Feeds

Eugene Kaspersky and the KGB man that never was

AV boss has bone to pick with The Guardian

High performance access to file storage

The Guardian has apologised to Eugene Kaspersky after mistakingly naming the anti-virus guru as a former KGB officer.

Eugene Kaspersky, co-founder and chief exec of the internet security company Kaspersky Lab, was described as a "KGB man" and a lieutenant in the KGB in an otherwise accurate article (The ex-KGB man stalking the cybercriminals since renamed The Russian defence against global cybercrime).

In reality, Kaspersky studied cryptography at a high school which was co-sponsored by the Russian department of defence and the KGB. He then went on to work for the department of defence as a cryptologist and later as an anti-virus researcher. During this time Kaspersky developed an interest in anti-virus research.

From 1991 to 1997 Eugene worked at the KAMI Information Technologies Center where he and his colleagues developed the AVP antivirus project. He founded Kaspersky Lab with former wife Natalia, who remains the chairman of the Russian anti-virus firm, in 1997.

Anti-virus firms often go to considerable lengths to imply they are involved in a hi-tech cloak-and-dagger fight against malware authors, so The Guardian can perhaps be forgiven its error (Don't be ridiculous - Ed). The phenomenon most clearly manifests itself in the facilities chosen by anti-virus firms to host security centres.

Symantec's European centre of operations, for example, is housed in a former nuclear shelter in rural Hampshire. Kaspersky's former Moscow HQ is in a building where scientists used to design nuclear weapons guidance systems. ®

Bootnote

Eugene Kaspersky is a colourful figure in the world of computer security, which has been taken over by marketing types in recent years. Not the sort of fella you want to end up facing across a poker table perhaps, at least if you're betting with money you don't want to lose. The Russian favours whisky over the local preference for vodka.

His motivation techniques are somewhat unusual. He owns a bone taken from a walrus penis which he used to jokingly wave around to inspire the troops carrying out the grunt work of anti-virus analysis during our visit to the firm's Moscow HQ in December 2003.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.