Company:Kaspersky Lab

From HandWiki
Short description: Russian multinational cybersecurity and anti-virus provider
Kaspersky Lab
TypePrivate
IndustryComputer software[1]
FoundedMoscow, Russia
(1997; 27 years ago (1997))
Founders
  • Eugene Kaspersky
  • Natalya Kaspersky
  • Alexey De-Monderik
  • Vadim Bogdanov
HeadquartersMoscow, Russia

Regional units: Dubai, UAE; Istanbul, Turkey; London, United Kingdom; Mexico City, Mexico; Midrand, South Africa; São Paulo, Brazil; Singapore; Woburn, Massachusetts, United States

Area served
Worldwide
Key people
Eugene Kaspersky (CEO)
ProductsCybersecurity software
ServicesComputer security
RevenueUS$ 704 million (2020)[2]
Number of employees
4,000+ (2020)[3]
Websitewww.kaspersky.com

Kaspersky Lab (/kæˈspɜːrski/; Russian: Лаборатория Касперского, romanized: Laboratoriya Kasperskogo) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia ,[1] and operated by a holding company in the United Kingdom . It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.[4]

Kaspersky expanded abroad from 2005 to 2010 and grew to $704 million in annual revenues by 2020,[5] up 8% from 2016, though annual revenues were down 8% in North America due to U.S. government security concerns.[6] (As of 2016) the software has about 400 million users and has the largest market-share of cybersecurity software vendors in Europe. Kaspersky Lab ranks fourth in the global ranking of antivirus vendors by revenue.[7] It was the first Russian company to be included into the rating of the world's leading software companies, called the Software Top 100 (79th on the list, as of June 29, 2012). Kaspersky Lab is ranked 4th in Endpoint Security segment according to IDC data for 2010.[8] According to Gartner, Kaspersky Lab is currently the third largest vendor of consumer IT security software worldwide and the fifth largest vendor of Enterprise Endpoint Protection. In 2012 Kaspersky Lab was named a "Leader" in the Gartner Magic Quadrant for Endpoint Protection Platforms.[9]

The Kaspersky Global Research and Analysis Team (GReAT) has led the discovery of sophisticated espionage platforms conducted by nations, such as Equation Group and the Stuxnet worm.[10] Various covert government-sponsored cyber-espionage efforts were uncovered through their research. Kaspersky also publishes the annual Global IT Security Risks Survey.[11] (As of 2014) Kaspersky's research hubs analyze more than 350,000 malware samples per day.[12]

Kaspersky has faced controversy over allegations that it has engaged with the Russian Federal Security Service (FSB)—ties which the company has actively denied. The U.S. Department of Homeland Security banned Kaspersky products from all government departments on September 13, 2017. In October 2017, subsequent reports alleged that hackers working for the Russian government stole confidential data from the home computer of an American National Security Agency contractor via Kaspersky antivirus software. Kaspersky denied the allegations, reporting that the software had detected Equation Group malware samples which it uploaded to its servers for analysis in its normal course of operation.[13] The company has since announced commitments to increased accountability, such as soliciting independent reviews and verification of its software's source code, and announcing that it would migrate some of its core infrastructure for foreign customers from Russia to Switzerland . In November 2020, Kaspersky finished relocating the data of its customers from Russia to Switzerland.[14][15] The company has also opened multiple transparency centers in Switzerland, Brazil , Canada , Spain and Malaysia which allow state agencies, government experts and regulators to review its source code.[16][17]

History

The first version of Kaspersky Lab's antivirus software was developed by Eugene Kaspersky in 1989 in response to the Cascade Virus.[18][19] Early versions had just 40 virus definitions and were mostly distributed to friends and family members.[20] Kaspersky continued developing the software at KAMI,[20][21] resulting in the AntiViral Toolkit Pro (AVP) product released in 1992.[21][22][23] It was popularized in 1994 after a competitive analysis by Hamburg University gave his software first place.[21][22][23][24]

In 1997, Eugene Kaspersky, his wife Natalya Kaspersky, and Alexey De-Monderik left KAMI to form Kaspersky Lab,[25][lower-alpha 1] and to continue developing the antivirus product, then called AVP.[28][29] The product was renamed Kaspersky Anti-Virus after an American company registered the AVP trademark in the US.[28]

In 1998, a Taiwanese student released a virus called CIH. During the first three weeks of the outbreak, Kaspersky Lab's AVP was the only software at the time able to remove it. This increased demand and led to deals with antivirus companies in Japan, Finland and Germany to integrate AVP into their software.[20][28][30]

According to WIRED, Kaspersky's software was "advanced for the time". For example, it was the first software to monitor viruses in an isolated quarantine.[31] The company's revenue grew 280 percent from 1998 to 2000, with about 60 percent of its revenue coming from foreign sales.[28] Natalya worked to broker deals abroad and localize the software. It opened offices in the UK, Poland, Holland and China. It later expanded to Germany, France, the US and Japan.[30] By 2000, the company had 65 employees and sales in more than 40 countries.[28] Kaspersky opened new offices in South East Asia and the Middle East in 2008[21] and in South Africa in 2009.[32] It also expanded in India, the Middle East and Africa in 2010.[21][33] In 2009, retail sales of Kaspersky Lab's antivirus products reached almost 4.5 million copies per year.[25]

In 2011, General Atlantic bought a 20 percent share of Kaspersky Lab for $200 million, with the expectation of helping the company go public. A few months later, the decision was made to keep the firm private and Kaspersky re-purchased the shares from General Atlantic.[34][35][36] This was followed by numerous executive departures in 2011 and 2014 regarding disputes over going public and over Eugene Kaspersky's management style.[37]

On January 1, 2012, Kaspersky Lab officially left the Business Software Alliance (BSA) over SOPA. The BSA had supported the controversial anti-piracy bill, but Kaspersky Lab did not support it stating, "we believe that such measures will be used contrary to the modern advances in technology and the needs of consumers," and to show their disapproval, announced their intent to leave on December 5, 2011.[38][39]

By 2013, the company had an unaudited $667 million in annual revenues.[37] In 2014, Kaspersky Lab signed a distribution deal with Ingram Micro, which significantly expanded its reseller program.[40]

In August 2015, two former Kaspersky employees alleged that the company introduced modified files into the VirusTotal antivirus database to trick software from Kaspersky competitors into triggering false positives in virus and malware scans. A possible motive is that Eugene Kaspersky allegedly was furious at competitors perceived to be "unfairly" free-riding on Kaspersky's malware discoveries via the open-source VirusTotal database. The company denied the allegations.[41][42][43] On his personal blog, Eugene Kaspersky compared the accusations to unsubstantiated conspiracy theories.[44] Reuters followed up by publishing leaked emails allegedly from Kaspersky alluding to "falsies" and "rubbing out" foreign competitors; Kaspersky Lab stated the emails "may not be legitimate and were obtained from anonymous sources that have a hidden agenda".[45]

In 2016, Kaspersky executive Ruslan Stoyanov was arrested by Russian authorities on charges predating his work at Kaspersky.[46] In 2019, he was convicted of treason.[47][48]

In June 2023, Kaspersky Lab said many of its senior staff and managers were hit by an ongoing attack that it first suspected in early 2023 and has compromised thousands of iPhones. The oldest traces of infection date back to 2019. The Russian Federal Security Service (FSB) separately accused the American National Security Agency and company Apple of being behind the attack and infiltrating the phones of diplomats from China, Israel, NATO members, and Syria. Kaspersky Lab said it does not believe itself to be the main target and that it had not shared its own findings about the attack with Russian authorities until the FSB announcement.[49]

Products and services

Home screen of Kaspersky Internet Security

Kaspersky Lab develops and markets antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.[4] It is the fourth or fifth largest endpoint security vendor[21][50] and the third largest consumer IT security software company.[21] It is the sixth largest overall IT security company.[51] Its revenues are about 15 percent from Russian companies domestically, one-third from European organizations and one-fourth from U.S. organizations.[52] The software has about 400 million users in all.[53]

Kaspersky's consumer software include the Antivirus, Internet Security and Total Security products.[54] The Antivirus software includes malware protection, monitors the PC for suspicious program behavior, and warns users about potentially dangerous websites. The Internet Security software adds privacy features, parental controls, anti-phishing tools.[55][56] Total Security adds parental controls, adult website filters, diagnostic tools, a Password Manager application, and other features.[54][57] Kaspersky's software is available for Macs, PCs, Android, iOS, Windows Mobile, BlackBerry and Symbian.[58][59]

For businesses, the company markets the Kaspersky Endpoint Security for Business suite. It includes a centralized user interface and management application called the Kaspersky Security Center. The cybersecurity software itself is called the Kaspersky Security Network. The Kaspersky Administration KitSecurity Center manages configuration, installation and remote use. The business suite also has quarantine, reporting, and other features.[60] Its software product for businesses with 25 staff or less is called Kaspersky Small Office Security (KSOS).[61] Within the suite are products specifically for virtualization security,[62] mobile security,[63] and fraud protection[64] among others. Kaspersky also develops a free tool that helps businesses gain access to Windows devices that are infected by ransomware.[65]

Threatpost

Threatpost is a discontinued[66] computer security blog which was funded by Kaspersky Lab. According to Eugene Kaspersky, it was editorial independent from Kaspersky.[67] It was launched in 2009.[68][69] After August 2022, no new articles have been published on the site.[70]

Partnerships

The Kaspersky Anti-Virus engine also powers products or solutions by other security vendors, such as Check Point, Bluecoat, Juniper Networks, Microsoft Forefront,[71] Netintelligence, Clearswift, FrontBridge, Netasq, Wedge Networks, and others. Altogether, more than 120 companies are licensing technology from Kaspersky Lab. Kaspersky Lab also has a number of partnerships with various technology companies.

The International Multilateral Partnership Against Cyber Threats in which Datuk Mohd Noor Amin acts as the chairman, announced the appointment of Harry Cheung – Managing Director of Kaspersky Lab, APAC – as the Goodwill Ambassador for Greater China.[72]

Kaspersky Lab was a long-term partner of Scuderia Ferrari and in December 2021, announced a partnership extension with the Formula One team, and also became the team's esports partner.[73] However, in March 2022 the deal was paused as a joint decision taken by the two companies due to the 2022 Russian invasion of Ukraine.[74]

Market assessments and reception

According to PC Magazine, Kaspersky AntiVirus and competitor Bitdefender are both consistently ranked at the top in independent competitive tests.[75][76] PC Magazine's own malware and phishing tests had similar results and praised the software's "bonus security tools". Under "Cons" the magazine said it took longer than expected to complete a scan.[75] The same magazine said the Kaspersky Total Security product had an "impressive feature list" and praised the extra features in the Total Security product, like password management, encryption and parental controls. PC Magazine said the product had scored highly in lab tests for antivirus, antiphishing and other features. It had "so-so" scores in anti-malware tests and was not able to catch all spam.[77]

Kaspersky's 2013 Endpoint Security for Windows product was the top-ranked enterprise antivirus software in a competitive test by Dennis Technology Labs, followed by Symantec Endpoint Protection.[78] AV-Comparatives awarded Kaspersky "Product of the Year" for 2015, based on the number of high scores it received throughout the year on a wide range of tests.[76][79][80][lower-alpha 2] PC Magazine praised the software's features, but said it lacked policy management and deployment options.[81] Kaspersky's parental controls software was reviewed by PC Magazine. The reviewer said it was "well-rounded, very affordable parental control and monitoring". It praised the software's content filtering, child profiles, social media monitoring and other features, but criticized that some features were only available on iOS or Android.[77]

The anti-virus software testing group AV-Comparatives gave the Windows XP version of Kaspersky AV an "Advanced+" rating (its highest) in both its February 2008 on-demand detection test (with the fourth highest detection rate among 16 products tested).[82] However, in the Retrospective/Proactive Test May 2008, Kaspersky received the "Standard" rating, detecting 21% of new malware with 1-month old signatures and receiving a substantial amount of false positives.[83]

The firewall included in Kaspersky Internet Security 7.0 got a "Very Good" rating in Matousec's Firewall challenge,[84] with a result of 85%. Kaspersky Anti-Virus 7.0 has achieved a 6.5 result out of 8 in the Anti Malware Labs rootkit detection test.[85] It has also achieved a 31 out of 33 detection of polymorphic viruses[86] and a 97% result in the self-protection test.[87] In 2007, Kaspersky Internet Security 7 received an award from the British magazine PC Pro and also won a place in its "A List".[88]

Kaspersky has passed most of the Virus Bulletin comparative tests since August 2003.[89] In 2005, according to PC World magazine, Kaspersky anti-virus software provided the fastest updates for new virus and security threats in the industry.[90]

In PC World magazine's March 2010 comparison of consumer security suites, Kaspersky Internet Security 2010 scored 4.5/5 stars, and was rated second overall.[91] In the December 2011 version of AV-Comparatives' annual reports, Kaspersky Lab's software achieved the highest overall ranking and has earned the AV Comparatives' "Product of the Year" award.[92]

On February 1, 2012, Kaspersky Internet Security earned "AV-TEST Award for Best Repair 2011" award in the field of home user products from AV-TEST Institute.[93] On January 28, 2013, Kaspersky Endpoint Security earned "AV-TEST Award for Best Protection 2012" and "AV-TEST Award for Best Repair 2012" awards in the field of corporate products from AV-TEST Institute.[94]

Later in 2013, Kaspersky earned the product of the year award from AV-Comparatives and the highest score among Enterprise solutions in a Dennis Technology Labs report.[80][95]

Kaspersky has also received certification of its products through the OESIS OK Certification Program, which verifies that the applications are interoperable with third-party technology solutions like NAC and SSL VPN products from Cisco Systems, Juniper Networks, F5 Networks, and others.[96]

In 2022 March Kaspersky received a cyber immunity registration trademark in the United States. The registration gives Kaspersky the exclusive right to use Kaspersky Cyber Immunity to identify its products. It also confirms that the trademark has distinctive features checked against specific criteria by national government agencies.[97]

Malware discovery

Kaspersky Lab's Global Research and Analysis Team (GReAT) was established in 2008.[98] It investigates cybersecurity threats and other work by malware operations.[99] IT security companies are often evaluated by their ability to uncover previously unknown viruses and vulnerabilities.[100] Kaspersky's reputation for investigating cyber-security threats has been influential in gaining sales and prestige.[100][101] Beginning around 2010, Kaspersky exposed a series of government-sponsored cyber-espionage and sabotage efforts. These include Stuxnet, Duqu, Flame, Gauss, Regin and the Equation Group.[99][102] According to Wired, "many of them [were] seemingly launched by the US and its UK and Israeli allies. Kaspersky is especially well-known for its work uncovering Stuxnet, Careto,[103] and Flame."[53]

Stuxnet

Main page: Engineering:Stuxnet

In 2010, Kaspersky Lab worked with Microsoft to counteract the Stuxnet worm, which had infected 14 industrial locations in Iran using four zero-day vulnerabilities in Microsoft Windows. According to IEEE Spectrum, the circumstances "strongly suggest" the worm was developed by the United States and Israel to damage centrifuges in Iran's nuclear-enrichment program. It was the first discovery of a major government-sponsored cyber-attack.[100][104]

Flame

Main page: Flame (malware)

In May 2012, Kaspersky Lab identified the malware Flame, which a researcher described as potentially "the most sophisticated cyber weapon yet unleashed".[105] According to the researchers in Kaspersky Lab, the malware had infected an estimated 1,000 to 5,000 machines worldwide[106][107] when asked by the United Nations International Telecommunication Union to investigate reports of a virus affecting Iranian Oil Ministry computers.[108] As Kaspersky Lab investigated, they discovered an MD5 hash and filename that appeared only on customer machines from Middle Eastern nations. After discovering more pieces, researchers dubbed the program "Flame" after the name of one of its modules.[108]

Flame was an earlier variant of Stuxnet. Kaspersky never verified the source of the software, but it is suspected to have been developed by the National Security Agency (NSA) to transmit keystrokes, Skype calls and other data.[109][110][106] Kaspersky created algorithms to find similar malware and found Gauss that July, which collected and transmitted data from devices infected by bluetooth or USB drives.[100][111]

Red October

Main page: Red October (malware)

In January 2013, Kaspersky discovered the Red October malware, which had been used for widespread cyber-espionage for five years. It targeted political targets like embassies, nuclear sites, mostly in Europe, Switzerland and North America. The malware was likely written by Russian-speaking hackers and the exploits by Chinese hackers.[112][113] That June, Kaspersky discovered NetTraveler, which it said was obtaining data on emerging technology from government targets and oil companies. Kaspersky did not identify who was behind it, but it was similar to other cyber-espionage coming from Beijing, China.[114][115] Later that same year, Kaspersky discovered a hacker group it called Icefog after investigating a cybersecurity attack on a Japanese television company. Kaspersky said the hacker group, possibly from China, was unique in that they targeted specific files they seemed to know about before planting malware to extract them.[116][117]

Mask

In February 2014, Kaspersky identified the malware Mask, which infected 380 organizations in 31 countries. Many organizations that were affected were in Morocco. Some of the files were in Spanish and the group is believed to be a nation-state conducting espionage, but Kaspersky did not speculate on which country may have developed it.[118][119]

Regin

Main page: Regin (malware)

In November 2014, Symantec and Kaspersky authored papers that contained the first disclosure of malicious software named Regin.[120] According to Kaspersky, Regin is similar to QWERTY, a malware program discovered the next year.[121] Regin was used to take remote control of a computer and is believed to have originated from the Five Eyes alliance.[122] That same month Kaspersky reported on the Darkhotel attack, which targeted users of wireless networks at hotels in Asia. It asked users to update their software, and then download malware that gave up their passwords.[123][124][125]

Equation Group

In 2015, Kaspersky identified a highly sophisticated threat actor that it called "The Equation Group". The group incorporated sophisticated spying software into the firmware of hard drives at banks, government agencies, nuclear researchers and military facilities, in countries that are frequent targets of US intelligence efforts.[126] It is suspected to have been developed by the National Security Agency (NSA) and included many unique technical achievements to better avoid detection.[127] That same day, Kaspersky announced the discovery of a hacker group it called Carbanak, which was targeting banks and moving millions of dollars into fake accounts. Carbanak was discovered when one bank asked Kaspersky to investigate suspicious behavior from its ATMs.[128] A similar malware using some of the same techniques as Carbanak was discovered in 2016 and dubbed Carbanak 2.0.[129]

Duqu

Main page: Duqu

In June 2015, Kaspersky reported that its own network had been infiltrated by government-sponsored malware. Evidence suggested the malware was created by the same developers as Duqu and Stuxnet, in order to get intelligence that would help them better avoid detection by Kaspersky in the future. Kaspersky called it Duqu 2.0.[102] The malicious software resided in memory to avoid detection. The hack was believed to have been done by the same group that did Duqu in 2011. It used exploits in Microsoft installer files.[130]

Android cyber-espionage

Main page: Company:Hacking Team

In June 2015, Kaspersky Lab and Citizen Lab both independently discovered software developed by Hacking Team and used by 60 governments around the world to covertly record data from the mobile phones of their citizens. The software gave police enforcement a "menu of features" to access emails, text messages, keystrokes, call history and other data.[131][132][133] Kaspersky also identified 37,000 attacks against banking companies that used modifications of the malware called Asacub and took control of Android devices. Asacub targeted mostly banking customers in the U.S., Russia and Ukraine using an SMS message that baited users into installing a Trojan.[134]

Silverlight

In 2016, Kaspersky discovered a zero day vulnerability in Microsoft Silverlight.[135][136] Kaspersky identified a string of code often used by exploits created by the suspected author. It then used YARA rules on its network of Kaspersky software users to find that string of code and uncover the rest of the exploit. Afterwards, Microsoft issued a "critical" software patch to protect its software from the vulnerability.[135][136]

Poseidon Group

In 2016, Kaspersky uncovered the Poseidon Group, which would infiltrate corporations with malware using phishing emails, then get hired by the same company as a security firm to correct the problem. Once hired, Poseidon would install additional malware and backdoors.[137] In June 2016 Kaspersky helped uncover a Russian hacking group, leading to 50 arrests.[53]

Titanium

In 2019, Kaspersky uncovered Titanium, a very advanced and insidious backdoor malware APT, developed by PLATINUM, a cybercrime collective. Kaspersky Lab reported the malware on November 8, 2019.[138][139][140][141][142][143]

Bans and allegations of Russian government ties

Since 2015, Kaspersky was alleged to have close ties to the Russian government by various Western media outlets and the U.S. government. In 2017, President Trump signed legislation to ban software of Kaspersky on government computers. U.S. government institutions were prohibited from buying and installing Kaspersky software on their computers and other devices.[144]

In 2022, after the Russian invasion of Ukraine, the U.S. government warned American businesses that the risk of using Kaspersky software had increased and the FCC added Kaspersky to its list of threats to U.S. national security.[145] Kaspersky responded to the FCC's move in a press release on its website, saying that the agency's decision was "made on political grounds" in light of Russia's invasion of Ukraine, and that the company "remains ready to cooperate with US government agencies to address the FCC's and any other regulatory agency's concerns".[146]

See also


Notes

  1. Sources conflict and/or are ambiguous as to the exact number of engineers besides Kaspersky and his wife that cofounded the company.[20][26][27]
  2. Bitdefender received the same number of high scores; Kaspersky was chosen arbitrarily between the two as a matter of tie-breaking. The two companies both tend to tie for the top position in competitive tests.[75][76]

References

  1. 1.0 1.1 "Laboratoriya Kasperskogo, AO – Company Overview". D&B Hoovers. http://www.hoovers.com/company-information/cs/company-profile.laboratoriya_kasperskogo_ao.9ef9b249250ca034.html. 
  2. "Kaspersky reports financial results with stable business growth in 2020". Kaspersky. https://www.kaspersky.co.in/about/press-releases/2021_kaspersky-reports-financial-results-with-stable-business-growth-in-2020. 
  3. "About Us". Kaspersky Lab. https://www.kaspersky.com/about/company. 
  4. 4.0 4.1 Technologies, Kaspersky Lab. "Kaspersky Personal & Family Security Software". http://usa.kaspersky.com/. 
  5. "Kaspersky reports financial results with stable business growth in 2020" (in en). Kaspersky Lab. April 19, 2021. https://www.kaspersky.co.in/about/press-releases/2021_kaspersky-reports-financial-results-with-stable-business-growth-in-2020. 
  6. Stubbs, Jack (January 19, 2018). "Kaspersky Lab 2017 revenue up 8 percent, North America sales fall". Reuters. https://www.reuters.com/article/us-russia-kaspersky-lab-results/kaspersky-lab-2017-revenue-up-8-percent-north-america-sales-fall-idUSKBN1F818F. 
  7. The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2010. The rating was published in the IDC report Worldwide IT Security Products 2011–2015 Forecast and 2010 Vendor Shares – December 2011. The report ranked software vendors according to earnings from sales of endpoint security solutions in 2010.
  8. Worldwide Endpoint Security Revenue by Vendor, 2010
  9. Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Neil MacDonald, John Girard, January 16, 2012
  10. "About Management Team". Kaspersky Lab. https://www.kaspersky.com/about/team. 
  11. "10 Stupid Moves That Threaten Your Company's Security". April 6, 2016. http://www.informationweek.com/strategic-cio/10-stupid-moves-that-threaten-your-companys-security/d/d-id/1324035. 
  12. Ashford, Warwick (April 24, 2016). "Kaspersky Lab advances expansion plans with London research centre". http://www.computerweekly.com/news/4500246191/Kaspersky-Lab-advances-expansion-plans-with-London-research-centre. 
  13. Goodin, Dan (November 16, 2017). "Kaspersky: Yes, we obtained NSA secrets. No, we didn't help steal them" (in en-us). Ars Technica. https://arstechnica.com/information-technology/2017/11/kaspersky-yes-we-obtained-nsa-secrets-no-we-didnt-help-steal-them/. 
  14. "Kaspersky completes its data-processing relocation to Switzerland and opens new Transparency Center in North America". Kaspersky Lab. November 17, 2020. https://www.kaspersky.com/about/press-releases/2020_kaspersky-completes-its-data-processing-relocation-to-switzerland-and-opens-new-transparency-center-in-north-america. 
  15. "Kaspersky shuts down data-processing activities in Russia". November 17, 2020. https://www.computerweekly.com/news/252492217/Kaspersky-shuts-down-data-processing-activities-in-Russia?asrc=EM_EDA_140344152. 
  16. "Kaspersky transparency center". https://www.kaspersky.com/transparency-center. 
  17. "Kaspersky opens doors to new Transparency Center in North America". Globe Newswire (Press release). December 13, 2021.
  18. "#1741 Eugene Kaspersky". Forbes. https://www.forbes.com/profile/eugene-kaspersky/. 
  19. Kramer, Andrew E.; Perlroth, Nicole (June 3, 2012). "Expert Issues a Cyberwar Warning". The New York Times. https://www.nytimes.com/2012/06/04/technology/cyberweapon-warning-from-kaspersky-a-computer-security-expert.html?pagewanted=all. 
  20. 20.0 20.1 20.2 20.3 Salem Press Bios, Salem Press, http://salempress.com/initstore/pdfs/bios_com_pgs.pdf, retrieved November 13, 2015 [yes|permanent dead link|dead link}}]
  21. 21.0 21.1 21.2 21.3 21.4 21.5 21.6 Kshetri, N. (2014). Global Entrepreneurship: Environment and Strategy. Taylor & Francis. p. 110. ISBN 978-1-317-74803-8. https://books.google.com/books?id=swxgAwAAQBAJ&pg=PT110. Retrieved November 11, 2015. 
  22. 22.0 22.1 Springer, P.J. (2015). Cyber Warfare: A Reference Handbook. Contemporary World Issues. ABC-CLIO. p. 163. ISBN 978-1-61069-444-5. https://books.google.com/books?id=S6egBgAAQBAJ&pg=PA163. Retrieved November 11, 2015. 
  23. 23.0 23.1 Graham, L. (2013). Lonely Ideas: Can Russia Compete?. MIT Press. pp. 93–94. ISBN 978-0-262-31739-9. https://books.google.com/books?id=tciqAAAAQBAJ&pg=PA93. Retrieved November 11, 2015. 
  24. "The virus warrior: a start-up tale". April 29, 2010. http://rbth.com/articles/2010/04/29/the_virus_warrior_a_start_up_tale.html. 
  25. 25.0 25.1 Shachtman, Noah (April 19, 2011). "Russia's Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals". WIRED. https://www.wired.com/2012/07/ff_kaspersky/. Retrieved April 24, 2016. 
  26. Sambandaraksa, Don (September 3, 2015). "Kaspersky wants digital passports". Post Publishing. http://www.bangkokpost.com/tech/world-updates/198706/kaspersky-wants-digital-passports. 
  27. Swartz, Jon (November 25, 2008). "Russian Kaspersky Lab offers antivirus protection in U.S.". https://abcnews.go.com/Business/story?id=6329227&page=1. 
  28. 28.0 28.1 28.2 28.3 28.4 "Contemporary Biographies in Communications & Media". Salem Press. http://www.salempress.com/store/pdfs/bios_com_pgs.pdf. 
  29. "Interview: Eugene Kaspersky". March 17, 2010. https://www.infosecurity-magazine.com/interviews/interview-eugene-kaspersky/. 
  30. 30.0 30.1 Meyer, K.; Peng, M. (2016). International Business. Cengage Learning. p. 310. ISBN 978-1-4737-2264-4. https://books.google.com/books?id=OWeoCwAAQBAJ&pg=PA310. Retrieved April 24, 2016. 
  31. Shachtman, Noah (April 19, 2011). "Russia's Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals". WIRED. https://www.wired.com/2012/07/ff_kaspersky/all/. Retrieved November 12, 2015. 
  32. "IT firm Kaspersky sees African opportunity". November 23, 2009. http://www.bdlive.co.za/articles/2009/11/23/it-firm-kaspersky-sees-african-opportunity. 
  33. "STC, Russia's Kaspersky Lab in smartphone security deal". April 28, 2010. http://www.arabnews.com/node/343616. 
  34. "UPDATE 2-Kaspersky to buy out U.S. investors, rules out IPO". February 3, 2012. https://www.reuters.com/article/kaspersky-idUSL2E8D3ETO20120203. 
  35. Dunn, John E (February 8, 2012). "Kaspersky Lab CEO cancels IPO plans, wants to buy back 20% stake". Computerworld UK. http://www.computerworlduk.com/news/it-vendors/kaspersky-lab-ceo-cancels-ipo-plans-wants-buy-back-20-stake-3335881/. 
  36. Arnold, Martin (January 20, 2011). "General Atlantic buys 20% Kaspersky stake". Financial Times. http://www.ft.com/cms/s/2/b7cc912a-24d7-11e0-a919-00144feab49a.html. 
  37. 37.0 37.1 Finkle, Jim (May 2, 2014). "Kaspersky Lab executives depart amid business strategy dispute". https://www.reuters.com/article/us-kaspersky-management-idUSBREA410RS20140502. 
  38. Espiner, Tom. "Kaspersky leaves BSA over US piracy bill | ZDNet" (in en). ZDNet. http://www.zdnet.com/article/kaspersky-leaves-bsa-over-us-piracy-bill/. 
  39. "Kaspersky leaves Business Software Alliance over SOPA" (in en-us). TechSpot. http://www.techspot.com/news/46532-kaspersky-leaves-business-software-alliance-over-sopa.html. 
  40. Hoffman, Stefanie (June 21, 2011). "Kaspersky Lab Expands Reach With Ingram Micro Partnership". http://www.crn.com/news/security/231000139/kaspersky-lab-expands-reach-with-ingram-micro-partnership.htm. 
  41. "Exclusive: Russian antivirus firm faked malware to harm rivals - Ex-employees". Reuters. August 14, 2015. https://www.reuters.com/article/us-kaspersky-rivals-idUSKCN0QJ1CR20150814. 
  42. "Russian antivirus firm Kaspersky faked malware to harm rivals, according to former employees". August 14, 2015. http://www.businessinsider.com/russian-antivirus-firm-kaspersky-faked-malware-to-harm-rivals-according-to-former-employees-2015-8. 
  43. Menn, Joseph (August 28, 2015). "Exclusive: Russia's Kaspersky threatened to 'rub out' rival, email shows". https://www.reuters.com/article/us-kaspersky-rivals-idUSKCN0QX2GO20150828. 
  44. Sharwood, Simon. "Kaspersky: Freemasons coded fake malware in the Bermuda Triangle". https://www.theregister.co.uk/2015/08/17/kaspersky_freemasons_coded_fake_malware_in_the_bermuda_triangle/. 
  45. Menn, Joseph (August 28, 2015). "Exclusive: Russia's Kaspersky threatened to 'rub out' rival, email shows". Reuters. https://www.reuters.com/article/us-kaspersky-rivals-idUSKCN0QX2GO20150828. 
  46. Goodin, Dan (January 25, 2017). "Kaspersky Lab's top investigator reportedly arrested in treason probe" (in en-us). Ars Technica. https://arstechnica.com/information-technology/2017/01/kaspersky-labs-top-investigator-reportedly-arrested-in-treason-probe/. 
  47. "Russia's ex-cybersecurity chief gets 22 sentence in jail" (in en). ABC News. February 28, 2019. https://abcnews.go.com/Technology/wireStory/russias-cyber-security-chief-22-year-sentence-61326988. 
  48. Wolff, Josephine (March 11, 2019). "The U.S.-Russia Relationship on Cybercrime Is About to Get Even More Strained" (in en). Slate Magazine. https://slate.com/technology/2019/03/russia-treason-trial-sergei-mikhailov-ruslan-stoyanov-cybercrime.html. 
  49. Faulconbridge, Guy (2023-06-01). "Russia says US hacked thousands of Apple phones in spy plot". Reuters. https://www.reuters.com/technology/russias-fsb-says-us-nsa-penetrated-thousands-apple-phones-spy-plot-2023-06-01/. 
  50. "2016 Gartner Magic Quadrant for Endpoint Security". Gartner. https://www.gartner.com/en/documents/3196523. 
  51. Matlack, Carol (March 19, 2015). "The Company Securing Your Internet Has Close Ties to Russian Spies". https://www.bloomberg.com/news/articles/2015-03-19/cybersecurity-kaspersky-has-close-ties-to-russian-spies. 
  52. Steiner, Eduard (July 5, 2016). "Wie Russland jetzt die Weltmärkte erobern will" (in de). https://www.welt.de/wirtschaft/article156816145/Wie-Russland-jetzt-die-Weltmaerkte-erobern-will.html. 
  53. 53.0 53.1 53.2 MacFarquhar, Neil (June 10, 2016). "A Russian Cybersleuth Battles the 'Dark Ages' of the Internet". https://www.nytimes.com/2016/06/11/world/europe/kaspersky-lab-russia-cybercrime-internet.html. 
  54. 54.0 54.1 "Kaspersky Total Security review". November 16, 2015. https://www.expertreviews.co.uk/software/internet-security/1401992/kaspersky-internet-security-2015-review. 
  55. Roy, Anirban (September 9, 2015). "Kaspersky Launches Antivirus, Internet Security, Total Security- Multi Device: Price, Availability". http://www.ibtimes.co.in/kaspersky-launches-antivirus-internet-security-total-security-multi-device-price-availability-646029. 
  56. Rubenking, Neil J. (July 29, 2015). "Kaspersky Anti-Virus (2016)". https://www.pcmag.com/article2/0,2817,2460689,00.asp. 
  57. "Antimalware protection products: Kaspersky Endpoint Security". May 9, 2016. http://searchsecurity.techtarget.com/feature/Antimalware-protection-products-Kaspersky-Endpoint-Security. 
  58. "Kaspersky Lab Kaspersky Security 10 for Mobile". SC Magazine. July 24, 2013. 
  59. "Android Antivirus". February 4, 2015. http://www.tomsguide.com/us/kaspersky-mobile-security,review-2100.html. 
  60. Forrest, Derek (August 27, 2015). "Kaspersky Lab Announces New Protection For Mac Endpoint Users". http://www.tomsitpro.com/articles/kaspersky-endpoint-security-mac-os,1-2843.html. 
  61. "Kaspersky Lab Launches Small Office Security". April 29, 2015. http://www.eweek.com/small-business/kaspersky-lab-launches-small-office-security.html. [yes|permanent dead link|dead link}}]
  62. Stephenson, Peter (July 1, 2015). "Kaspersky Security for Virtualization product review". http://www.scmagazine.com/kaspersky-security-for-virtualization/review/4401/. 
  63. Stephenson, Peter (July 1, 2013). "Kaspersky Lab Kaspersky Security 10 for Mobile v10 product review". http://www.scmagazine.com/kaspersky-lab-kaspersky-security-10-for-mobile-v10/review/3931/. 
  64. "Kaspersky Lab Adds Device-Reputation Fraud Prevention". August 24, 2015. http://www.darkreading.com/vulnerabilities---threats/kaspersky-lab-adds-device-reputation-fraud-prevention/d/d-id/1321894. 
  65. Palmer, Danny (August 9, 2016). "Kaspersky Lab offers free anti-ransomware tool for Windows". http://www.zdnet.com/article/kaspersky-lab-offers-free-anti-ransomware-tool-for-windows/. 
  66. "Kaspersky Looks to Have Shuttered the Threatpost, the Security News Outlet They Secretly Own". 2022-09-28. https://www.pluginvulnerabilities.com/2022/09/28/kaspersky-looks-to-have-shuttered-the-threatpost-the-security-news-outlet-they-secretly-own/. 
  67. "Who's Afraid of Kaspersky?" (in en). May 22, 2018. https://www.vice.com/en/article/wjbda5/kaspersky-sas-conference-russia-spying. 
  68. "Threatpost launches as best practice for enterprise IT and social media" (in en). https://www.zdnet.com/article/threatpost-launches-as-best-practice-for-enterprise-it-and-social-media/. 
  69. "One year later, Threatpost continues to succeed for Kaspersky" (in en). https://www.zdnet.com/article/one-year-later-threatpost-continues-to-succeed-for-kaspersky/. 
  70. "Threatpost | The first stop for security news". https://threatpost.com/. 
  71. "About our Partner: Microsoft Forefront". Kaspersky Lab. http://www.kaspersky.com/partners/oem/partners/microsoft_forefront. 
  72. "Event - Kaspersky Official eStore Southeast Asia". http://www.antivirus365.net/event/impact.php. 
  73. "Kaspersky extends partnership with Scuderia Ferrari and becomes brand's Esports team partner – Kaspersky". December 16, 2021. https://www.kaspersky.com/about/press-releases/2021_kaspersky-extends-partnership-with-scuderia-ferrari-and-becomes-brands-esports-team-partner. 
  74. "Ferrari pauses F1 partnership with Russian-based software maker Kaspersky: Spokesman". CNA. March 18, 2022. https://www.channelnewsasia.com/sport/ferrari-pauses-f1-partnership-russian-based-software-maker-kaspersky-spokesman-2571921. 
  75. 75.0 75.1 75.2 Rubenking, Neil J. (March 29, 2016). "The Best Antivirus Utilities for 2016". PC Magazine. https://www.pcmag.com/article2/0,2817,2372364,00.asp. 
  76. 76.0 76.1 76.2 Anti-Virus Comparative: Summary Report 2015, AV Comparatives, December 30, 2015, http://www.av-comparatives.org/wp-content/uploads/2016/01/avc_sum_201512_en.pdf, retrieved April 30, 2016 
  77. 77.0 77.1 Rubenking, Neil J. (August 12, 2016). "Kaspersky Total Security (2017)". https://www.pcmag.com/article2/0,2817,2476367,00.asp. 
  78. Mesmmer, Ellen (July 12, 2013). "Enterprise antivirus software test puts Kaspersky software out front, Microsoft at bottom". http://www.networkworld.com/article/2168103/compliance/enterprise-anti-virus-software-test--puts-kaspersky-software-out-front--microsoft-at-bott.html. 
  79. Hachman, Mark (December 3, 2013). "Kaspersky, six others top malware removal tests". PCWorld. http://www.pcworld.com/article/2068485/kaspersky-six-others-top-malware-removal-tests.html. 
  80. 80.0 80.1 Rubenking, Neil. "Kaspersky Named Antivirus Tsar". http://securitywatch.pcmag.com/security-software/319752-kaspersky-named-antivirus-tsar. 
  81. Sarrel, Matthew D. (January 15, 2016). "Kaspersky Lab Small Office Security". PC Magazine. https://www.pcmag.com/article2/0,2817,2495688,00.asp. 
  82. "Anti-Virus comparative February 2008". http://www.av-comparatives.org/comparativesreviews/detection-test/168-file-detection-test-february-2008. 
  83. "Retrospective / ProActive - Test May 2008". http://www.av-comparatives.org/comparativesreviews/retrospective-test/92-heuristic-behaviour-test-may-2008a. 
  84. "Results and comments". http://www.matousec.com/projects/firewall-challenge/results.php. 
  85. "Anti-rootkit tests | Anti-Malware Test Lab". http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F7. 
  86. "Anti-Malware Solutions Test Results | Anti-Malware Test Lab". http://www.anti-malware-test.com/?q=taxonomy/term/5. 
  87. "Self-protection test | Anti-Malware Test Lab". http://www.anti-malware-test.com/?q=taxonomy%2Fterm%2F16. 
  88. "Kaspersky Internet Security 7.0 receives two top awards in testing conducted by the British magazine PC Pro". Kaspersky Lab. April 5, 2007. http://www.kaspersky.co.uk/news?id=207575604. 
  89. "All VB100 test history for vendor Kaspersky Lab". https://www.virusbulletin.com/testing/vendors/recent/vb100-antimalware/kaspersky/all. 
  90. "Anti-Virus Personal 5.0 (Full Product)". PC World Magazine. January 25, 2005. http://www.pcworld.com/article/id,124493-page,1/article.html. 
  91. Kaspersky Lab Internet Security 2010 Antivirus & Security Software Review . PCWorld (March 30, 2010). Retrieved on September 29, 2010.
  92. "AV-Comparatives - Independent Tests of Anti-Virus Software - Summary Reports". http://www.av-comparatives.org/comparativesreviews/summary-reports. 
  93. "AV-TEST Award 2011". AV-TEST. 2012. http://www.av-test.org/en/test-procedures/award/2011/. 
  94. "AV-TEST 2012 Awards". 2013. http://www.av-test.org/en/test-procedures/award/2012/. 
  95. Mesmmer, Ellen (July 12, 2013). "Enterprise anti-virus software test puts Kaspersky software out front, Microsoft at bottom". http://www.networkworld.com/article/2168103/compliance/enterprise-anti-virus-software-test--puts-kaspersky-software-out-front--microsoft-at-bott.html. 
  96. New versions of Kaspersky Lab's personal products. Kaspersky.com (July 31, 2009). Retrieved on September 29, 2010.
  97. "Kaspersky Cyber Immunity becomes trademark (®) in the U.S.". April 29, 2022. https://www.kaspersky.com/about/press-releases/2022_kaspersky-cyber-immunity-becomes-trademark-r-in-the-us. 
  98. Graham, L. (2013). Lonely Ideas: Can Russia Compete?. MIT Press. p. 93. ISBN 978-0-262-31739-9. https://books.google.com/books?id=tciqAAAAQBAJ&pg=PA93. Retrieved April 24, 2016. 
  99. 99.0 99.1 Kovar, Joseph F. (March 13, 2015). "What Is Kaspersky's GReAT?". CRN. http://www.crn.com/news/storage/300075826/what-is-kasperskys-great.htm. 
  100. 100.0 100.1 100.2 100.3 Kushner, David (February 26, 2013). "The Real Story of Stuxnet". https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet. 
  101. "The Kaspersky Equation; Cyber-Security". The Economist. February 21, 2015. https://www.highbeam.com/doc/1G1-402233169.html. 
  102. 102.0 102.1 Zetter, Kim (December 9, 2014). "Kaspersky Finds New Nation-State Attack—In Its Own Network". Wired. https://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/. Retrieved April 25, 2016. 
  103. "Kaspersky Lab Uncovers 'The Mask': One of the Most Advanced Global Cyber-espionage Operations to Date Due to the Complexity of the Toolset Used by the Attackers, 11 February 2014". http://www.kaspersky.com/about/news/virus/2014/Kaspersky-Lab-Uncovers-The-Mask-One-of-the-Most-Advanced-Global-Cyber-espionage-Operations-to-Date-Due-to-the-Complexity-of-the-Toolset-Used-by-the-Attackers. 
  104. Weinberger, Sharon (2011). "Computer security: Is this the start of cyberwarfare?". Nature 474 (7350): 142–145. doi:10.1038/474142a. PMID 21654779. 
  105. Albanesius, Chloe (May 28, 2012). "Massive 'Flame' Malware Stealing Data Across Middle East". PC World. https://www.pcmag.com/article2/0,2817,2404951,00.asp. 
  106. 106.0 106.1 "Flame virus: Five facts to know". The Times of India. May 29, 2012. http://timesofindia.indiatimes.com/tech/enterprise-it/security/Flame-virus-Five-facts-to-know/articleshow/13640158.cms. 
  107. McElroy, Damien; Williams, Christopher (May 28, 2012). "Flame: world's most complex computer virus exposed". The Telegraph (London). https://www.telegraph.co.uk/news/worldnews/middleeast/iran/9295938/Flame-worlds-most-complex-computer-virus-exposed.html. 
  108. 108.0 108.1 Zetter, Kim (May 28, 2012). "Meet 'Flame', The Massive Spy Malware Infiltrating Iranian Computers". Wired. https://www.wired.com/threatlevel/2012/05/flame/. Retrieved May 29, 2012. 
  109. Zetter, Kim (August 23, 2010). "Meet 'Flame,' The Massive Spy Malware Infiltrating Iranian Computers". Wired. https://www.wired.com/2012/05/flame/. Retrieved April 25, 2016. 
  110. Albanesius, Chloe (May 28, 2012). "Massive 'Flame' Malware Stealing Data Across Middle East". PC World. https://www.pcmag.com/article2/0,2817,2404951,00.asp. 
  111. Goodin, Dan (March 14, 2013). "Puzzle box: The quest to crack the world's most mysterious malware warhead". https://arstechnica.com/security/2013/03/the-worlds-most-mysterious-potentially-destructive-malware-is-not-stuxnet/. 
  112. Ngak, Chenda (January 14, 2013). "Kaspersky Labs finds 'Red October' cyber-espionage malware". http://www.cbsnews.com/news/kaspersky-labs-finds-red-october-cyber-espionage-malware/. 
  113. Perlroth, Nicole (January 14, 2013). "Security Firm Discovers Cyber-Spy Campaign". The New York Times. http://bits.blogs.nytimes.com/2013/01/14/security-firm-discovers-global-spy-campaign/. 
  114. Liberto, Jennifer (June 4, 2013). "New Chinese hacker group targets governments and nuclear facilities". https://money.cnn.com/2013/06/04/technology/security/cyber-hacker-group/index.html. 
  115. Wagenseil, Paul (June 5, 2013). "'NetTraveler' Online Espionage Campaign Linked to China". http://www.nbcnews.com/id/52099793/ns/technology_and_science-tech_and_gadgets/t/nettraveler-online-espionage-campaign-linked-china/. 
  116. Sonne, Paul (September 25, 2013). "Kaspersky: 'Hit and Run' Cyber-Espionage Hackers Emerge". The Wall Street Journal. https://blogs.wsj.com/digits/2013/09/25/kaspersky-hit-and-run-cyber-espionage-hackers-emerge/. 
  117. Menn, Joseph (September 25, 2013). "Hacker mercenaries linked to Japan, South Korea spying – researchers". https://www.reuters.com/article/cyberattacks-china-idUSL2N0HJ2AS20130925. 
  118. "Mask malware takes aim at governments and activists". February 11, 2014. https://www.bbc.com/news/technology-26136412. 
  119. Lee, Timothy (February 10, 2014). "This malware is frighteningly sophisticated, and we don't know who created it". Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2014/02/10/this-malware-is-frighteningly-sophisticated-and-we-dont-know-who-created-it/. 
  120. Constantin, Lucian (January 27, 2015). "Source code reveals link between NSA and Regin cyberespionage malware". http://www.pcworld.com/article/2876112/link-between-nsa-and-regin-cyberespionage-malware-becomes-clearer.html. 
  121. Osborne, Charlie (January 28, 2015). "Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence". http://www.zdnet.com/article/infamous-regin-malware-linked-to-spy-tools-used-by-nsa-five-eyes-intelligence/. 
  122. "Researchers link QWERTY keylogger code to NSA and Five Eye's Regin espionage malware". January 27, 2015. http://www.networkworld.com/article/2875739/microsoft-subnet/researchers-link-qwerty-keylogger-code-to-nsa-and-five-eyes-regin-espionage-malware.html. 
  123. Fleisher, Lisa (November 10, 2014). "Cybercrime Gang Targets Execs Using Hotel Internet". The Wall Street Journal. https://blogs.wsj.com/digits/2014/11/10/cybercrime-gang-targets-execs-using-hotel-internet/. 
  124. Hu, Denni (November 10, 2014). "Darkhotel Bug Targets Executives Traveling in Asia, Report Says". https://www.bloomberg.com/news/articles/2014-11-10/darkhotel-malware-spies-on-traveling-executives-report-says. 
  125. Auchard, Eric (November 10, 2014). "Execs in Asian luxury hotels fall prey to cyber espionage: study". https://www.reuters.com/article/us-cybersecurity-hotels-idUSKCN0IU0WB20141110. 
  126. "Kaspersky links US to spread of PC spyware across 30 countries". Financial Times. March 25, 2015. http://www.ft.com/cms/s/0/4d4a8f9c-b668-11e4-95dc-00144feab7de.html#axzz46qMUFcNY. 
  127. Goodin, Dan (February 16, 2015). "How 'omnipotent' hackers tied to NSA hid for 14 years—and were found at last". https://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/. 
  128. "The Kaspersky equation". The Economist. February 21, 2015. https://www.economist.com/news/business/21644154-russian-antivirus-firm-impresses-sceptics-again-kaspersky-equation. 
  129. Perez, Rio (February 9, 2016). "Kaspersky confirms return of Carbanak and two more banking APT groups". SC Magazine. http://www.scmagazine.com/news/kaspersky-confirms-return-of-carbanak-and-two-more-banking-apt-groups/article/472224/. 
  130. "Kaspersky Lab cybersecurity firm is hacked". June 10, 2015. https://www.bbc.com/news/technology-33083050. 
  131. Zetter, Kim (June 24, 2014). "Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones". Wired. https://www.wired.com/2014/06/remote-control-system-phone-surveillance/. Retrieved May 1, 2016. 
  132. "Police learning surveillance tricks from hackers, cybersecurity experts say". June 24, 2014. http://www.cbsnews.com/news/police-learning-surveillance-tricks-from-hackers-cybersecurity-experts-say/. 
  133. "Eyes on you: Experts reveal police hacking methods". June 25, 2014. https://www.usatoday.com/story/tech/2014/06/25/police-hacking-methods/11348497/. 
  134. Barth, Bradley (January 21, 2016). "Kaspersky detects surge in 'Asacub' mobile banking trojan attacks". SC Magazine. http://www.scmagazine.com/news/kaspersky-detects-surge-in-asacub-mobile-banking-trojan-attacks/article/466638/. 
  135. 135.0 135.1 Osborne, Charlie (January 13, 2016). "Kaspersky Lab discovers Silverlight zero-day vulnerability". http://www.zdnet.com/article/kaspersky-lab-discovers-silverlight-zero-day-vulnerability/. 
  136. 136.0 136.1 Zetter, Kim (January 13, 2016). "Hacking Team's Leak Helped Researchers Hunt Down a Zero-Day". Wired. https://www.wired.com/2016/01/hacking-team-leak-helps-kaspersky-researchers-find-zero-day-exploit/. Retrieved April 25, 2016. 
  137. Jones, Brad (February 10, 2016). "Kaspersky fingers 'Poseidon' for attacks dating back to 2001". http://www.digitaltrends.com/computing/kapersky-identifies-poseidon-as-cyber-criminal-group/. 
  138. AMR (Anti-Malware Research); GReAT (Global Research & Analysis Team) (November 8, 2019). "Titanium: the Platinum group strikes again". Kaspersky Lab. https://securelist.com/titanium-the-platinum-group-strikes-again/94961/. 
  139. "Kaspersky identifies new Titanium backdoor used for attacks by notorious Platinum group in APAC region". Global Security Mag. November 2019. http://www.globalsecuritymag.com/Kaspersky-identifies-new-Titanium,20191108,92551.html. 
  140. Goodin, Dan (November 8, 2019). "One of the world's most advanced hacking groups debuts new Titanium backdoor". Ars Technica. https://arstechnica.com/information-technology/2019/11/newly-discovered-titanium-backdoor-employs-clever-ways-to-go-undetected/. 
  141. Osborne, Charlie (November 8, 2019). "Platinum APT's new Titanium backdoor mimics popular PC software to stay hidden". ZDNet. https://www.zdnet.com/article/platinum-apts-new-titanium-backdoor-mimics-popular-pc-software-to-stay-hidden/. 
  142. Ewell, Pauline (November 8, 2019). "Platinum APT Shines Up New Titanium Backdoor". MashViral. http://mashviral.com/platinum-apt-shines-up-new-titanium-backdoor/. 
  143. "'Platinum' Hacking Group Strikes Once more With Complicated Titanium Backdoor To Home windows". Market Research Base. November 9, 2019. https://marketresearchbase.com/2019/11/09/platinum-hacking-group-strikes-once-more-with-complicated-titanium-backdoor-to-home-windows/. 
  144. "Trump signs into law U.S. government ban on Kaspersky Lab software". Reuters. December 12, 2017. https://www.reuters.com/article/us-usa-cyber-kaspersky/trump-signs-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4. 
  145. "Exclusive: U.S. warned firms about Russia's Kaspersky software day after invasion". Reuters. March 31, 2022. https://www.reuters.com/technology/exclusive-us-warned-firms-about-russias-kaspersky-software-day-after-invasion-2022-03-31. 
  146. "Kaspersky statement on the FCC public notice". March 26, 2022. https://www.kaspersky.com/about/press-releases/2022_kaspersky-statement-on-the-fcc-public-notice. 

External links