Nghia Hoang Pho, who worked in the NSA's Tailored Access Operations (TAO) unit, was in the habit of taking his work home with him. In America's case, however, an NSA hacker's carelessness proved to be Kaspersky's undoing. This failed when the Dutch government said it was banning internal use of Kaspersky both Britain and the US did likewise. Like US-sanctioned enterprise infosec firm Positive Technology, Kaspersky tried to soothe fears in the West by moving its European base of operations to Switzerland in 2018. ![]() NSA dev in the clink for 5.5 years after letting Kaspersky, allegedly Russia slurp US exploits.Russian spies used Kaspersky AV to hack NSA staffer, swipe exploit code – new claim.Revealed: Numbers show extent of security fears about security biz Kaspersky Lab.UK government bans all Russian anti-virus software from Secret-rated systems.He also added, without mentioning Russia's military invasion of Ukraine and its indiscriminate killing of unarmed civilians as a result: "We believe that peaceful dialogue is the only possible instrument for resolving conflicts. Kaspersky is a private global cybersecurity company and, as a private company, does not have any ties to the Russian or any other government." ![]() Instead it said the decision is politically motivated.Ī company spokesman told The Register: "We believe this decision is not based on a technical assessment of Kaspersky products – that we continuously advocated for with the BSI and across Europe – but instead is being made on political grounds. Kaspersky, a stalwart of the consumer antivirus scene since its foundation in the late 1990s, denied – unsurprisingly – that it poses a risk to Westerners. If there are doubts about the reliability of the manufacturer, virus protection software poses a particular risk for the IT infrastructure to be protected. ![]() Therefore, trust in the reliability and self-protection of a manufacturer as well as his authentic ability to act is crucial for the safe use of such systems. Antivirus software, including the associated real-time capable cloud services, has extensive system authorizations and, due to the system (at least for updates), must maintain a permanent, encrypted and non-verifiable connection to the manufacturer's servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |