company:kaspersky lab

  • Big tech firms are racing to track climate refugees - MIT Technology Review
    https://www.technologyreview.com/s/613531/big-tech-firms-are-racing-to-track-climate-refugees

    To be an undocumented refugee, these days, is to exist in many places and to not exist at all. It is to have your movements, words, and actions tracked, archived, and multiplied. It is to live between fences, tents, and databases—one new entry per doctor’s visit, per bag of rice, per canister of water. It can mean having your biometric and biographical data scanned, stored, and cross-checked by people you do not know, and who speak a language you may not understand. It is to have your identity multiplied, classified, and reduced to lines of code. It is to live in spreadsheets.

    Today, around 1.1 billion people live without a recognized form of identification. In many cases, their papers—if they ever had papers at all—have been burned, lost, or otherwise destroyed. And the number is growing every day. The United Nations High Commissioner for Refugees (UNHCR), the UN’s refugee agency, estimates that in 2017, one person became displaced every two seconds as a result of conflict, economics, or climate change. “In short, the world had almost as many forcibly displaced people in 2017 as the population of Thailand,” the agency reports. “Across all countries, one in every 110 persons is someone displaced.”

    The next frontier, though, is not figuring out where people have been or where they will settle: it is figuring out who they will be when they get there. What will their “digital identity” look like? Who will hold the keys? A number of new and established tech companies are rushing to answer these critical questions. Technology accelerated the global identity crisis, and now technology claims to have the solution.

    But now that so much of our economic and political life takes place online, creating new forms of identity has taken on a severe urgency. Both the private and public sectors are racing to come up with a sustainable way of counting, identifying, and connecting not only the growing population of the global displaced, but also the wealthy population of the voluntarily mobile. Mastercard, Microsoft, Apple, Palantir, and Facebook have all entered the field, through private ventures as well as controversial partnerships with some of the world’s largest humanitarian agencies.

    In 2015, all the UN’s member states committed to providing “legal identity for all” by 2030 as part of its Sustainable Development Goals. As a result, virtually every major aid-granting agency is either incubating, researching, or piloting a digital identity program.

    Et hop, Palantir dans la boucle... humanitaire, tant qu’à faire.

    The UN’s World Food Programme recently announced a new $45 million, five-year collaboration with Palantir that will use the Palo Alto firm’s “range of digital analytical solutions” to streamline and track the dispersal of humanitarian aid. The move was immediately met with skepticism among privacy advocates: a group of more than 60 human rights activists sent an open letter to WFP executives, expressing deep concern over the partnership and urging WFP leaders to “reconsider the terms and scope of the agreement with Palantir.”

    They argued that not only would the partnership threaten to “seriously damage the reputation of the WFP,” but also that it could “seriously undermine the rights of 90 million people the WFP serves.” The controversy, researchers said, should be a “wake-up call” to the humanitarian community about the dangers of relying on digital data and entrusting their networks to third parties.

    In a statement responding to these concerns, the WFP wrote that a series of “checks and balances” would protect private, identifying data, and that Palantir would not be able to use it for commercial gain. In an e-mail to MIT Technology Review, a WFP representative wrote that the agency has its own solutions to managing refugee identities, and that “the WFP-Palantir partnership does not focus on areas that require personally identifiable information (PII) of beneficiaries, nor does it focus on digital identity. No PII data is ever shared with Palantir or with any other partner. Only anonymized/encrypted information is used to analyze allocation of assistance to ensure complete privacy and security for the people we serve.”

    Yet as researcher Faine Greenwood said in Slate, the WFP may be overestimating its ability to protect and anonymize sensitive data.

    Expérimenter la blockchain sur des populations fragilisées comme les Rohynga, quelle bonne idée.

    Both the promise and the risks of digital identity have already become evident in the work of a small army of blockchain and biometric startups. The immutable, decentralized nature of the blockchain has led a number of startups to pin their hopes on the emerging technology as a solution to the problem of storing and protecting sensitive information, including biometric data.

    Passbase, which bills itself as “the first self-sovereign identity platform backed by verified government documents, linked social media accounts, and biometric signatures,” has raised seed funding from Alphabet and Stanford, and currently accepts documents from over 150 countries. Vinny Lingham, cofounder of the blockchain identity verification company Civic, goes so far as to claim that his company can help save democracy. WFP.s Building Blocks program also uses blockchain inside a refugee camp in Jordan.

    Maybe blockchain will save democracy. Or maybe it will make future political crises even worse. The Rohingya Project distributed blockchain-based digital identity cards to Rohingya refugees in order to help them access financial, legal, and medical services. It is, on the face of things, an altruistic, forward-looking humanitarian initiative. But uploading highly sensitive, identifying biometric information to an immutable ledger and testing emerging technology on a vulnerable population means exposing that population to untold risks.

    Data breaches, like those that have repeatedly exposed personal information in India’s Aadhaar biometric identification program, have exposed at-risk populations to new dangers. And they are all too common: in March, a data breach at the US Federal Emergency Management Agency exposed the personal information of 2.3 million survivors of American wildfires and hurricanes, leaving them vulnerable to identity fraud. In April, Kaspersky Labs reported that over 60,000 user digital identities could be bought for $5 to $200 via a dark-net marketplace. No technology is invulnerable to error, and no database, no matter how secure, is 100% protected from a breach.

    As digital identification technologies flood into the market, it is difficult to imagine predicting or preventing the disruptions—good and bad—that they will cause. Blockchain and biometric technologies have touched off a critical reevaluation of the most existential questions: What determines identity, and how many identities can one person claim? What will it mean when official identification eventually—inevitably—is no longer the purview of the nation-state?

    “Everybody deserves to have formal identification that they can use to exert their rights,” says Brandie Nonnecke, director of UC Berkeley’s CITRIS Policy Lab, which works on technology development in the social interest.

    But the rush of public and private digital identity programs has already begun to complicate fundamental questions about identification, registration, citizenship, and belonging. Even the simplest questions about digital identity have yet to be determined, Nonnecke says: “Do you have one identity, or do you have multiple identities across institutions? Is that a safeguard, or does it create more risk?”

    #Identité_numérique #Vie_privée #Humanitaire #Techno-fix

  • Techniques used by Hackers to steal Cryptocurrecny
    https://hackernoon.com/techniques-used-by-hackers-to-steal-cryptocurrecny-e172ba5d79fb?source=r

    From phishing to crypto jacking to key-logger attacks, there are a lot of ways, hackers can steal your stash of cryptocurrency. In early July 2018, Bleeping Computers identified a suspicious activity to defraud 2.3 Million Bitcoin wallets. All these wallets were under the threat of being hacked. The malware used was “clipboard hijackers.” It operated in the clipboard and could replace the copied wallet data with one of the hackers while transferring Bitcoin to other wallets. Kaspersky Lab had predicted such type of hacking attacks in November 2017, and it didn’t take long to become a reality. Till date, this is one of the most popular types of attack to steal user’s crypto and information. About 20 percent of the total cryptocurrency hacking attempts are made on individual’s wallets and (...)

  • En plus de toutes autres considérations c’est aussi une question de bon sens.

    L’armée française veut bannir les antivirus de la société russe Kaspersky Lab - L’Express L’Expansion
    http://lexpansion.lexpress.fr/high-tech/l-armee-francaise-veut-bannir-les-antivirus-de-la-societe-russe-

    La pression monte sur Kaspersky Lab, l’éditeur d’antivirus russe. Déjà banni par le département de la sécurité intérieure (DHS) américain mi-septembre, il est aussi poussé dehors par le ministère des Armées en France. Après une mise en garde des services de renseignement hexagonaux, la Défense a commencé à réduire la présence des produits de la société dans ses réseaux et sur ses ordinateurs au profit de l’Anglais Sophos et du Japonais TrendMicro. La Direction interarmées des réseaux d’infrastructure et des systèmes d’information de la défense (Dirisi) n’a pas retenu l’entreprise russe lors de plusieurs appels d’offres récents.

    « Nous étions trop dépendants de Kaspersky, une société, certes très performante, mais dont les liens entretenus avec l’Etat russe nous inquiètent, indique un proche du dossier. Cette décision a été prise avant même les Etats-Unis mais le mouvement s’est accéléré cet été après les dégâts causés par WannaCry ».

    #kaspersky #virus #securité #défense

  • ’Petya’ ransomware attack strikes companies across Europe and US | World news | The Guardian
    https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe
    https://i.guim.co.uk/img/media/d0237f4c918c8b0a85e424d64b46650d5df5491e/0_110_5191_3115/master/5191.jpg

    “This is not an experienced ransomware operator,” said Ryan Kalember, senior vice-president of cybersecurity strategy at Proofpoint.

    The attack was first reported in Ukraine, where the government, banks, state power utility and Kiev’s airport and metro system were all affected. The radiation monitoring system at Chernobyl was taken offline, forcing employees to use hand-held counters to measure levels at the former nuclear plant’s exclusion zone.

    Some technology experts said the attack appeared consistent with an “updated variant” of a virus known as Petya or Petrwrap, a ransomware that locks computer files and forces users to pay a designated sum to regain access.

    But analysts at cyber security firm Kaspersky Labs said they had traced the infections to “a new ransomware that has not been seen before”. The “NotPetya” attack had hit 2,000 users in Russia, Ukraine, Poland, France, Italy, the UK, Germany and the US, Kaspersky said.

    #Microsoft #virus_informatique #Ransomware #petya #notpetya #extorsion #bitcoin #tchernobyl

  • Le virus Duqu 2.0 cible les négociations sur le nucléaire iranien - Information - France Culture
    http://www.franceculture.fr/emission-revue-de-presse-internationale-le-virus-duqu-2-0-cible-les-ne

    PAR LUDOVIC PIEDTENU

    Quand une entreprise de cybersécurité s’aperçoit qu’elle a été piratée !
    Basé à Moscou, Kaspersky Labs, connu pour son logiciel anti-virus grand public, a détecté cette intrusion dans ses propres serveurs au début du printemps.
    C’est une information outre-atlantique du Wall Street Journal.

    Le piratage a commencé l’an dernier. Et comme l’explique le quotidien américain, « quand une entreprise de cybersécurité se rend compte qu’elle a été hackée, piratée par un virus largement connu pour être utilisé par des espions israéliens, elle cherche à savoir qui d’autres étaient sur la liste ».
    « Elle a donc vérifiée des millions d’ordinateurs et trois hôtels de luxe en Europe sont apparus. Les chercheurs de l’entreprise n’étaient pas bien sûrs de ce qu’ils pouvaient faire de ces résultats. Puis ils ont réalisé ce que ces trois hôtels avaient en commun. »
    "Chacun d’entre eux a été infiltré par ce virus juste avant d’accueillir les négociations sur le nucléaire entre l’Iran et les grandes puissances." Rappelons que nous sommes dans la dernière ligne droite, la dernière quinzaine peut-être avant accord, et Israël s’est toujours plaint d’être écarté de ces discussions.
    Ce virus s’appelle « Duqu », virus pour la première fois identifié en 2011. Il s’agit donc de Duqu 2.0.
    Et il ne fait aucun doute « selon plusieurs officiels américains et experts en cybersécurité que Duqu est conçu pour collecter les renseignements les plus sensibles » à destination d’Israël.

    http://rf.proxycast.org/1037897873406042112/10901-11.06.2015-ITEMA_20765317-0.mp3

    #Duqu2 #cyberattaque #Israël

  • Un nouveau virus cyberespion découvert
    http://www.lemonde.fr/technologies/article/2014/02/11/the-mask-careto-decouverte-d-un-nouveau-logiciel-espion_4364021_651865.html

    Des experts en sécurité informatique ont annoncé, lundi 10 février, avoir découvert un virus dédié au cyberespionnage qui aurait frappé gouvernements et entreprises de 31 pays et serait sponsorisé par un Etat. La société de sécurité informatique russe Kaspersky Lab a précisé que ce logiciel malveillant, connu sous le nom de « #The_Mask » ou « #Careto », a été utilisé au moins depuis 2007 et est particulièrement complexe.
    Selon l’enquête, le virus aurait fait 380 victimes issues de 31 pays, dont les Etats-Unis, la France, l’Allemagne et la Chine. Kapersky avait indiqué en 2012 que Stuxnet était aussi lié à un autre virus, Flame, qui pourrait avoir été créé en 2007 ou en 2008.
    (…)
    « Nous avons plusieurs raisons de croire qu’il s’agit d’une campagne sponsorisée par un Etat », souligne un expert de Kaspersky, Costin Raiu.

    Selon lui, les concepteurs du virus sont très qualifiés et ont jusqu’à présent été en mesure de rester cachés. « Un tel degré de sécurité opérationnelle n’est pas normal pour des groupes cybercriminels », note-t-il. « Et le fait que les pirates de Careto semblent parler espagnol est peut-être l’aspect le plus étrange [dans cette affaire], ajoute Kaspersky. Alors que la plupart des attaques [informatiques] connues de nos jours sont remplies de commentaires en chinois, les langues comme l’allemand, le français ou l’espagnol sont très rares. »