Feeds

Eugene Kaspersky and the KGB man that never was

AV boss has bone to pick with The Guardian

Top three mobile application threats

The Guardian has apologised to Eugene Kaspersky after mistakingly naming the anti-virus guru as a former KGB officer.

Eugene Kaspersky, co-founder and chief exec of the internet security company Kaspersky Lab, was described as a "KGB man" and a lieutenant in the KGB in an otherwise accurate article (The ex-KGB man stalking the cybercriminals since renamed The Russian defence against global cybercrime).

In reality, Kaspersky studied cryptography at a high school which was co-sponsored by the Russian department of defence and the KGB. He then went on to work for the department of defence as a cryptologist and later as an anti-virus researcher. During this time Kaspersky developed an interest in anti-virus research.

From 1991 to 1997 Eugene worked at the KAMI Information Technologies Center where he and his colleagues developed the AVP antivirus project. He founded Kaspersky Lab with former wife Natalia, who remains the chairman of the Russian anti-virus firm, in 1997.

Anti-virus firms often go to considerable lengths to imply they are involved in a hi-tech cloak-and-dagger fight against malware authors, so The Guardian can perhaps be forgiven its error (Don't be ridiculous - Ed). The phenomenon most clearly manifests itself in the facilities chosen by anti-virus firms to host security centres.

Symantec's European centre of operations, for example, is housed in a former nuclear shelter in rural Hampshire. Kaspersky's former Moscow HQ is in a building where scientists used to design nuclear weapons guidance systems. ®

Bootnote

Eugene Kaspersky is a colourful figure in the world of computer security, which has been taken over by marketing types in recent years. Not the sort of fella you want to end up facing across a poker table perhaps, at least if you're betting with money you don't want to lose. The Russian favours whisky over the local preference for vodka.

His motivation techniques are somewhat unusual. He owns a bone taken from a walrus penis which he used to jokingly wave around to inspire the troops carrying out the grunt work of anti-virus analysis during our visit to the firm's Moscow HQ in December 2003.

Combat fraud and increase customer satisfaction

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Burnt out on patches this month? Oracle's got 104 MORE fixes for you
Mass patch for issues across its software catalog
Reddit users discover iOS malware threat
'Unflod Baby Panda' looks to snatch Apple IDs
Oracle working on at least 13 Heartbleed fixes
Big Red's cloud is safe and Oracle Linux 6 has been patched, but Java has some issues
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.