Kaspersky Internet Security Review Rating PCMag.com
Game, Movie and Work Modes
Bitdefender Internet Security 2019 detects when you play, work or watch a movie, so it knows not to bother you with unnecessary requests. This way, you can focus on what’s important. Depending on what you choose to do on your devices, Bitdefender temporarily halts pop-ups, adjusts visual settings, and pauses unimportant background activities to allow you to enjoy your device to the max Counter-Strike 1.6 2
Editors' Note: We are aware of the allegations of Kaspersky Lab's inappropriate ties to the Russian government. Until we see some actual proof of these allegations, we will treat them as unproven, and continue to recommend Kaspersky's security products as long as their performance continues to merit our endorsement. When you're looking to purchase antivirus software, how do you know which is best One help for your search comes from the independent antivirus testing labs, which evaluate and rate dozens of antivirus solutions. On that basis, Kaspersky Anti-Virus is a winner; it earned the top score in every test by every lab that we follow. The core protection is the same as what you get with Kaspersky's free product, but the paid edition includes bonus security scans and full access to tech support.
You pay $59.99 per year for a three-license Kaspersky subscription, discounted to $29.99 for new customers. That's pretty good. Bitdefender, Webroot, and ZoneAlarm, among others, charge $39.99 for a single license. On the other hand, F-Secure gives you three licenses for $39.99. While McAfee AntiVirus Plus matches Kaspersky's $59.99 price, that subscription lets you install McAfee on every Windows, macOS, Android, and iOS device in your household.
View All 7 Photos in Gallery
Kaspersky's main window features all the same components as in last year's edition. There's a status panel at the top, a More Tools button at the bottom, and button-panels for Scan, Database Update, Reports, and On-Screen Keyboard. The color scheme has changed a bit; the status panel is now white with a slight pattern rather than green, and the button-panels are more defined. But if you're accustomed to the previous edition you'll find the current appearance familiar.
Interestingly, the interface for Kaspersky's free antivirus is not based on that of the premium edition. Rather, the free antivirus matches Kaspersky Internet Security, with many features marked as requiring upgrade.
Shared With Free Edition
Now that Kaspersky Free includes the behavior-based System Watcher, it has all the antivirus protection that you get in the premium antivirus. I'll summarize those shared features here, and you can get more information from my review of the free product.
Lab Test Results Chart
Malware Protection Results Chart
Phishing Protection Results Chart
The four independent testing labs I follow all include Kaspersky in their regular test reports. Kaspersky earned the highest possible score in every test by every one of the labs. I don't remember ever seeing that before. Bitdefender came very, very close, with just one score slightly below the very best.
Kaspersky didn't fare as well in my hands-on malware protection test, but when results don't jibe, I defer to the labs and their dozens of researchers. At 8.5 of 10 available points, Kaspersky's score is OK. The best score against my current malware collection is 9.3 points, shared by Cylance Smart Antivirus and F-Secure.
One way to fend off malware attack is to make sure the malicious software never reaches your computer. In my malicious URL blocking test, Kaspersky prevented the browser from even visiting over half the dangerous URLs. It wiped out roughly another 40 percent during the download phase, almost all just as the download began. Kaspersky's score of 92 percent is quite good, but a few competitors have done even better. Bitdefender recently earned a near-perfect 99 percent in this test, and Symantec Norton AntiVirus Basic managed 98 percent.
Phishing websites don't host malware; they just trick users into giving away their login credentials. When I tested Kaspersky's ability to detect these frauds, it initially earned a truly dismal score, 44 percent. I have since learned that the developers had been working on the antiphishing servers at that time. When I ran the test again, Kaspersky proved extremely effective, using heuristic detection to foil frauds too new to be blacklisted. With 100 percent protection, Kaspersky beat out the built-in protection in Chrome, Firefox, and Internet Explorer. It also beat the competition. Bitdefender was at the top here, with 99 percent, while Trend Micro and Check Point ZoneAlarm PRO Antivirus Firewall come very close, at 98 percent protection.
Kaspersky doesn't load up the free antivirus with bonus features, not the way AVG and Avast Free Antivirus do. It does install Kaspersky's VPN, but unless you pay for a separate subscription, you can use just 200MB of bandwidth per device per day, and you can't choose the VPN server. You do get an on-screen keyboard, to foil both hardware and software keyloggers, and the browser extension marks up dangerous links in search results.
System Watcher and Ransomware
The System Watcher component aims to detect malicious activity, including ransomware activity, in processes missed by the main real-time antivirus. To test this feature, I disabled real-time protection and launched a collection of real-world ransomware samples. I couldn't do that in my evaluation of Kaspersky Free, because in the free edition the protection settings are all locked in the enabled position.
In every case, System Watcher detected suspicious behavior and blocked execution of the ransomware. That includes the uncommon disk-encrypting Petya ransomware that slipped past the equivalent feature when I disabled Bitdefender's regular real-time protection. Kaspersky didn't block my simple-minded fake ransomware program, but then, it really isn't true ransomware.
I've occasionally encountered ransomware protection programs or program components that don't start early enough in the boot process, allowing ransomware that launches at Windows startup free rein. Kaspersky didn't fall for this trick. I also tried running KnowBe4's RanSim ransomware simulator, but Kaspersky eliminated the whole program as suspicious.
See How We Test Security Software
The Rescue Disk feature shows up as an extra-cost add-on in Kaspersky Free, but as far as I can tell it's free for anyone to download and use. It's a big download, a full ISO file at more than 500MB. Burn it to a DVD or CD and you're ready to go. You can also create a bootable USB drive, but the instructions are rather daunting. They begin, "use a tool for creating bootable drives in the ISO mode or the DD mode, e.g. Rufus or Win32 Disk Imager. We recommend using the ISO mode." Did your eyes glaze over The bootable DVD sounds like an easier choice.
It's worth noting that Bitdefender Antivirus Plus makes the process a lot easier. You just select Rescue Mode and reboot. There's no disk to burn or USB to prepare.
When I booted from the rescue disk, I had to make a few choices. I had to pick a language and decide if the system would show full graphics, or limited graphics When I ran a scan, it finished in minutes, because all it checked was hard drive boot sectors, fileless malware, and startup objects. If you're going to boot into a special alternate operating system scan, I advise clicking Change Parameters and setting it to scan everything. When I did so, it took a bit over an hour.
People write software. People aren't perfect. Ergo, software isn't perfect. Malware coders look for ways to exploit vulnerable code in popular programs. Once an exploit comes out, the program's designers work feverishly to patch it. And if you ignore the patches, you're hosed.
Kaspersky's vulnerability scanner looks for missing security patches in the operating system and in browsers and other popular programs. On my test system, it found nine OS vulnerabilities and four in applications. I was disappointed to find that the output is a simple, static list of applications. The software updater that comes with Avira Total Security Suite handles update tasks automatically, as does Avast Premier. Note, though, that these two are the top tier suites in their respective product lines—lesser products don't include automation.
The list of operating system vulnerabilities didn't include any missing Windows updates, which makes sense because I keep my test systems fully updated. What it did show was a list of settings that make for poor security. Several involving Autorun showed the status "Strongly recommended to fix" or "Recommended to fix." A few others, mostly involving data stored in Internet Explorer, received the status "Not necessary to fix." When I selected all the items and clicked Fix, Kaspersky did the job in a flash. If for some reason you don't like the effect of the fix, you can view fixed items and roll back any that don't suit you.
Browser Configuration Check
This scan very specifically diagnoses problems with Internet Explorer. Once you've used it, a second option becomes available to roll back any changes you made.
I didn't get much out of this feature at first. There was no progress bar for the scan; it just immediately reported no problems found. As it turns out, there's a good amount of overlap between this component and the vulnerability scanner. When I went back to the vulnerability scan and un-fixed the items related to Internet Explorer, I saw some results, in a kind of tree format, all under the heading "Problems that can be fixed." Consulting the help system, I learned that one might see headings for problems recommended or strongly recommended to be fixed.
I'm sure there are cases when this component and the vulnerability scan don't step on each other's toes. I just didn't get to see those cases.
As you surf the web and use your computer, you accumulate a trail of activity traces. A snoop could learn a lot by examining your browser history, cookies, recent file lists, and so on. If that possibility worries you, the Privacy Cleaner component can help.
At the start, this component does warn that its cleanup could cause some inconvenience. For example, clearing out cookies can wipe out your saved settings for websites that use them. On my test system, the scan finished in a flash and listed dozens of activity traces. As with the browser check, it divided them into strongly recommended actions, recommended actions, and available actions, with all items in the first two categories checked off.
The recommended actions included clearing cookies, history, and temp files for Internet Explorer, Chrome, and Opera. Firefox is present on the system, but didn't appear in the list. It also suggested clearing the temp folder, and wiping the cache and temp files used by Flash Player. Cleanup went quickly. On completion, it pointed out the option to roll back changes.
Microsoft Windows Troubleshooting
In past reviews, I've seen Kaspersky offer to run the Microsoft Windows Troubleshooting wizard after malware cleanup. That didn't happen this time around, but you can run the troubleshooter at will to check for any malware-created damage.
This scan follows the pattern of offering strongly recommended, recommended, and available fixes. On my test system, its advice duplicated the Autorun-related items from the Vulnerability Scan. I'm thinking that perhaps Kaspersky should merge all these overlapping scans into one.
Kaspersky Anti-Virus gets the very highest scores in all the tests from all the labs that we follow, and it comes with a feature-limited version of Kaspersky's VPN. The core antivirus technology is the same as what's in Kaspersky Free, but the paid edition includes a collection of bonus scans, full access to configuration settings, and the ability to get direct tech support by phone or live chat.
Bitdefender Antivirus Plus scores just a hair behind Kaspersky with the labs, and it packs enough useful bonus security features to almost qualify as a suite. Symantec Norton AntiVirus Basic scores well both in lab tests and our tests, and includes top-notch exploit protection. Webroot SecureAnywhere AntiVirus uses behavioral detection along with a journal-and-rollback system that can reverse malware damage. And while McAfee AntiVirus Plus doesn't score quite as high, it lets you protect every device in your household. From the dozens of available antivirus products, we've picked these four, along with Kaspersky Anti-Virus, as Editors' Choices PS2 Emulator
Kaspersky Internet Security Internet Protection .
Table of Contents3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298
Download 360 Security – Antivirus Free for PC for free
UPDATED Oct. 18 with comments from Kaspersky Lab. UPDATED Oct. 25 with preliminary results of Kaspersky Lab's internal investigation. UPDATED Nov. 16 with final results of Kaspersky Lab's internal investigation.
The allegations that Kaspersky Lab spied on its customers on behalf of Russian intelligence services, as was reported in top American newspapers this past week, are very serious and threaten the future of the antivirus maker — even if no conclusive proof has been offered and no one making the accusations has been willing to speak up in public.
Credit: Jaggat Rashidi/ShutterstockHere at Tom's Guide, we still recommend Kaspersky antivirus software for home users who don't work in any industries involved with national security. But we sent questions to several information-security experts, ranging from a former NSA staffer to a lawyer for the Electronic Frontier Foundation, for their opinions on whether they considered Kaspersky software safe to use.
— Dave Aitel, Immunity Inc.
Most of our respondents agreed that people who work in government or critical-infrastructure industries should not use Kaspersky software. One said he was telling everyone to remove it.
"My firm is recommending [that] our customers, who largely are financial companies, uninstall Kaspersky AV," said Dave Aitel, a former NSA staffer and the founder, owner and chief technology officer of Immunity Inc., an information-security consultancy. "There is no plausible innocent explanation for the information that has been presented."
Other security experts we spoke to weren't ready to condemn the company without seeing the evidence. But they added that we've got just as much to fear from Chinese vendors — and that most modern antivirus software, not just Kaspersky's, could be abused to become an espionage tool.
— Graham Cluley, independent security consultant
MORE: Best Antivirus Software
"I haven't seen anything which makes me think that it's any more dangerous to run Kaspersky than any other major antivirus product," Graham Cluley, an independent security blogger and former staffer at the antivirus maker Sophos, told us. "Kaspersky might be being singled out … because the company is Russian, and that doesn't sit too well in the current geopolitical climate."
John E. Pike, founder and director of GlobalSecurity.org, a national-security think tank, said Kaspersky antivirus software was "probably" safe to use, but he added that "such products have too much spaghetti code for anyone to have confidence that they understand all that is going on under the hood."
Strong, but unproven, accusations
On Oct. 5, The Wall Street Journal, citing unnamed current and former government officials, reported that in 2015, Kaspersky antivirus software running on the home computer of an unnamed NSA staffer spotted NSA files that the staffer had brought home and put on his or her machine. (The staffer broke the rules by taking the files home, but he or she is not suspected of espionage.)
The Kaspersky antivirus software somehow alerted Russian intelligence to the presence of the NSA files, and Russian spies then targeted the NSA staffer's computer and copied files from the machine, according to the WSJ It's not clear exactly how Russian intelligence got access to Kaspersky data, or exactly what kind of NSA files the staffer had on his machine. (NSA-made malware would have been noticed by many antivirus products.)
— Rob Graham, CTO, Errata Security
Late Tuesday (Oct. 10), The New York Times, also quoting anonymous sources, reported that Israeli spies who had hacked into Kaspersky's internal networks in 2014 were the first to see evidence that Kaspersky software had been used to spy on the NSA staffer. The Israelis apparently turned what they had found over to the NSA.
The Washington Post backed that allegation with its own story, and in 2015, Kaspersky Lab itself had disclosed the Israeli hack of its own networks.
On Oct. 11, The Wall Street Journal came back with a second story, in which more (or perhaps the same) unnamed government officials told the paper that Kaspersky's malware database, which looks for certain snippets of code in an attempt to catch malware, had been updated at a certain point to look for text strings that indicated U.S. intelligence documents. Such a text string might be "TOP SECRET," or the code name of a known NSA or CIA operation or program.
You could try turning off antivirus data collection
Rob Graham, head of information-security consultancy Errata Security and creator of several security tools, had a suggestion for all antivirus users who might be worried about the software spying on them.
"For ordinary consumers, it's probably as safe using Kaspersky as any other antivirus software," Graham told us. "Whichever product you use, however, you should configure it to NOT send data back to the vendor."
MORE: Best Identity-Theft Protection Services
Graham was referring to the telemetry, a feature of most antivirus programs that sends data about the customer's machine to the antivirus company's servers for analysis, which, in turn, leads to quick responses to new malware.
Kaspersky's telemetry functions reportedly tipped off the Russian spies to the presence of NSA software on the NSA staffer's home computer. Most antivirus software, including Kaspersky's, lets you toggle off telemetry so that your machine, at least in theory, receives data from the antivirus company without sending any back.
Because of telemetry, antivirus products "have access to everything on the system and communicate constantly," states a blog post co-authored by Roel Schouwenberg, a former Kaspersky Lab malware researcher who is now at Celsus Advisory Group, an information-security consulting firm. "They are effectively 'trusted implants.'"
Kurt Opsahl, deputy executive director and general counsel at the Electronic Frontier Foundation, a digital-liberties advocacy group, agreed that telemetry is a risk, and not only to Kaspersky customers.
"Cloud-based AV … necessarily allows the AV software to see and report on what's on your machine — and gives an opening to intelligence agencies to get that information," he told us. "Kaspersky shows that this can actually happen, though something similar may well have happened elsewhere."
Happy to work with the authorities – of all nations
Within the global information-security community, Kaspersky Lab is highly respected for the quality of its research, as well as for its willingness to share its findings, work with other antivirus companies and collaborate with police agencies against cybercrime.
We at Tom's Guide, as well as rival publications, have consistently rated Kaspersky antivirus software well for its excellent malware detection (as borne out in regular lab tests), its low system-performance impact and its useful extra features.
Kaspersky Lab and McAfee, along with Europol and the Dutch national police, created and run the NoMoreRansom.org website to help victims of encrypting ransomware protect and recover their data. Just yesterday (Oct. 12), Interpol announced that it was expanding its relationship with Kaspersky Lab to share threat intelligence.
But Kaspersky may not be for everybody
"Kaspersky Lab is an excellent company with a solid reputation for building good security products," Nicholas Weaver, a researcher at the International Computer Science Institute, an affiliate of the University of California, Berkeley, wrote on the Lawfare blog in July. "But that is only true for most users. ... Kaspersky software should be banned from all governmental computers, defense contractors, and related assets."
"Companies may well be targets of economic spying, while non-profits and activists may be targets of spying on political opposition, and should give a higher weight to the spying risk," Opsahl said. "Given what's known, is it worthwhile to stick with [the] software with this news Probably less so than with consumers."
How close is Kaspersky to the Kremlin
There's always been a bit of suspicion about Kaspersky Lab. The company's co-founder and owner, Eugene Kaspersky, was educated at a KGB-run technical academy beginning when he was a teenager, and then served in Soviet military intelligence. (Many security experts of all nationalities working in the private sector have similar backgrounds.)
Eugene Kaspersky. Credit: KasperskyThe company's relationship with the Kremlin has never been clear, though Western experts on Russia think there's no way Eugene Kaspersky could have become a billionaire without having reached an understanding with the government. Under Russian law, any company must open its communications lines to the authorities upon request.
The Kaspersky company has consistently denied that it assists any government with espionage operations.
Kaspersky Lab was given the contract to run all cybersecurity efforts at the 2014 Winter Olympics in Sochi, Russia, but there may not have been any other Russian company that could have pulled it off. In 2011, Eugene Kaspersky's eldest son was kidnapped and held for ransom by apparently incompetent abductors, then freed unharmed after a police raid.
"I feel bad for Kaspersky, because they're probably good guys who are trying to do the right thing, but the forces above them are much more powerful," Kenneth Geers, a senior fellow at the Atlantic Council and an expert on Eastern European cyberespionage, told The Parallax security blog. "Their software can see nation-state operations because they have deep visibility into enterprise and government networks."
Does Kaspersky software seek out American spying tools
Kaspersky Lab was involved in the discovery of several spyware tools thought to be developed and used by the NSA, including the Stuxnet worm that sabotaged an Iranian uranium-enrichment facility in 2010.
For those reasons, the company has been accused of going after American intelligence operations, but it also has discovered and disclosed spyware campaigns thought to be run by Russian and Chinese intelligence. (Kaspersky has a policy of not naming which countries may be behind specific cyberespionage campaigns.)
— John E. Pike, GlobalSecurity.org
"We still don't have enough solid information to really judge Kaspersky, just hearsay and rumor," Rob Graham said. "With that said, I wouldn't trust any company from Russia or China, at least not when important national concerns are at stake."
"Kaspersky has, in the past, drawn attention to malware campaigns that almost certainly were orchestrated by Russia, and targeted Russia's enemies," said Graham Cluley. "Perhaps I'm a bear of very little brain, but I don't see why a company colluding with the Russian government would be doing that."
Who should not be using Kaspersky software
"Anyone worried about the Russian government or Russian organized crime might want to look elsewhere," Pike told Tom's Guide. "This is the same issue as Lenovo computers — probably not a problem for most consumers, but anyone who is worried about being targeted by the Chicoms would probably look elsewhere."
Credit: KasperskyGraham and Weaver agreed that you might need to worry just as much about China as about Russia.
"I don't think important government entities should trust security products/services from adversarial nations like Russia and China," Robert Graham said. "It's unlikely Kaspersky is actually spying for his government, but yet, it's still an event we would add to our risk matrix and defense against."
"Anyone who views the Chinese government as an adversary should avoid Huawei, and those who count the Russian government as an adversary should not install Kaspersky products," Weaver wrote on his blog. "This is why it is shocking me that U.S. government used Kaspersky Lab's products — including on [Department of Defense] systems."
None of the suspicions about Kaspersky Lab mattered much until the 2014 popular uprising in Ukraine that removed a pro-Russian president. That, in turn, sparked the Russian forcible takeover of Crimea, the beginning of the ongoing separatist war in eastern Ukraine and the sudden worsening of U.S.-Russian relations.
In 2015, stories began appearing in the U.S. media about Kaspersky Lab's ties to the Kremlin and to Russian intelligence, including one that said Russian intelligence operatives had been deliberately placed on Kaspersky's staff in 2012.
The Russian intelligence effort to influence the 2016 U.S. presidential election, and the subsequent American investigations into that effort, have only made things harder for Kaspersky Lab. This spring, several U.S. intelligence-agency heads told Congress that they would not run Kaspersky software on their own computers. FBI agents interviewed Kaspersky employees in the U.S.
In September, the Department of Homeland Security ordered the removal of Kaspersky software from U.S. government agencies. Best Buy and Office Depot announced they would no longer sell Kaspersky software and offered to remove it from customer machines for free.
Eugene Kaspersky has offered to testify before Congress and to let American officials read his company's source code. The U.S. government hasn't taken him up on either offer yet.
So far, most of the allegations made against Kaspersky Lab in the American press can be explained. The NSA files on the staffer's home computer could have been malware, in which case Kaspersky's antivirus scanners would have picked them up. Kaspersky itself need not have tipped off Russian intelligence about the files; the Russian security services could have been tapping into Kaspersky's data feeds.
"I'll leave it to Kaspersky to provide the plausible innocent explanation," Opsahl told us, but added that "a plausible explanation may not be enough. Kaspersky probably needs to show that it is not just an innocent victim, but actually the better option in the marketplace."
— Graham Cluley, independent security consultant
Even the allegation that Kaspersky's malware-signatures database was altered to look for "TOP SECRET" and other text strings could be explained if Russian intelligence operatives were working secretly among Kaspersky employees.
Kaspersky management might or might not have known about such possible arrangements. But, given the political climate in Russia, it might not have had a choice.
"If there really is any evidence that Kaspersky has colluded inappropriately with Russian intelligence, then I think we would all welcome seeing it, to put this matter to bed once and for all," Cluley said.
"I think there's a danger for other security companies here, though, too," he added. "Not only are some acting rather shabbily in exploiting Kaspersky's discomfort, but they might also want to be wary that they are not also targeted by whispers in the future."
What the future holds for Kaspersky
Eugene Kaspersky seems too gregarious and talkative to be a spy. Until things got hot for him in the U.S., he was a regular fixture at American security conferences. If he wasn't addressing a conference, he'd be holding court in the hallway, ready to talk to anyone who asked.
Kaspersky the man doesn't seem to spend much time in Moscow. He sponsors a Formula 1 racing team, an Australian rugby team and a Greek archaeological site; he hikes around volcanoes in the Russian Far East; and he has placed Kaspersky Lab's holding company in London.
He still holds his own security conference, the Security Analyst Summit, every winter in a tropical tourist resort, although it hasn’t been held on U.S. territory since 2013.
"It will be interesting to see how other Western countries begin to respond to the claims" against Kaspersky, Cluley said. "So far, I haven't seen other governments sharing America's nervousness about Kaspersky's software."
"The question is whether Kaspersky can save its non-American business based on those markets not believing the damning information in U.S. newspapers," Aitel told us. "Should any more leaks come out regarding this investigation that indicate Eugene himself knew about this activity, then the company would be kaput."
UPDATE: Kaspersky Lab addressed the allegations in a blog post Oct. 16.
"We help law enforcement agencies (globally, not only in Russia), but with only one thing — catching cybercriminals," the post said. "We've never assisted any cyberspies or military intelligence. That would go against our principles. We do not participate in spying."
"Our products, much like antivirus software from most other companies, have a cloud protection component," it continued. "We call this Kaspersky Security Network (KSN)."
"You can turn KSN off when installing the product or at any time after installation in the protection settings," the blog post added. "If you like to develop cyberweapons on your home computer, it would be quite logical to turn KSN off — otherwise your malicious software will end up in our antivirus database and all your work will have been in vain."
UPDATE: On Oct. 25, Kaspersky Lab released preliminary findings from its own internal investigation. (A third-party investigation is still promised.) The findings appear to largely exonerate the company of wrongdoing
Most noteworthy was that, according to the Kaspersky report, the NSA staffer upon whose home PC the NSA files were discovered had himself accidentally infected his computer with malware when he installed a "cracked" version of Microsoft Office software. "Cracked" software comes with product-key generators that let you run expensive software without paying for it, but the key generators are often full of malware.
The NSA staffer was only able to run the key generator after disabling his Kaspersky antivirus software, the report found. After he installed Microsoft Office, he re-enabled the antivirus software, which detected the malware that came with the key generator as a "backdoor" which could have let any other kind of malware or attacker onto the machine.
The Kaspersky report doesn't say so explicitly, but the backdoor could have been an avenue by which cybercriminals or Russian spies could have broken into the machine and stolen NSA-related files.
After Kaspersky antivirus software had been re-enabled and had found the key-generator malware, it thoroughly scanned the machine and found a compressed archive files containing new variants of NSA malware (which Kaspersky refers to as "Equation Group" malware).
Copies of the archive containing the new variants were uploaded to Kaspersky's cloud servers, analyzed and discovered to be NSA malware. At this point, the report says, Kaspersky chief Eugene Kaspersky (referred to as "the CEO") was informed, and he ordered that the copies of the archive be destroyed.
UPDATE: On Nov. 16, Kaspersky Lab released the complete report on its internal investigation. It adds more detail to the preliminary report, noting that the American computer in question used "an IP address that is supposedly assigned to a Verizon FiOS address pool for the Baltimore, MD" area — in other words, near NSA headquarters.
The report also notes that the customer's computer was infected with at least 121 different strains of malware and adware, not counting the NSA malware also on the machine. The report theorizes that the machine was infected while the user disabled Kaspersky software so that he could install a "cracked" version of Microsoft office, and that such a vulnerable machine could easily have been compromised by nation-state attackers targeting a known NSA employee.
It further explains that the compressed archive containing NSA malware also included four documents "bearing classification markings", which implies that they contained language such as "TOP SECRET." The Kaspersky report says that the documents would have been uploaded to Kaspersky servers as part of routine malware collection not because they contained classification markings, but because they were part of an archive containing malware.
"We cannot assess whether the data was 'handled appropriately' (according to U.S. Government norms)," the report adds, "since our analysts have not been trained on handling U.S. classified information, nor are they under any legal obligation to do so."
The one new item in the full report explains why Kaspersky software might appear to have been deliberately programmed to search for language in documents such as "TOP SECRET," as alleged in one of the media reports concerning the company. Ironically, it's because an older strain of apparently Russian state-sponsored malware searched for exactly the same thing.
In March 2013, a cyberespionage campaign exploited the widely used TeamViewer remote-access software to steal electronic documents from governmental organizations, embassies, research institutions and high-tech manufacturers in Europe and the former Soviet states, including Russia.
Researchers called the espionage campaign "TeamSpy," and its associated malware searched for keywords, including "secret" in English, Russian and Georgian, in Word, Excel and PDF files. A Kaspersky report at the time noted that the malware appeared to be created by Russian speakers. (Kaspersky never speculates on who might have created state-sponsored malware, leaving it to readers to guess.)
In 2015, the current Kaspersky report says, the company added a malware signature to search for the keywords that TeamSpy itself was searching for — in an attempt to detect TeamSpy malware. Anyone looking for clues that Kaspersky itself was looking for classified documents could have mistaken that signature for a smoking gun, the report implies.
"It is a possibility that [to] an attacker looking for anything that can expose our company from a negative side, observations like this may work as a trigger for a biased mind," the report says. "Despite the intentions of the malware analyst, they could have been interpreted wrongly and used to create false allegations against us TuneUp Utilities2013"
Best Antivirus Software
Kaspersky Lab - Wikipedia
360 Security – Antivirus Free for PC Windows is capable of keeping all its users protected from various threats to their android devices such as viruses, malware, junk files, system vulnerabilities, and privacy risks. This lightweight and agile program cleans up any ideal app running in the background, and optimizes the performance of the android devices for the users. In fact, this tool acts as an extremely effective phone cleaner by clearing out all the corrupt APKs, trash files, and privacy history to free up quite a bit of space for other purposes.
However, the prime function of 360 Security – Antivirus Free for PC Windows is to provide all-in-one solution for various threats while providing dual-layer antivirus protection consisting of cloud engines and 360 QVS. This app scans the phones to locate all the vulnerability issues, and assesses the security situation of the devices. Moreover, users can activate the Lock Screen Power-saver mode to perform automatic cleanups that help in extending battery life.
Users get to block unwanted calls and SMS with ease, while they can also backup all the important contacts, messages, and calendar events to the SD card. Users benefit from anti-theft capabilities, while this tool also functions well as an app manager and data monitor. Finally, users can secure special communication info through encryption, while also receiving guidance on apps accessing their personal data avira free antivirus 2012
Ahadees.com - Collection Of Ahadees In Urdu - Collection . Search HadeesРезультаты поиска,A great site about Quran, Islam and Muslims in tamil text. Allows visitor to search entire Quran in Tamil Language,This category contain the sayings of Holy Prophet Hazrat Muhammad ( Peace Be Upon Him ) about Namaz. Benefits of Namaz, Benefits of Travih
Windows 8 Activator 3264 bit 100% Working Download Windows 8 ActivatorАктиватор Windows 7: основная его задача одна - активировать windows 7 так, чтобы вы могли .,This utility is very popular because it is a universal means of activation. Activatior Windows 8.1 Pro x64 / x86 build 9600. Just run the activator.,Windows 8 Activator Loader 2018 Free Download is an application that activates the free trial versions of this range of operating systems.
Anti-Terror Strike Game - Play online at Y8.com TerrorStrikePlay as a counter-terrorist unit and try to neutralize your opponents.The best free games from all over the internet just for you.,At least 149 people were killed and 186 injured in a suicide attack in Pakistan that targeted the convoy of a political candidate in this month's general .,Результаты поиска