A Billion in the Cloud.

Recently, sharp-eyed users congratulated me with a ‘billion’ items in the Kaspersky Security Network. Thank you! Although, I need to explain what that ‘billion’ is.

A billion items in Kaspersky Security Network

First of all, don’t worry. This is not a billion something or other you don’t want on your computer; no, it’s something different, and it’s a little complicated. So let me start with some basic definitions.

Read on: How to get as close as poss to the ideas cybersecurity…

A Brief History of DDoS Attacks.

And so it’s come to pass: the abbreviation ‘DDoS‘ has entered the lexicon to such an extent that it often doesn’t get written out in full these days in the general interest newspapers. Well, some actually may still not know what it stands for, but everyone and their dog does know that a DDoS is very bad thing for a certain large target, with something very important suddenly not working, with employees twiddling their thumbs as the network’s down, and with their tech-support’s telephones requiring an ice bath as they’re so hot from ringing – and disgruntled clients swearing down them all the time. What’s more, everyone and their cat also knows that normally a DDoS attack gets carried out by unknown, mysterious – and just plain bad – cyber-enemies.

DDoS attacks have evolved very quickly, as you’ll find out reading this blogpost. They’ve grown much nastier and become a lot more technically advanced; from time to time the adopt utterly unusual attack methods; they go after fresh new targets; and break new world records in being the biggest and baddest DDoS’s ever. But, then, the world in which DDoS find themselves in has evolved very quickly too. Everything and the kitchen sink is online: the number of assorted ‘smart’ [sic] devices connected to the net now far outstrips the number of good old desktop and laptop computers.

The result of these two evolutions running in parallel – of DDoS’s themselves plus the digital landscape in which they dwell – has brought us equally evolved headlines: botnets made up of IP cameras and home Wi-Fi routers breaking DDoS records on size (Mirai), and massive DDoS attacks on Russian banks.

If, earlier, botnets were made up of zombie PCs, soon they’ll be made up of zombie refrigerators, vacuum cleaners, tumble dryers and coffee machines.

brevity-comic

Read on: So what’s next?…

The First ‘Cybersecurity World Championship’.

I’ve a real soft spot for the disruptive thinking. I also like surprising astounding folks. And I like astounding folks in proper, worthy ways. I like it when what we do makes jaws drop; when folks don’t believe – but try anyway, then they get to like it, and then they love it.

Ok, all a bit abstract so far. Let me be a bit more concrete…

Our latest jaw-dropper is… a desktop simulator game for cybersecurity! Never heard of that before? You wouldn’t – it’s never been done before!

cydmfeaxuaa3voi

It goes by the name of KIPS – which stands for Kaspersky Interactive Protection Simulation. It’s a business teamwork cybersecurity strategy simulation game, which lasts around two hours and is intended to encourage initiative and analysis skills and an understanding of cybersecurity measures. Must say, I wasn’t expecting KL to enter the gaming market – ever; but why not, if it gets the messages across best? And we’ve gone from green (i.e., inexperienced) gaming startup to green (i.e., KL corporate green:) full-fledged gaming provider in no time at all.

And this Thursday – December 1 – we’re holding the first world championship on KIPS!

Read on: No joke folks. This is really happening…

Enter your email address to subscribe to this blog
(Required)

A Tricky Choice out of Few Alternatives.

Ok. Let’s solve – not the trickiest – but still not the most trivial of tasks.

This year for Christmas I’d like a new laptop – a better, tougher one. I’ve only had the one I’ve got now a little over a year, but with my business schedule and the computer’s constant use and abuse, it’s on its last legs already. It looks tatty, and the keyboard feels like it’s going to fall apart. So, yes: I need an upgrade…

dsc02564

But what device should I get? Crikey. Where to start? Ah yes – at the beginning: with my requirements…

My user requirements aren’t too convoluted, but then again – they’re not mere email/ messenger/ Instagram/ Pokemon, either. Here they are:

  • Office, email, browser, different editors and messengers;
  • It needs to be able to withstand an intensive workload;
  • I’d like a bigger screen than the norm (13″+);
  • A full-size keyboard would be good too.

Straight away that rules out smartphones and tablets, and it looks like a mid-size laptop is the way to go.

But which operating system? Well, the list of options isn’t that long these days: Windows, Mac, Linux.

Every system is good – in its own way…

Read on: It turns out there is no choice…

The World’s Most Beautiful Countries – a Fresh Approach.

And now for something completely different and non-industrial. In fact just the opposite – something about both natural and man-made beauty. Why? Here’s why…

Not long ago, somewhere (I can’t recall where) I came across the phrase ‘the most beautiful country in the world’. I didn’t think much of it at the time, but the old unconscious appears to have logged it for a future revisit. Oh that subconscious.

A few weeks later, sure enough, I was compelled to revisit it, and had a look on the Internet about this, and of course I found various lists of things like ‘The Top-10/20 Most Beautiful Countries in the World’. Thing is… most of it seemed to be talking through its hat, seemingly written by folks who’ve never been to Latin America, Central China, Kamchatka or the Kuril islands.

I admit, determining which are the prettiest countries in the world is tricky: beauty is a subjective thing, and that means that the criteria you use will also be subjective. I mean, what criteria should or could you use?

But, well, I’ve got a bit of a head-start on this – with my Top-100 Must-See Places in the World. With this list you (here – I) can calculate levels of beautifulness… but taking into account the sizes of the territories! This is so we get the ‘most beautiful overall’ instead of the ‘quantity of beautiful places in a particular country’.


Read on: and the winner is…

Pleasant News from China.

Privyet all!

I’m lying low in MOW at the mo, but that doesn’t mean life comes to a standstill – far from it!

While I sit here in my office looking out the window at the falling snow, over in China, in the city of Wuzhen, the annual World Internet Conference is taking place (which I was at last year). And this year the organizers have decided to give awards to the best (in their opinion) cyber-projects. And guess who featured among the winners?!

Here’s congratulating all project members! Our solution for protecting industrial installations and critical infrastructure – KICS – won the award for ‘World Leading Internet Scientific and Technological Achievements’, alongside Tesla, IBM Watson and Alibaba!

The contest was entered by 500 companies, and we were in among the 15 winners – and the only one from the IT security field.

Rock Steel ‘n’ Roll.

Ok, you’ve seen how the steel gets transformed from red hot slabs into pastry-thin sheets at the Novolipetsk Steel Plant already. Next up: the cold-rolling and polymer coatings workshop…

Rolls from the hot workshop are brought here and unwound onto conveyor belts and then shuffled about here and there and subjected to various technological processes to increase the steel’s quality, among other things.

Read on: Steel is everywhere…

Finally, Our Own OS – Oh Yes!

At last – we’ve done it!

I’ve anticipated this day for ages – the day when the first commercially available mass market hardware device based our own secure operating system landed on my desk. And here she is, the beaut.

This unassuming black box is a protected layer 3 switch powered by Kaspersky OS and designed for networks with extreme requirements for data security.

And there’s plenty more in the pipeline where this came from too, meaning the tech will be applied in other Internet-connected bits of kit, aka the Internet of Things (IoT). Why? Because this OS just so happens to be ideal for applications where a small, optimized and secure platform is required.

Read on: Distinctive features…

Swan Lake.

Despite the wholly non-sterile conditions inside the Novolipetsk Steel Plant, on the outside you’d never know there was a mammoth industrial complex nearby. For the management take the ecology of the surrounding environment veeerrryyy seriously.

The above slide says: ‘More than $1.1 billion invested in ecology in 15 years. Lipetsk – the cleanest metal-producing city in the Russian Federation’. And you can probably guess what those figures in the clouds mean: the level of air pollution, with Lipetsk having the lowest level/number – 3.4.

Indeed, several years ago they decided to take air pollution really seriously here and cut it drastically – and it looks like they’ve done a good job of it. For dotted all around (inside) the complex healthy-looking trees grow. So healthy-looking that one visiting foreign delegation asked of the cedar trees ‘how often do you replace them?!’ Turns out they were never planted and all grew themselves of their own accord.

Read on: Swan lake…

That’s It. I’ve Had Enough!

Hi Folks!

Meet David, the magnificent masterpiece sculpted by Michelangelo at the start of the 16th century. A photo of his face with that curious furrowed brow featured on our very first anti-cyber-vermin security product at the beginning of the 1990s. Some thought the pic was of me! I still don’t see why; I mean, have you EVER seen my face clean-shaven… and as white as a sheet? )

 5868830789_df6e1b84a2_o

The choice of David for the retail box was far from random: we found we were kindred spirits – both very much underdogs. KL was a small young company from nowhere throwing down the gauntlet to global cyber-malice in an established international security market; David was the small young guy throwing down the gauntlet to the giant Goliath.

Throughout the years the boxes have changed, but one thing that hasn’t is our… Davidness.

Fate threw plenty of obstacles in our path that could have easily seen us off, but we persevered, hurdled those obstacles – often alone – and became stronger.

To everyone’s amazement we gave users the best protection in the world and became one of the leaders in the global market. We took it on ourselves to fight patent trolls practically alone, and are still successfully fighting them. (Most others prefer to feed them instead.) And despite the rise in parasites and BS-products, we continue to increase investment in true cybersecurity technologies (including true machine learning) for the protection of users from the cyberthreat avant-garde.

Thus, with just a ‘sling and stones’ we slowly but surely keep on killing Goliath ‘saving the world’: regardless of the geopolitical situation, and from any sort of cyberattacks – regardless of their origin or purpose.

And now, fate has brought us a new challenge. And not only us: this is also a challenge for all computer users and the entire ecosystem of independent developers for Windows.

Read on: David vs. Goliath, ver. 2016…