Crowdsourcing in Security.

To think of all the yummy stuff the Internet has brought us, though interesting, would probably be a waste of time: by the time you’d have finished totting up all the scrumptiousness you remember, just as much new scrummyness would have appeared. But there is one particular Internet-delicacy concept that, due to its importance and value, should really never be overlooked, even in just a “Best Hits” of the Internet. This concept deserves closer consideration. And this concept is crowdsourcing.

I won’t go into loads of detail – you can get that at the other end of the Wikipedia link above (incidentally, Wikipedia is also a crowdsourcing project :) or via a search engine. Here, let me briefly go through the idea:

The WWW permits large numbers of folks from all over the world to very quickly all get together and combine efforts to solve some kind of difficult task or other. The result is collective intelligence, backed up by gigahertz, gigabytes and terabytes of computers and communication channels. Technically, its all about the sharing and allocation of computing power. For example, I remember well how at the end of the nineties many at night connected their comps to SETI@Home – a non-commercial project that searched for radio signals of extraterrestrial civilizations. The project is still going, with 1.2 million participants and a total processing power running up to 1.6 petaflops.

SETI@home

Perhaps surprisingly, you’ll generally find network crowdsourcing being applied in practically every sphere of life. And security is no exception. Recent examples: the international brainstorming that went into solving the Duqu Framework, and into trying to crack the mystery of the encrypted Gauss payload. (For the former, by the way, we received a rather flattering write-up on darkreading.com.) Still, these cases aren’t really the best examples of crowdsourcing at work…

The best example is probably to be found in the way we (KL) successfully process 125,000 samples of malware every day (up from 70,000 late last year). Of course, robots and other technologies of automation and data-flow analysis help, but the most important ingredient to make it all work – the statistical food – is furnished by you! Yes, you! The system’s a big you-scratch-my-back, I’ll-scratch-yours gig in which our users help both us and one another in the business of preventing cyber break-ins around the world, and in particular of tackling unknown threats. And everyone helps anonymously and voluntarily after having clearly expressed a willingness to take part; and none of it affecting computer performance!

More: Let me tell you how it works …

Kamchatka-2012: The Battle for Mutnovka.

Mutnovsky volcano and environs (locally known simply as Mutnovka) are made up – handily – of three birds (killed with one stone) and a bonus track.

First, there’s Mutnovka itself – an active volcano of indescribable beauty, a canyon, ice cap, craters, streams, steam vents, sulfuric springs, and so on and so forth. Second, there’s Gorely – also a volcano, but nothing like Mutnovka, so also very interesting and visit-worthy. (By the way, right before our last trip here, in 2010, Gorely suddenly started to hiss and gurgle – so we gave it a miss then, just in case.) Third, amazing lava fields, caves and tunnels. And the bonus track? I’ll get to that a bit later…

The great thing about the place is that all four sights are close together: you can walk among all four quite easily in minutes, not hours.

Mutnovsky volcano

More: The weather takes a sharp turn …

Enter your email address to subscribe to this blog
(Required)

Windows 8: We’re Ready Already

Greetings droogs!

The new version of KIS is attracting quite a bit of buzz in the media: in the two weeks since its global premiere it has been receiving gushing review after gushing review. Just about all of them go into plenty of detail covering all the ins and outs of the product, and specific features have been covered here on this blog of mine – for example posts about automatic protection from vulnerabilities and making secure payments.

But KIS has one more delicious layer of features; however, they can’t be used yet, and will only become applicable in the (nearest) future (we really mean it when we say Be Ready for What’s Next, you know!). These futuresque featuresques are undeservedly not getting the limelight. I’m talking about KIS support for Windows 8.

So what are these technologies, how do they fit in with Win8, and what are the benefits for users?

I’ll start with the most obvious: the new Windows 8 interface. I haven’t had a test-drive myself, but I’ve heard lots of good things about it and read flattering reviews. The fully redesigned interface is really not bad looking at all, and that goes for the desktop version and the tablet-touchscreen-mobile incarnation. I’m looking forward to its release and the reactions of users…

At the same time it has to be said that this new kid on the block has significantly increased the proverbial pain in the neck for third-party software developers: in order to cater to the whole spectrum of user preferences it was deemed necessary to have two interfaces – the classic one we’re all used to, and the new go-faster-stripes one. In response, we’ve been one of the first in the antivirus industry to develop a special application that transfers the antivirus management features to the new Windows 8 interface. The application is free of charge, and you can download and install it from the Windows Store.

Kaspersky Now For Windows

More: Fighting rootkits in Win8…

Kamchatka-2012: Rocking the Ksudach.

Days 3-4-5. Ksudach.

We flew from Kurile Lake to Ksudach by helicopter. We could have got there by foot of course, but, first, no one knew the way; second, we couldn’t find a crazy enough guide; and third, no one really fancied battling through the dense undergrowth. Oh, and fourth: the whole route is cut with bears. Maybe next time we should prepare beforehand and work out a passable route – one that would also take in Kambalny volcano. From Google Maps it looks rather tempting.

Ksudach
Kambalny Google Map

More: Building the paddling pools inside the volcano…

Social Networks: the Force Is Strong with These Ones.

Prologue

The history of social networks is pretty much like Star Wars. Really! Social networks started out obscure and mysterious, with folks saying, “There’s this new type of site, with enormous capabilities and hidden business opportunities, which no one can estimate at present, but in the future will truly make all people truly connected, free and equal!” It’s pure Eastern-spirituality-influenced George Lucas – about “bringing balance to the Force.” And so it came to pass – social networks became a perfect communication ground for all – ordinary folks, companies, and the media.

Of course, with such a boring script you’re hardly going to get a blockbuster movie :-). Let’s face it, you can’t have folks living happily ever after (and all with equal rights, opportunities, etc., etc.) at the start of a film, can you?! The story needs an insidious infernal plan pursued by dark forces to arise. And – voila! – that’s what we got. Social networks became the medium of choice for games played by the world’s intelligence services and manipulation of public opinion – about which I’ve written and talked plenty before.

So, Star Wars: A New Hope has finished. The next chapter has begun:

The Empire Strikes Back

“Forming public opinion” via social networks has for several years already been practiced rather successfully by governments of many countries, no matter their political traditions or leanings. With so much open and free (no cost) information on the surface – no digging necessary – folks themselves tell all about their news, interesting information, whereabouts, lists of colleagues, friends and professional contacts. And the bizarre thing is that anyone who can access that data – private individuals, companies, criminals, members of a cross-stich embroidery group… (you get the point). The data lies about on the surface and people continue (despite warnings) to put more and more such data on the Internet. But with the many APIs crisscrossing social networks acting as mutagens that speed up the evolution, information uploaded one day on just one network is the next day forever (literally: eternally) indexed in search engines.

At the same time the intelligence services have happily joined social networks – becoming “users” themselves – but with their own agenda, naturally. For ordinary folks social networks are mostly a source of reading matter; for companies they’re a source of – or tool for – sales and marketing; but for intelligence services social networks represent a vital means for protecting state interests, and can also be used as weapons against potential opponents.

More: The vicious circle and Return of the Jedi …

Kamchatka-2012: History. And Why You Can Never Trust a Bear.

Day 3. Kutkhiniy Batiy

Before Russians settled on Kamchatka it was populated by Itelmens, Koryaks, Evens, Chukchi and Aleut. The first Russian expeditions to, and settlements on, Kamchatka, and the peninsula’s becoming part of the Russian state all took place in the seventeenth century. Then the Crimean war kicked off, which in 1854 reached as far as peaceful Kamchatka. That was followed by the Russian-Japanese War in 1904… But for a complete history of Kamchatka, have a look here.

But let me tell you an Itelmen legend about the creation of Kamchatka and how the Kutkhiniy Batiy came into existence, as told by our guide – a local hunter.

Kutkhiniy Batiy

More: Once upon a time there lived a hardworking raven called Kutkh …

Kamchatka-2012: Bears.

Day 2. Bears, Bears Everywhere – Not One to Fear

Kurile Lake is famous not only for its surrounding scenery and nearby volcanos, but also for the local demographic situation with bears – that demographic being: there are loads of them!

They roam around camps either on their own or as family units – moms and their little ones. The camp we were in had a perimeter fence all around it separating the camp from the surrounding bear-inhabited wilds. The fence is just a little bit electrified – enough just to give the big furry mammals a bit of a scare, nothing more – so the bears generally won’t fancy breaking through said fence with all their weight and might. As we were told, bears touch unknown objects with their noses, and a light electric shock is enough to correct bears’ “auto-pilot”. They take no notice of the folks inside the fence and carry on with their lives undisturbed, even grazing just a few meters from the barrier.

We observed how outside the perimeter everything was relatively peaceful – all the bears mulling about appeared to be in good, calm spirits… until one elder-bear started to pester a younger and weaker member of the sleuth – with the result that the latter, having had enough of this harassment, decided to go for flight as opposed to fight – via (understandably) the shortest route possible, which happened to be right across our camp. It was as if he’d forgotten about the fence, charging at it at full speed. Poor thing. He was soon reminded about it, that was for sure L. He was ok though, just a little startled!

// According to an old folk tale, “A hippo has poor eyesight, but given his size – it’s hardly a problem for him.” :)

Bear

More: Bears’ kindergarten …

Kamchatka-2012: “No Regrets!”

Kamchatka-2012: “No Regrets!”

The next chapter in the expedition travelogue…

Day 1. And We’re Off!

Let me start with a joke. But not just any old joke – there’s a point to it. You’ll see!…

So, two old friends meet up by chance after not seeing each other for years:

– Wohhh, dude! How many years has it been? How the devil are you?!
– Good, thanks. I got married [In a mournful tone].
– Congratulations! Let’s go for some beers and celebrate the occasion!
– No, can’t. Beers aren’t allowed.
– Then football, eh? Like the good old days?
– Nope. Football – not allowed either.
– Hmmm. Ok, let’s get out to the dacha [summer house]. The woods, mushrooms, barbeque, and all that?
– No can do. The woods, barbeque and all that – not allowed.
– I see. So, you don’t regret getting married?
– No. Regret isn’t allowed.

On every successful expedition or tourist-hike, sooner or later a short slogan tends to come into existence that starts being repeated more and more, and which eventually comes to be the trip’s motto, infusing the trip and everything that occurs on it with its essence. Well, Kamchatka-2012’s motto fairly promptly came to be “No Regrets!” – none at all, zero, naught, zilch regrets. No matter the multiple hindrances to a semblance of holiday good times – the far from perfect weather conditions, the scarcity of drinking water, the excess of water pouring down from the heavens, the massive airborne mutant bloodsucking beasts, the numb legs and sore feet from far too much hiking up mountainsides, and so on…

…Despite all of that, everyone, in the end, had no regrets whatsoever!

Travel Books

More: plan of the trip – to see everything! …

Kamchatka-Tourism: Tricky Without Helicopters.

Hi all!

Herewith, the next installment of the travelogue of this year’s Kamchatka adventure.

Today you’ll be getting the low-down – and lots of pics – on the universal, essential means of transport for navigating the peninsula: the helicopter. A lot of the photos aren’t mine; they were taken by other members of the crew of adventurers.

Moutain Helicopter Pad

More: Kamchatka copters and Kamchatka from copters …