the antivirus maker added. "We have repeatedly tried to contact Apple to resolve this situation, but no meaningful negotiations have ensued." Kaspersky lodged its complaint with the Federal Antimonopoly Service of Russia (FAS), and only in Russia, but not in the European Union. The antivirus maker recognized Spotify's similar effort in the EU. Last week, the music streaming service filed a similar antitrust complaint against Apple because of its strict control over the App Store. Spotify claimed that Apple had used unfair App Store taxes to suppress the growth of Spotify and other competitors for Apple's own music service --Apple Music. Apple posted a blog post answering the Spotify complaint in the EU, but an Apple spokesperson did not return a request for comment in regards to Kaspersky's complaint today. KASPERSKY TOOK ON MICROSOFT AND WON This is not the first time that Kaspersky Lab files antitrust complaints against a Silicon Valley tech giant. The company filed an antitrust complaint against Microsoft in Russia and the EU in November 2016. The antivirus maker argued that Microsoft made it unfairly difficult for antivirus providers to compete following a major Windows 10 update. Kaspersky dropped its complaints in August 2017 after reaching a common ground with Microsoft after the Redmond-based OS maker revised its antivirus and update policies. Source
  13. File Size: 136 MB The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The product will scan the specified locations for any virus threats and remove them or send to Quarantine folder. Kaspersky Virus Removal Tool - software developed by Kaspersky Labs to provide additional security against malicious programs. Kaspersky AVP Tool finds and cures: viruses, Trojans, worms, spyware and adware, all types of rootkits and similar malicious programs. Features: • Excellent detection of malicious programs and strong ability to remove. • Simple and intuitive interface. • Can be installed on an infected system (in safe mode). • Comprehensive testing and treatment: the search for malware signature detection and heuristic analyzer. • Collect system information and interactive scripting. • Automatic and manual removal of various types of malicious programs. Detects viruses and other infections that may have reached your computer with the aid of different scan modes provided by Kaspersky No matter how carefully one uses the computer, they are still exposed to online threats and malware attacks, so the importance of having a correctly-configured antivirus solution should not be underestimated. However, in case the infection has already reached the PC and the security software app has been neutralized, there is one more tool that can be tested: Kaspersky Virus Removal Tool. Install the removal tool even on infected systems In most cases, when the virus is already on the target PC, there is nothing much one can do because the malware typically does not allow users to install or update any antivirus software. Kaspersky’s tool on the other hand has taken some protective measures: it can be installed on infected computers, even in Safe Mode, and it can automatically remove viruses, Trojans, rootkits, adware or spyware. User-friendly layout and fast scan process Installation is extremely quick and the scan process is very fast, with the application remaining quite friendly with the computer resources. The interface of Kaspersky Virus Removal Tool is equally intuitive, and users can only press the Scan button and continue with their work, as the process will run in the background. Activate the in-depth analysis mode If the results of the automatic scan are not satisfactory, one can also try the Manual Disinfection which performs an in-depth analysis of the computer, then generates a detailed report that can be sent to Kaspersky for further processing. Specify the target location Alternatively, one can also choose the target type of data that needs to be scanned, thus restricting the area of analysis, and the time of the scan, but this is only advisable when users are aware of the location of the infection. Also, modifying the security level to High can result in longer scanning times. Last but not least, Kaspersky Virus Removal Tool allows users to choose the action they want to take when a threat is detected, so experts can attempt to manually process the issue. Bottom line Overall, in case viruses and other infections have reached one's computer, Kaspersky’s tool can come to the rescue. But one should note that keeping a computer clean comes down to installing a full version of an antivirus solution, with real-time protection and periodic updates. Attention: Kaspersky AVP Tool is designed to quickly find and isolate files, but can not be used as a permanent means of virus protection. To ensure the security of your computer must have to have another "normal" anti-virus with the means of protection in real time. What's New: Database Update • Release of antivirus database updates (required to protect your computer/server/mobile device) Support • Providing technical support over phone / web Error fix • Release of patches for the application (addressing detected bugs) Home page: https://www.kaspersky.com/ https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool Download: http://devbuilds.kaspersky-labs.com/devbuilds/KVRT/latest/full/KVRT.exe
  14. It feels like there's a moral here IF YOUR MANAGER is pressuring you to take work home with you, you now have a ready-made excuse as to why that isn't a good idea. Ex-NSA employee Nghia Hoang Pho has been sentenced to five and a half years for taking top-secret defence files home - an act which ultimately saw US secrets being leaked. 68-year-old Pho maintained in court that he only took the files home to work on out of the office, with the aim of getting a promotion. If this was the case, it turned out to be a catastrophic error of judgement, as the Kaspersky Lab antivirus software on his computer hoovered up top secret information. Whether the reasoning for that is because the software liked or didn't like what it saw depends on who you believe, with Kaspersky claiming the NSA code was lifted for legitimate security analysis, rather than on behalf of the Russian government. Either way, it triggered a chain reaction which culminated in Kaspersky software being banned from government computers. However the secret information got into the wrong hands, in the court's eyes the root cause was the same. By taking the work home for five years, Pho was nonchalantly risking national security because, unsurprisingly, your off-the-shelf antivirus software isn't quite as effective as the NSA's own solutions. "Removing and retaining such highly classified material displays a total disregard of Pho's oath and promise to protect our nation's national security," said Maryland district attorney Robert Hur. "As a result of his actions, Pho compromised some of our country's most closely held types of intelligence, and forced NSA to abandon important initiatives to protect itself and its operational capabilities, at great economic and operational cost." Despite this, the five-and-a-half-year sentence is actually quite a bit lower than the maximum punishment of 10, and even the eight which prosecutors were pushing for. All the same, the moral of the story is don't take your work home with you. It can end very badly. Source
  15. I have some activation codes of Kaspersky Internet Security for Android for 1 year. Today, I want to give 5 codes to members as a gift. Just reply to this topic then I'll send code via PM. First come first served * Requirement: Must be a member in nsane at least for 6 months.
  16. US govt bans agencies from using Russian outfit's wares The US government issued an interim rule this morning prohibiting agencies from using products or services that have pretty much anything to do with Kaspersky Lab. The Federal Acquisition Regulation (FAR) comes into effect from 16 July 2018 and is a result of the National Defense Authorization Act (NDAA), which prohibits any part of the US Federal government from using the antivirus vendor's wares. The prohibition comes into effect from 1 October, and the FAR is a clear signal that, yes, it is really going to happen. Any solicitations issued on or after 16 July will include an anti-Kaspersky clause and anything issued before will need modifications to reflect the US government's stance. The FAR for the Department of Defense (DoD), the General Services Administration (GSA) and NASA also applies to any companies contracted by the agencies. So anyone hoping to grab some taxpayer dollars should probably make sure Kaspersky Lab's products have been stripped from equipment doing government work. Astronauts aboard the International Space Station will be relieved to know that they shouldn't have to perform any tricky uninstalling. In 2008, NASA used Norton (PDF), and ever since then it has used "an antivirus". A source, who spent a substantial chunk of his career dealing with contracts for the UK's Ministry of Defence, told The Register that such clauses were nothing unusual and recalled rooms or even buildings full of workstations cleaned to government requirements, with snap audits by officials being commonplace. As such, third parties may simply opt to play it safe and remove any trace of Kaspersky Lab in order to avoid a difficult chat with the men and women in black. This would, of course, be bad news for the Russian software vendor, which is already engaged in legal action against the prohibition. Kaspersky Lab, battered by a European vote earlier this week, took the news badly. A spokesperson told El Reg: The lack of concrete evidence of what Kaspersky Lab is actually alleged to have done to merit this action continues to vex the Russian outfit. Thanks to the secretive nature of intelligence agencies and the potential sensitivity of the alleged stolen data, that evidence is unlikely to be shared any time soon. ® < Here >
  17. Kaspersky Lab announced it was temporarily halting its cooperation with Europol following the voting of a controversial motion in the European Parliament today. The motion was voted today in a plenary session of the European Parliament and received 476 votes in favor, 151 against, while 36 MEPs (Members of the European Parliament) abstained. The motion is A8-0189/2018 [1, 2, 3], an advisory-level document that puts forward a general strategy and guidelines for an EU-wide joint plan on cyber defense. Among the motion's clauses is one that calls on EU states to review the software and equipment they use in the IT infrastructure of EU institutions. The document advises EU states to exclude and ban programs and equipment that have been confirmed as malicious. Document specifically mentions Kaspersky Lab software The issue that angered Kaspersky Lab officials was that this particular clause specifically mentioned the Russian-based antivirus vendor by name when the motion's authors attempted to give an example of a product "confirmed as malicious." Having been called out in an official EU document, albeit one with no legislative power, did not stand well with Kaspersky officials. The company has been one of the first antivirus companies who signed collaboration agreements with Europol and state-level law enforcement agencies. In addition, together with Europol, Dutch Police, and McAfee (formerly Intel Security), Kaspersky was one of the founding members of NoMoreRansom, a project that helps ransomware victims by providing free decrypters. The European Parliament Research Services recognized the NoMoreRansom project as a successful case of public-private cooperation in a recent report. Kaspersky halts Europol and NoMoreRansom cooperation Ensuing today's vote, Kaspersky Lab formally announced it would temporarily halt its cooperation with Europol officials and work on the NoMoreRansom project. "We have protected the EU for 20 years working with law enforcement leading to multiple arrests of CYBERCRIMINALS," Kaspersky Lab CEO, Eugene Kaspersky wrote today on Twitter, following the EU Parliament vote. "Based upon today’s decision from the EU Parliament, we are forced to freeze our cooperation with orgs including Europol & NoMoreRansom," he added. "The way we conducted [this] public-private partnership is unfortunately ceased until the withdraw of the European Parliament decision." "Although this report has no legislative power it demonstrates a distinct lack of respect for the company which has been a firm friend of Europe in the fight against cybercrime," a Kaspersky spokesperson added to the CEO's opinion later today. EU at fault for the fallout The entire fault of this debacle strictly falls on the EU Parliament and its Foreign Affairs Commission, which was responsible for wording the report. The inclusion of Kaspersky's name on the report is mindboggling. In April this year, before the motion's last wording, an EU representative answered a question about the rumors that Russian intelligence used Kaspersky products to gain access to classified information. The EU spokesperson, answering on behalf of the Commission, said "the Commission [had] no indication for any danger associated with [the Kaspersky] anti-virus engine." In spite of this, the company's name was later included as an example of "confirmed as malicious" programs in the motion's final text. The Russian AV vendor is now in danger that EU states looking into enforcing the joint cyber defense strategy may be taking the report a little bit too literally and may enforce bans without being given any palpable evidence, just by going on its text. The Russian antivirus vendor has been trying to clear its name for months after its products have been banned on US and Dutch government networks, and the UK has also advised against using the company's software. Source
  18. A Washington, D.C. court has dismissed two lawsuits filed by the Moscow-based computer security company Kaspersky Labs that sought to overturn a U.S. ban on Kaspersky software within U.S. government networks. In a written ruling Wednesday, U.S. District Judge Colleen Kollar-Kotelly upheld a law requiring federal agencies to identify and purge Kaspersky code from U.S. networks by October 1 of this year. The judge also rejected Kaspersky’s argument that the Department of Homeland Security exceeded its authority in ordering a similar ban last September. “The United States government’s networks and computer systems are extremely important strategic national assets,” wrote Kollar-Kotelly in a 55-page opinion. “Threats to these systems are constantly expanding and evolving. Their security depends on the government’s ability to act swiftly against perceived threats and to take preventive action to minimize vulnerabilities.” “These defensive actions may very well have adverse consequences for some third-parties,” the judge continued. “But that does not make them unconstitutional.” Both bans were enacted in response to long-simmering concerns over Kaspersky Labs’ links to Russia’s intelligence community, and fears that the company could be compelled under Russian law to weaponize their code to spy on U.S. government networks. < Here >
  19. Security researchers have found a backdoor account in the firmware of D-Link DIR-620 routers that allows hackers to take over any device reachable via the Internet. Discovered by Kaspersky Lab researchers, this backdoor grants an attacker access to the device's web panel, and there's no way in which device owners can disable this secret account. The only way to protect devices from getting hacked is to avoid having the router expose its admin panel on the WAN interface, and hence, reachable from anywhere on the Internet. To prevent abuse, Kaspersky researchers have refrained from disclosing the backdoor's account username and password. One other vulnerability can disclose Telnet credentials The backdoor account (CVE-2018-6213) is just one of four vulnerabilities Kaspersky researchers found in the firmware of these devices following a recent security audit. The other three flaws include: Both CVE-2018-6210 and CVE-2018-6213 are considered dangerous flaws as they allow attackers easy access to the device. Not that many devices left around to exploit The good news is that D-Link DIR-620 devices are older router models and there aren't that many around to exploit. Most of these devices were deployed by Russian, CIS, and Eastern European ISPs as on-premise equipment provided to broadband customers. The vast majority of these devices are located in Russia, and Kaspersky said it already contacted ISPs to inform them of the issue. Shodan searches for these devices reveal less than 100 DIR-620 routers available online, showing that most ISPs have headed Kaspersky's warnings and restricted access to these devices on their networks. D-Link won't release firmware updates for such an old device Kaspersky experts said they've also contacted D-Link about the discovered issues, but the company said it did not intend to issue new firmware updates for such an older model unless one of the ISPs it has as an enterprise customer specifically request a security update for these devices. Researchers said they tested the following DIR-620 firmware versions and found that they included the four flaws, in various degrees: Source
  20. The law says American agencies must eliminate the use of Kaspersky Lab software by October. U.S. officials say that’s impossible—it’s embedded too deep in our infrastructure. Federal agencies are so far unable to comply with a law banning Kaspersky Lab software from U.S. government networks by October, The Daily Beast has learned. Multiple divisions of the U.S. government are confronting the reality that code written by the Moscow-based security company is embedded deep within American infrastructure, in routers, firewalls, and other hardware—and nobody is certain how to get rid of it. “It’s messy, and it’s going to take way longer than a year,” said one U.S. official. “Congress didn’t give anyone money to replace these devices, and the budget had no wiggle-room to begin with.” At issue is a provision of the National Defense Authorization Act (NDAA) enacted last December that requires the government to fully purge itself of “any hardware, software, or services developed or provided, in whole or in part,” by Kaspersky Lab. The law was a dramatic expansion of an earlier DHS directive that only outlawed “Kaspersky-branded” products. Both measures came after months of saber rattling by the U.S., which has grown increasingly anxious about Kaspersky’s presence in federal networks in the wake of Russia’s 2016 election interference campaign. America’s intelligence chiefs have, too, issued public warnings about Kaspersky software. When asked by Sen. Marco Rubio (R-FL) at an intelligence committee hearing last year whether they would be comfortable using Kaspersky software on their computers, all six of the top intelligence leaders—from the Central Intelligence Agency chief to the director of National Intelligence—had the same answer: No. While Kaspersky Lab is well respected in security circles, in some quarters of the U.S. national security community the company has long been tainted by perceived ties to Russian intelligence and the Kremlin—charges that the company denies. Even less hawkish U.S. officials worry that the company could be compelled under Russian law to weaponize their code to spy on U.S. government networks. The company works so closely with Russia’s Federal Security Service, or FSB, that agents are sometimes embedded in the firm’s Moscow headquarters. And like virtually all anti-virus products, Kaspersky’s has complete access to any computer on which it’s running, including the ability to riffle through files and, depending on the configuration, upload them to Kaspersky’s servers in Russia. It can also execute arbitrary instructions transmitted from the company’s headquarters. But despite company founder Eugene Kaspersky’s training at a KGB-sponsored institute, despite his close parroting of Kremlin rhetoric, and despite his team’s habit of exposing the most sensitive of U.S. cyber-espionage operations, there’s no public, conclusive evidence that these capabilities have ever been co-opted by Moscow. (Eugene Kaspersky frequently points out, accurately, that the company has revealed cyber-espionage campaigns originating from a multitude of countries, including some linked to the Russian government.) However, the anti-Kaspersky train picked up steam following revelations last year of a bizarre incident in which the company slurped up classified documents and source code from the home computer of a National Security Agency contractor running Kaspersky Internet Security software. That contractor, Nghia Hoang Pho, pleaded guilty last year to willfully mishandling classified material by taking it home. The source code was for an NSA hacking tool, which Kaspersky’s product properly flagged for analysis by malware researchers. But because the code was bundled in a ZIP archive with the classified documents, Kaspersky’s software uploaded the entire thing. When Eugene Kaspersky realized what had happened, he ordered his researchers to immediately delete their copy of the documents and code, the company asserted in a blog post last year. “The archive was not shared with any third parties,” the company wrote. In September, the brewing controversy came to a head when then-acting Homeland Security chief Elaine Duke issued a formal “binding operational directive” (BOD) requiring agencies to remove Kaspersky-branded software from their networks. The BOD followed a legislative push by Sen. Jeanne Shaheen (D-NH) to codify a more extensive Kaspersky ban into law. The senator’s effort culminated in section 1634 of the NDAA, mandating a full government purge of Kaspersky code by Oct. 1 of this year. Unlike the BOD, this ban is not limited to software bearing the Kaspersky name, which was relatively easy to find and remove. It also extends to any Kaspersky code embedded in third-party products, and specifically includes hardware. Kaspersky filed a lawsuit to try and overturn the ban. Kaspersky’s website showcases scores of technology partners who’ve used the company’s software development kits to bake Kaspersky code into their own products. That includes big names in services or software like Amazon and Microsoft, and networking hardware firms like D-Link, Check Point, and Allied Telesis—a major government supplier—that have baked Kaspersky’s code into firewall appliances. The networking giant Juniper Networks offered Kaspersky a full range of routers, gateways, and firewalls. Broadcom, which makes everything from Wi-Fi chips to fiber optic components, is listed as a technology partner, though it’s not clear for what product, and Broadcom declined comment. It’s unclear if the list on Kaspersky’s website is comprehensive—the company isn’t saying—and at press time Kaspersky was redirecting U.S. visitors to an identical webpage without the list of partners. With a dearth of good information, the picture painted by sources in the executive branch and on Capitol Hill is of an IT directive transformed by uncertainty into a sprawling cyber snipe hunt, with officials looking for Russian code in unlikely places like smartphone chipsets. Five congressional sources charged with overseeing the government’s compliance with section 1634 told The Daily Beast that they’ve grown concerned in recent weeks that the Department of Homeland Security has not raised red flags about these known hardware issues preventing the department from fully implementing the NDAA provision—leading many of them to doubt whether the government will be able to meet the Oct. 1 deadline. DHS is responsible for overseeing the ban’s implementation for all agencies except the Pentagon. Homeland Security Secretary Kirstjen Nielsen acknowledged the difficulty of the job during a Senate appropriations subcommittee hearing earlier this month. “Unfortunately for many of the third-party providers, they weren’t even aware they had Kaspersky on their systems and within their products,” Nielsen said. “It’s very important for us to understand not only who our contractors are contracting with, but when they provide a service or software, what’s embedded there within.” Nielsen added that the department has conducted “assessments and modeling” to try and pinpoint Kaspersky code. When Shaheen pressed Nielsen for a progress report on the purge, the director replied that she wasn’t prepared with specifics. “I can’t get you the exact figures, which I’m happy to do later today,” she answered in the May 8 hearing. Two weeks later, Shaheen’s office has not received that information, and the silence is raising alarm among staffers and lawmakers who worry that the U.S. may be incapable of even discovering whose code is running the government’s infrastructure. Two congressional sources who deal with the Kaspersky issue told The Daily Beast that they were uncertain if DHS even maintains data on third-party software and hardware with Kaspersky under the hood. The Department of Homeland Security declined to comment for this story, citing the pending legal actions by Kaspersky. The Pentagon, which heads the military portion of the Kaspersky ban, was unable to comment before press time. Kaspersky has filed a separate lawsuit seeking to overturn the NDAA ban. “Kaspersky Lab maintains that these provisions are unconstitutional and unfairly target the company for legislative punishment, without any meaningful fact-finding or evidence,” a company spokesperson said in a statement. A U.S. official with direct knowledge of the ban’s implementation says there’s plenty of blame to go around in the debacle. The law ordering the full ban didn’t come with an appropriation to replace any products found inexorably entwined with the outlawed code. Moreover, confusion reigns over the entire matter of government cybersecurity. “There are so many subcommittees claiming jurisdiction over cybersecurity issues that there are different panels of oversight, different pots of money,” said the official. “The executive branch is being torn in different directions… The legislative branch, in their refusal to effectively organize on this issue, shares equal responsibility with the executive for failures in U.S. government cybersecurity.” In the end, the official said, the U.S. can’t police its infrastructure without more transparency from its vendors about the code they’re selling. “This is not about one particular company… Industry should be leading the way on supply-chain risk management, and if they don’t the government is going to step up to fill that role, and it won’t be elegant.” Lawmakers have pushed for transparency from third-party vendors, but to no avail. In 2014, Rep. Ed Royce (R-CA) introduced the Cyber Supply Chain Management and Transparency Act, which would have required third-party contractors to disclose “each binary component that is used in the software, firmware, or product.” That legislation never went anywhere and, in the meantime, lawmakers have been exploring other reforms to supplement last year’s NDAA provision. “Implementation challenges should lead the U.S. government to increase vigilance on supply chain vulnerabilities and cybersecurity,” Shaheen told The Daily Beast. “Similar to the productive cooperation to ban Kaspersky Lab products across the federal government, Congress and this administration should continue to work together to harden federal cyber defenses, and look at reforms to the acquisition process so that we’re not unintentionally inviting adversaries into our most sensitive systems.” In the wake of the twin bans, some vendors are distancing themselves from Kaspersky, dropping the company from new products and posting instructions on uninstalling the Russian firm’s code. “Juniper is no longer providing Kaspersky in our active products,” said Juniper spokesperson Leslie Moore in an email. “In older products that may have utilized Kaspersky, it was not shipped nor turned on by default—the user had to choose to activate it, and we always provided clear instructions on how to remove it.” < Here >
  21. The U.S. government is considering sanctions against Russian cybersecurity company Kaspersky Lab as part of a wider round of action carried out against the Russian government, according to U.S. intelligence officials familiar with the matter. The sanctions would be a considerable expansion and escalation of the U.S. government’s actions against the company. Kaspersky, which has two ongoing lawsuits against the U.S. government, has been called “an unacceptable threat to national security” by numerous U.S. officials and lawmakers. Officials told CyberScoop any additional action against Kaspersky would occur at the lawsuits’ conclusion, which Kaspersky filed in response to a stipulation in the 2018 National Defense Authorization Act that bans its products from federal government networks. If the sanctions came to fruition, the company would be barred from operating in the U.S. and potentially even in U.S. allied countries. Sen. Jeanne Shaheen, D-N.H., authored legislation to ban Kaspersky, which was eventually introduced into the NDAA. In public, she’s been one of the most vocal anti-Kaspersky crusaders in U.S. government, including writing a New York Times op-ed on the subject last year. Sanctions are necessary, she said, and it’s exactly the sort of thing Congress laid the groundwork for last year. “The evidence of close ties and cooperation between Kaspersky Lab and the Kremlin is overwhelming, which is why I led efforts in Congress to rid Kaspersky products from federal systems. Sanctioning Kaspersky Lab is a logical next step,” Shaheen told CyberScoop. “Congress provided the administration with the necessary authority to sanction Kaspersky Lab and its CEO through the Countering America’s Adversaries Through Sanctions Act. It is now time that they take this step. The administration must show no hesitancy in sending a strong message that Putin’s near-constant cyber-attacks and intrusions against U.S. and NATO systems and institutions will not be tolerated.” The Kaspersky news comes as the Trump administration has publicly and privately gone back and forth on new sanctions against Russia, an ongoing process that currently has no permanent resolution. The prospect of new sanctions against Russia has loomed especially large since recent U.S. military strikes against Syria, where Russian companies have been accused of aiding Syria’s chemical weapons program. The process has been publicly disjointed and dramatic. Trump’s stated goal since he was a candidate has been to improve relations with Russia. The U.S. has enacted two rounds of sanctions against Russia in recent weeks including sanctions for 2016 election meddling and sanctions singling out Putin’s Russian allies. The ongoing process to consider and craft sanctions against Kaspersky has thus far fallen in large part to White House Cybersecurity Coordinator Rob Joyce. Joyce’s work on the matter comes as reports surface of an ongoing power struggle inside the National Security Council to determine the future of U.S. cybersecurity policy. The National Security Council, Treasury Department and Department of Homeland Security declined to comment. The fact that additional sanctions against Kaspersky are now being weighed means that the company’s fortunes in the U.S. and around the world risk falling even further than they already have. The FBI has long been advising private sector firms to cut ties with the company, a policy that has directly steered American companies from completing business deals with Kaspersky in the last year. Retailers like Best Buy removed Kaspersky from their shelves in 2017 while utility companies, power companies and even other nations followed suit. Last week, it was revealed that Twitter banned Kaspersky from advertising on the platform as a result of U.S. government statements against the company. Controversy also enveloped the company when CyberScoop reported last month that Kaspersky research exposed an active U.S.-led counterterrorism operation targeting ISIS and al-Qaeda members in the Middle East. The revelation sparked a debate on whether private companies should publicly share research, despite indications that it could burn sensitive counterterrorism operations. Company founder and namesake Eugene Kaspersky defended the research. Kaspersky, which has consistently denied any wrongdoing whatsoever, said the federal ban impacted only a tiny sliver of the company’s overall business. The company and Russian officials have both called the ban a “politicized decision.” While many of the details of the U.S. government’s case against Kaspersky remain classified, officials in both the U.S. and the United Kingdom have pointed directly to Russian law as a fundamental root of Kaspersky’s problem. Analysis of Russian law has been at the heart of the U.S. government’s legal strategy in defending against Kaspersky’s ongoing lawsuits. Western officials argue that Russia requires private enterprises, including Kaspersky, to hand data over to Russian intelligence with no court order. Kaspersky has in the past repeatedly denied that such laws apply to them. “The reason is the Russian legal framework as much as it is about the activities of any one company,” said Ciaran Martin, the director of the UK’s National Cyber Security Centre. “Russian law works in a way that means — and this is overt and open source — the state can suborn antivirus companies to provide data in a way we view as harmful so we recommended they are not used in sensitive government networks.” CyberScoop spoke with a Kaspersky spokesperson at a private event in San Francisco. The spokesperson said the company had “no comment.” No additional response was shared with CyberScoop prior to this article’s publication. Moscow’s tightening grip on the internet has repeatedly stoked global controversy. The encrypted messaging app Telegram was recently banned in Russia for refusing to give the Russian government the ability to read encrypted messages. Several years beforehand, Telegram CEO Pavel Durov ran VKontakte, the largest Russian-language social media network. Durov, once a celebrated Russian tech icon, was effectively exiled from his home country for publicly refusing to cooperate with Moscow’s demands for data from and control of the website. In 2014, after a lengthy struggle, Durov sold his last stake of VKontakte to allies of Russian president Vladimir Putin. Update: Kaspersky Lab provided CyberScoop with a statement Monday afternoon that reads: “The continued actions by the U.S. government against Kaspersky Lab lack sufficient basis, have been taken without any evidence of wrongdoing by the company, and rely upon subjective, non-technical public sources, such as uncorroborated and often anonymously sourced media reports and rumors, which is why the company has challenged the validity of these actions in federal court. Kaspersky Lab welcomes calls to declassify any credible information that can shed light on the government’s concerns regarding its operations or its products as a public good, so that the company can responsively address said concerns and the general public can better understand this matter without the ongoing obfuscation.” < Here >
  22. Kaspersky Small Office Security (5) 17.0.0.611 Final Kaspersky Small Office Security 5 Build: 17.0.0.611.0.95.0 Date: 7/4/2016 More Screenshots: Release Notes WHAT'S NEW IN KASPERSKY SMALL OFFICE SECURITY Download Links: ============== Kaspersky KAV,KIS,KTS,KSOS 2017 Inc. Patch D Without Secure Connection ENG http://textuploader.com/d5e91 Thanks to @vkarthik posting files.. : ) Offline Download Links [All Available Languages]: https://www.kaspersky.com/small-business-security/downloads/small-office-security ============================================================================ Medicine: Kaspersky Reset Trial 5.1.0.35 [Multi] see the link in dedicated Kasperksy Topic posted there --> ============================================================================ KSOS 5 --> 90 days Trial Keys 5 Device: ============================================================================
  23. Kaspersky Rescue Disk 10.0.32.17 (Build 2018.02.27) Create a disk image to boot from and safely remove viruses from your computer in a non-dangerous environment provided by Kaspersky Kaspersky Rescue Disk is a virus removal solution for critical situations. It was designed to be used when regular antivirus software fails in detecting and cleaning a system of various infections. If you own Kaspersky antivirus or Kaspersky Internet Security , the Rescue Disk can be recorded directly via these products. If not, the ISO can be burned on a CD/DVD using your disc burner or choice. It can also be placed on a bootable USB device and launched from there. Here’s how it works: set your system to boot from the CD / DVD/ USB device, insert the disc or the stick and restart the system. After a quick loading process, you are acquainted with the interface of Kaspersky Rescue Disc. You simply select the objects Kaspersky should process (disk boot sectors, hidden startup objects, or local hard drives), and hit the scan button. The Rescue Disk then delivers a report of all malicious objects found in your system, such as viruses and Trojans, but also adware and other similar software. Infected files can be quarantined, disinfected, or removed. The Settings menu allows you to configure the current security level, file types, scan optimization (i.e. skip files scanned longer than a given number of seconds), archive scanning, installation packages, and others. Updates are done on a regular basis, and notifications can be set for malware detection or modifications, obsolete databases, failed tasks, or others. In conclusion, Kaspersky Rescue Disk is a great way to remove threats that can’t be cleaned by standard antivirus solution. It requires quite the amount of effort (burning the CD / DVD), but it succeeds where other security solutions fail. How to start a virus scan using Kaspersky Rescue Disk: https://support.kaspersky.com/8097 UserGuide: https://media.kaspersky.com/downloads/consumer/kasp10.0_rescuedisk_en.pdf Home: https://support.kaspersky.com/viruses/rescuedisk Download ISO (331 MB): http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso
  24. Kaspersky Rescue Disk 10.0.32.17 (Build 2018.02.01) Create a disk image to boot from and safely remove viruses from your computer in a non-dangerous environment provided by Kaspersky Kaspersky Rescue Disk is a virus removal solution for critical situations. It was designed to be used when regular antivirus software fails in detecting and cleaning a system of various infections. If you own Kaspersky antivirus or Kaspersky Internet Security , the Rescue Disk can be recorded directly via these products. If not, the ISO can be burned on a CD/DVD using your disc burner or choice. It can also be placed on a bootable USB device and launched from there. Here’s how it works: set your system to boot from the CD / DVD/ USB device, insert the disc or the stick and restart the system. After a quick loading process, you are acquainted with the interface of Kaspersky Rescue Disc. You simply select the objects Kaspersky should process (disk boot sectors, hidden startup objects, or local hard drives), and hit the scan button. The Rescue Disk then delivers a report of all malicious objects found in your system, such as viruses and Trojans, but also adware and other similar software. Infected files can be quarantined, disinfected, or removed. The Settings menu allows you to configure the current security level, file types, scan optimization (i.e. skip files scanned longer than a given number of seconds), archive scanning, installation packages, and others. Updates are done on a regular basis, and notifications can be set for malware detection or modifications, obsolete databases, failed tasks, or others. In conclusion, Kaspersky Rescue Disk is a great way to remove threats that can’t be cleaned by standard antivirus solution. It requires quite the amount of effort (burning the CD / DVD), but it succeeds where other security solutions fail. How to start a virus scan using Kaspersky Rescue Disk: https://support.kaspersky.com/8097 UserGuide: https://media.kaspersky.com/downloads/consumer/kasp10.0_rescuedisk_en.pdf Home: https://support.kaspersky.com/viruses/rescuedisk Download ISO (326 MB): http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso
  25. straycat19

    Hypocrites and Kaspersky

    It is amazing the number of comments that have been made on Nsane over the last 8 months or so about the U.S. banning Kaspersky AV from government systems or systems that connect to government networks. Most of them relating the loss of financial gain (i.e. customers) and how unfair it is to put them out of business. Yet here are 123 pages of how to steal Kaspersky software. And then more patches here. So it really doesn't make any difference what you say since actions speak louder than words. If your support for Kaspersky is as strong as your posted words then buy their software, don't steal it.
×
×
  • Create New...