Cyber-yesteryear – pt. 4: CeBIT.

Finally, summer’s arrived. Took it’s time! But I’m not sure it’s the blessing it normally is, since we’re all still sat at home working remotely. Sure, there have been ‘easings’ here and there around the world, but we here at K are in no rush to… rush things. I think that goes for other IT companies too that will be working from home till at least fall, while some have signaled they’re on for staying home until the end of the year. And of course business trips are still being cancelled, as are exhibitions and conferences and Olympic Games and Cannes Festival and a whole load of other large-scale events. Some countries still have closed borders too.

So yep: we’re all still cooped up, not getting out much, and getting a bit stir crazy with the cabin fever. At least that’s how things are for many, I’m sure. There are others who are taking advantage of all the extra time and getting more exercise than ever, the devils! I’m somewhere in-between. Sometimes tired of Groundhog Every-Day, but staying busy. And that includes dusting off and delving into my archives to dig up some old photos, which lead to fond memories (plus reminders of how quickly the world is changing), which lead to… my next cyber-yesteryear post!

Yes, this series combines cyber-nostalgia, plus various personal and business insights I’ve picked up along the cyber-way, which I hope will be useful to some, or just interesting to others. Accordingly, I continue here today with part four, and I continue my tales, begun in part three, about CeBIT

CeBIT – we loved it to bits! It was just sooo new and different and massive and…

Read on…

Whether still locked-down at home or free – must-read books, part 3!

Looks like I’m just in time with the third and final part of my book recommendations series: stay-at-home restrictions are easing seemingly everywhere. Still, staying home looks like what many will continue to do anyway, so this part-three isn’t too late really. But, even during ‘normal’ times, reading is totally must-do, surely? It’s not like these recommendations have an expiry date! Ok, enough intro; here are my recommendations – category: science fiction!

Yes, I’m a science fiction buff, and have been since I was a kid. I remember looking forward to our regular visits to some friends of my parents who had a really impressive (for the times) collection of sci-fi on their shelves. I’d just disappear for hours, fixated by a work like those by Jules Verne (Captain Nemo), H.G. Wells (The Time Machine, The War of the Worlds, The Invisible Man), and Alexander Belyayev (Amphibian Man, Professor Dowell’s Head), which I’d get through in a few hours! Later came Bradbury’s Martian Chronicles, Asimov’s Three Laws of Robotics and I, Robot, Arthur C. Clarke’s A Fall of Moondust, Simak’s parallel worlds (proto-multiverses), Ursula K. Le Guin‘s Earthsea stories, and much more.

I could dig endlessly on this topic, but here, for brevity’s sake, I’ll stick to my top-3 all-time fave sci-fi writers; rather – top-4, as two brothers wrote together (the Strugatskys). Btw – I have the complete works of the Strugatskys, and also of Kurt Vonnegut in hardback! (Yes, I prefer actual books; we stare at screens enough IMHO:). 

Arkady and Boris Strugatsky

The master-maestros of the genre. They started out in the 1950s writing utopian-heroic-communist texts, but later changed their tune big time – their heroes changed, as did the problems they had to deal with.

There are a great many super sci-fi writers, but these two are to me the very best. Deeper, more emphatic, more audacious – the thinking person’s sci-fi: more ‘literature’ than sci-fi!

Later in their careers they became all the more philosophical, and conducted literary experiments on identity and society.

I remember clearly my first Strugatsky novel: Beetle in the Anthill, published in 1979 in a Soviet magazine – one chapter per edition (waiting impatiently each month for the next chapter). 

Read on…

Lockdown or not – read these books, you ought! Part 2.

I hope you liked the first part of the ‘greatest hits’ on my bookshelves – business books. Time now to turn to another category: about how the world ‘ticks’: the history, societies and governments of human beings, and more…

On China, by Henry Kissinger

For those who find a few Wikipedia pages ok but insufficient on detail to satisfy their curiosity and quest for learning more about China – this is the book to go for. In it you’ll learn all sorts about the country’s ancient history, its economy and more. There’s the estimation that the GDP of mediaeval China was something like a third of world GDP (!), there’s all the treachery of the opium wars, there’s the Communist past, and the country’s renaissance. Highly recommended. But be warned: there’s a TON of detail in there. Some pages I just scanned. So let me adjust my recommendation: I highly recommend you read… the best bits sections of this book ).

Read on…

Enter your email address to subscribe to this blog
(Required)

Lockdown at home? Read a tome! Part 1.

Working remotely is one thing. Learning a new hobby or even profession – also remotely: super. But you need to take a break now and again otherwise that learning suffers. Also – since you’ve no commute, your free time of an evening tends to be a bit longer. What I’m getting to is… it’s high time – to read!

But read what?

Well, I personally read all sorts. Just as well, as I’m often asked what books I might recommend to others. Fine by me – as I’ve plenty of recommendations. That many, in fact, that when I decided to put fingers to keyboard and come up with a list, there were just too many. Accordingly, I’ve split my recommendations into three separate posts. Today’s post: business books I highly recommend.

Good to Great, by Jim Collins

I reckon that if I had to line up the business books I’ve read on my bookshelf in order of importance from left to right, this one would be first – furthest left. But might it be outdated already? After all, it was published in 2001, and given that our world is changing at dizzying speed, sure, that seems like a fair question. Actually – no. For the main topics in the books are somewhat timeless and are as relevant today as they were back then. In plain language and with lots of practical examples, the author convincingly analyzes the traits commonly found in various types of leaders (manager-leader, team leader, company leader). It’s one of the few good books, IMHO, on how to build a great business.

Read on…

Which hacker group is attacking my corporate network? Don’t guess – check!

Around four years ago cybersecurity became a pawn used in geopolitical games of chess. Politicians of all stripes and nationalities wag fingers at and blame each other for hostile cyber-espionage operations, while at the same time – with the irony seemingly lost on them – bigging-up their own countries’ cyber weapons tools that are also used in offensive operations. And caught in the crossfire of geopolitical shenanigans are independent cybersecurity companies, who have the ability and gall guts to uncover all this very dangerous tomfoolery.

But, why? It’s all very simple…

First, ‘cyber’ is still really quite the cool/romantic/sci-fi/Hollywood/glamorous term it appears to have always been since its inception. It also sells – including newspapers online newspaper subscriptions. It’s popular – including to politicians: it’s a handy distraction – given its coolness and popularity – when distraction is something that’s needed, which is often.

Second, ‘cyber’ is really techy – most folks don’t understand it. As a result, the media, when covering anything to do with it, and always seeking more clicks on their stories, are able to print all manner of things that aren’t quite true (or completely false), but few readers notice. So what you get are a lot of stories in the press stating that this or that country’s hacker group is responsible for this or that embarrassing/costly/damaging/outrageous cyberattack. But can any of it be believed?

We stick to the technical attribution – it’s our duty and what we do as a business

Generally, it’s hard to know if it can be believed or not. Given this, is it actually possible to accurately attribute a cyberattack to this or that nation state or even organization?

There are two aspects to the answer…

From the technical standpoint, cyberattacks possess an array of particular characteristics, but impartial system analysis thereof can only go so far in determining how much an attack looks like it’s the work of this or that hacker group. However, whether this or that hacker group might belong to… Military Intelligence Sub-Unit 233, the National Advanced Defense Research Projects Group, or the Joint Strategic Capabilities and Threat Reduction Taskforce (none of which exist, to save you Googling them:)… that is a political aspect, and here, the likelihood of manipulation of facts is near 100%. It turns from being technical, evidence-based, accurate conclusions to… palm or coffee grounds’ readings for fortune-telling. So we leave that to the press. We stay well away. Meanwhile, curiously, the percentage of political flies dousing themselves in the fact-based ointment of pure cybersecurity grows several-fold with the approach of key political events. Oh, just like the one that’s scheduled to take place in five months’ time!

For knowing the identity of one’s attacker makes fighting it much easier: an incident response can be rolled out smoothly and with minimal risk to the business

So yes, political attribution is something we avoid. We stick to the technical side; in fact – it’s our duty and what we do as a business. And we do it better than anyone, I might modestly add ). We keep a close watch on all large hacker groups and their operations (600+ of them), and pay zero attention to what their affiliation might be. A thief is a thief, and should be in jail. And now, finally, 30+ years since I started out in this game, after collecting non-stop so much data about digital wrongdoing, we feel we’re ready to start sharing what we’ve got – in the good sense ).

Just the other day we launched a new awesome service aimed squarely at cybersecurity experts. It’s called the Kaspersky Threat Attribution Engine (KTAE). What it does is analyze suspicious files and determine from which hacker group a given cyberattack comes from. For knowing the identity of one’s attacker makes fighting it much easier: informed countermeasure decisions can be made, a plan of action can be drawn up, priorities can be set out, and on the whole an incident response can be rolled out smoothly and with minimal risk to the business.

So how do we do it?

Read on…

Rewind: Africa-fotografia!

NB: With this post – about a place I visited before the lockdown – I want to bring you some positivism, beauty and the reassurance that we will all get a chance to see great different places again. Meanwhile, I encourage you not to violate the stay-at-home regime. Instead, I hope you’re using this time for catching up on what you never seemed to find the time to do… ‘before’ :).

Finally, the friends who accompanied me on my pre-lockdown Africa vacation have sent me their edited ‘greatest hits’ photos from the trip. Better late than never, no? But, I wonder – would they have been even tardier if not for the pandemic?! Just joking: they each did have probably terabytes of photos to choose from ).

Anyway, those terabytes of pics from (covering Namibia, Victoria Falls, and Madagascar) were whittled down to the very best, and then I had a go at even further editing them so that they’d ‘fit’ into this here blogpost without it getting ridiculously long. The result is the collection below. Some are mine, which I didn’t publish earlier. But most are my travel companions’ best shots. All righty. Let’s go…

First up: Namibian roads:

Stone fields along Skeleton Coast:

[Yawn]. “Ooh, do excuse me; I must have dozed off. What? Where? Walvis Bay, you say? Well, you’re on the right road. Just keep going, and you’ll come to it in half an hour!”

Pink salt lakes:

Cactii Aloe:

Unsorted unusualnesses:

Dunes, endless desert:

Deadvlei:

Windswept dunes:

Shadow on flying sand atop a dune’s ridge:

Oh my gorgeous!

Unsorted Namibia:

Zambia/Zimbabwe, Victoria Falls. No comment!…

Magic stone mushrooms in Madagascar. Gray tsingi at Ankarana:

Red tsingi – even more striking a thingy:

How cute? ‘Where are the bananas?!’

Night lemurs:

Unfed. Uninterested in anything but passing tourists and the food they give them:

Plenty portraits:

Ring-tailed lemurs:

Indri – the largest lemurs on Madagascar:

Unexpected, uninvited ‘guests’ – of Madagascan proportions:

Karma, karma, karma, karma chameleons: they come and go:

Oh my goodness. Just check out this miracle of nature:

Check out the independent eye movements!

“Who’s that back there?”

A whole new – literal – meaning to ‘I’ll have to keep my eye on you!’ ->

 

Smaller, subtler:

Oh my geckos!

As you can see – an amazing trip!

– The End –

PS: These pics were taken by (besides me): DZ, NI, OR, SS, and AD.

Thank-you to them, and thank-you too, dear readers, for your attention! Hope you liked the pics as much as we liked taking them!

Cyber-tales update from the quarantined side: March 92, 2020.

Most folks around the world have been in lockdown now for around three months! And you’ll have heard mention of a certain movie over those last three months, I’m sure, plenty; but here’s a new take on it: Groundhog Day is no longer a fun film! Then there’s the ‘damned if you’re good, damned if you’re bad’ thing with the weather: it stays bad and wet and wintry: that’s an extra downer for everyone (in addition to lockdown); it gets good and dry and summery: that’s a downer for everyone also, as no one can go out for long to enjoy it!

Still, I guess that maybe it’s some consolation that most all of us are going through the same thing sat at home. Maybe. But that’s us – good/normal folks. What about cyber-evil? How have they been ‘coping’, cooped up at home? Well, the other week I gave you some stats and trends about that. Today I want to follow that up with an update – for, yes, the cyber-baddies move fast. // Oh, and btw – if you’re interested in more cyber-tales from the dark side, aka I-news, check out this archives tag.

First off, a few more statistics – updated ones; reassuring ones at that…

March, and then even more so – April – saw large jumps in overall cybercriminal activity; however, May has since seen a sharp drop back down – to around the pre-corona levels of January-February:

At the same time we’ve been seeing a steady decline in all coronavirus-connected malware numbers:

// By ‘coronavirus-connected malware’ is meant cyberattacks that have used the coronavirus topic in some way to advance its criminal aims.

So, it would appear the news is promising. The cyber-miscreants are up to their mischief less than before. However, what the stats don’t show is – why; or – what are they doing instead? Surely they didn’t take the whole month of May off given its rather high number of days-off in many parts of the world, including those for celebrating the end of WWII? No, can’t be that. What then?…

Read on…

Cyber-yesteryear – pt. 3: 1992-199x.

Just in case you missed the first two, this is the third episode of my cyber-yesteryear chronicles. Since I’m in lockdown like most folks, I have more time on my hands to be able to have a leisurely mosie down cyberseKurity memory lane. Normally I’d be on planes jetting here, there and everywhere for business and tourisms – all of which normally takes up most of my time. But since none of that – at least offline/in person – is possible at the moment, I’m using a part of that unused time instead to put fingers to keyboard for a steady stream of personal / Kaspersky Lab / cyber-historical nostalgia: in this post – from the early to mid-nineties.

Typo becomes a brand

In the very beginning, all our antivirus utilities were named following the ‘-*.EXE’ template. That is, for example, ‘-V.EXE’ (antivirus scanner), ‘-D.EXE’ (resident monitor), ‘-U.EXE’ (utilities). The ‘-‘ prefix was used to make sure that our programs would be at the very top of a list of programs in a file manager (tech-geekiness meets smart PR moves from the get go?:).

Later, when we released our first full-fledged product, it was named ‘Antiviral Toolkit Pro’. Logically, that should have been abbreviated to ‘ATP’; but it wasn’t…

Somewhere around the end of 1993 or the beginning of 1994, Vesselin Bontchev, who’d remembered me from previous meet-ups (see Cyber-yesteryear – pt. 1), asked me for a copy of our product for testing at the Virus Test Center of Hamburg University, where he worked at the time. Of course, I obliged, and while zip-archiving the files I accidentally named the archive AVP.ZIP (instead of ATP.ZIP), and off I sent it to Vesselin unawares. Some time later Vesselin asked me for permission to put the archive onto an FTP server (so it would be publically available), to which I obliged again. A week or two later he told me: ‘Your AVP is becoming really rather popular on the FTP!’

‘What AVP?’, I asked.
‘What do you mean ‘What AVP’? The one you sent me in the archive file, of course!’
‘WHAT?! Rename it right away – that’s a mistake!’
‘Too late. It’s already out there – and known as AVP!’

And that was that: AVP we were stuck with! Mercifully, we (kinda) got away with it – Anti-Viral toolkit Pro. Like I say – kinda ). Still, in for a penny, in for a pound: all our utilities were renamed by dropping the ‘-‘ prefix and putting ‘AVP’ in its place – and it’s still used today in some of the names of our modules.

First business trips – to Germany for CeBIT

In 1992, Alexey Remizov – my boss at KAMI, where I first worked – helped me in getting my first foreign-travel passport, and took me with him to the CeBIT exhibition in Hannover in Germany. We had a modest stand there, shared with a few other Russian companies. Our table was half-covered with KAMI transputer tech, the other half – our antivirus offerings. We were rewarded with a tiny bit of new business, but nothing great. All the same, it was a very useful trip…

Our impressions of CeBIT back then were of the oh-my-grandiose flavor. It was just so huge! And it wasn’t all that long since Germany was reunified, so, to us, it was all a bit West Germany – computer-capitalism gone bonkers! Indeed – a cultural shock (followed up by a second cultural shock when we arrived back in Moscow – more on that later).

Given the enormity of CeBIT, our small, shared stand was hardly taken any notice of. Still, it was the proverbial ‘foot in the door’ or ‘the first step is the hardest’ or some such. For it was followed up by a repeat visit to CeBIT four years later – that time to start building our European (and then global) partner network. But that’s a topic for another day post (which I think should be interesting especially for folks beginning their own long business journeys).

Btw, even as far back as then, I understood our project was badly in need of at least some kind of PR/marketing support. But since we had, like, hardly two rubles to rub together, plus the fact that journalists had never heard of us, it was tricky getting any. Still, as a direct result of our first trip to CeBIT, we managed to get a self-written piece all about us into the Russian technology magazine ComputerPress in May 1992: home-grown PR!

Fee-fi-fo-fum, I smell the dollars of Englishmen!

My second business trip was in June-July of the same year – to the UK. One result of this trip was another article, this time in Virus Bulletin, entitled The Russians Are Coming, which was our first foreign publication. Btw – in the article ’18 programmers’ are mentioned. There were probably 18 folks working at KAMI overall, but in our AV department there were just the three of us.

London, June 1992

Read on…

The world’s cyber-pulse during the pandemic.

Among the most common questions I get asked during these tough times is how the cyber-epidemiological situation has changed. How has cybersecurity been affected in general by the mass move over to remote working (or not working, for the unlucky ones, but also sat at home all the time). And, more specifically, what new cunning tricks have the cyber-swine been coming up with, and what should folks do to stay protected from them?

Accordingly, let me summarize it all in this here blogpost…

As always, criminals – including cybercriminals – closely monitor and then adapt to changing conditions so as to maximize their criminal income. So when most of the world suddenly switches to practically a full-on stay-at-home regime (home working, home entertainment, home shopping, home social interaction, home everything, etc.!), the cybercriminal switches his/her tactics in response.

Now, for cybercriminals, the main thing they’ve been taking notice of is that most everyone while in lockdown has greatly increased the time they spend on the internet. This means a larger general ‘attack surface’ for their criminal deeds.

In particular, many of the folks now working from home, alas, aren’t provided with quality, reliable cyber-protection by their employers. This means there are now more opportunities for cybercriminals hacking into the corporate networks the employees are hooked up to, leading to potentially very rich criminal pickings for the bad guys.

So, of course, the bad guys are going after these rich pickings. We see this evidenced by the sharp increase in brute-force attacks on database servers and RDP (technology that allows, say, an employee, to get full access to their work computer – its files, desktop, everything – remotely, e.g., from home) ->

Read on…

Six simple brainteasers.

Brainteasers, riddles, conundrums – they come in all sorts of types: from easy to ~impossible, those requiring logic, math, geometry, and/or plenty of other skills and competencies. But those tricky types – requiring higher mathematics, complex space, and formulas several pages long – you won’t find any of those in this blogpost. Here, they range from real simple to average-hard, since the last one – the Sudoku – was rather tough. So, without further ado, here are the six…

Poser No. 1

You have two pieces of string of differing lengths. If burned from one end, they both burn for exactly one hour. The speed of the burning varies all the time: for example, half may burn in almost the full hour, then the other half burns up in minutes; or the other way round. You have at your disposal only the two lengths of string and one cigarette lighter, nothing else. What you need to do is determine when 45 minutes is up.

Poser No. 2

You have some graph paper with 10 by 10 squares on it. You cut out the square in the top left and top right corners; that is – one square from two opposing corners. Now the question: how do you cover the whole of the surface with 2×1 dominoes? That is, how do you place (100-2)/2 = 49 dominoes on the graph paper (with just one level of dominoes) so that everything is covered?

Poser No. 3

One night I dreamed of a number – a very unusual number. It was a 10-digit number. The first digit is equivalent to the number of zeros in the number. The second digit = the quantity of ones in the number, the third – the quantity of twos, … , and the last = the quantity of nines. Like I say, a very unusual number. The problem is – I forgot the number once I’d woken up! Question: what is the number?

Poser No. 4

This one’s to test the quickness of your wits. There’s symmetry here – almost:

30 – 33 = 3

One numeral needs to be moved to make the symmetry perfect. Which. And the ‘-‘ and ‘=’ don’t count. 

Poser No. 5

You have a cylinder, around which some thin wire is carefully wound. The wire was sufficient for four windings round the cylinder – from one end to the other – as in the pic. The length of the cylinder is 12 centimeters, the circumference of the cylinder is 4 centimeters. What is the length of the wire?

Poser No. 6. 

You have a huge cake for you and 100 of your colleagues (before/after lockdown). The colleagues line up for a slice. The first colleague takes a mere 1% slice, the second – a 2% slice: 2% of the remaining cake. The third – 3% of remaining cake, and so on, until, the last colleague – the 100th – takes all that’s left. Question: who cut themselves the largest slice?

 

All these brainteasers are doable in your head. You can of course use a pen and pad, but they won’t really help.

All righty – good luck!

And the most precise, witty, unexpected and other ‘most, mostest’ answers will get a prize: some serious antivirus protection – a boxless (contactless) version ).