WOBURN, Mass.--(BUSINESS WIRE)--Kaspersky Lab has reiterated its commitment to global collaboration in the fight against cybercrime by signing a threat intelligence sharing agreement with INTERPOL. The legal framework is designed to facilitate and develop cooperation between Kaspersky Lab and INTERPOL by sharing threat intelligence data on the latest cybercriminal activities, wherever they appear.
With cyberthreats often borderless in nature, Kaspersky Lab has been a leading proponent of the importance of industry collaboration. Its experts have regularly cooperated with INTERPOL to share fresh cyberthreat discoveries with police in its member countries. For example, Kaspersky Lab participated in a groundbreaking INTERPOL-led cybercrime operation that identified nearly 9,000 botnet command and control (C2) servers and hundreds of compromised websites, including government portals, across the ASEAN region.
Kaspersky Lab has also previously assisted in a global operation coordinated by the INTERPOL Global Complex for Innovation (IGCI) in Singapore to disrupt the Simda criminal botnet – a network of over 770,000 infected PCs around the world.
Furthermore, cooperating with INTERPOL has helped Kaspersky Lab experts to test and improve a free open-source tool that enables quicker and easier cyberthreat research: not only does it enable researchers to cut travel time, it also helps law enforcement quickly discover key artifacts left after a cyberattack.
Strengthening the existing relationship between the two organizations, the new agreement formalizes the exchange of data that can support INTERPOL in these types of investigations. The aim is for Kaspersky Lab to share information about its cyberthreat research that can help with full digital forensics to stop cybercriminals in their tracks.
“Sharing intelligence is vital in tackling today’s ever-growing threat landscape and we are proud to enhance our cooperation with INTERPOL in its fight against cybercrime,” said Anton Shingarev, vice president, public affairs at Kaspersky Lab. “Our experts are leaders in the field of cybersecurity research and sometimes we are the only vendor able to detect a particular infection at the time. By further strengthening our relationship with INTERPOL we hope to support law enforcement in new ways by exchanging critical information on specific cybercrime situations in respective countries. With cybercrime becoming increasingly complex and fast-changing, the private sector often stores valuable data about malware that can hold the key to solving a case.”
“INTERPOL’s new agreement with Kaspersky Lab is an additional step in our continued efforts to ensure law enforcement worldwide has access to the information they need to combat cyberthreats,” said Noboru Nakatani, executive director of the IGCI. “We have seen how cooperation with the private sector is essential in effectively tackling this global phenomenon which continues to grow in scale and complexity.”
Read more here: www.businesswire.com/news/home/20171012005110/en/INTERPOL-Kaspersky-Lab-Strengthen-Partnership-New-Threat
Sale! Buy Kaspersky Here: www.rjmpc.com/kaspersky-antivirus.html
WPA2, the gold-standard protocol for protecting Wi-Fi networks, has been found to have a serious security vulnerability.
The flaw has been dubbed "KRACK" -- for "key reinstallation attacks" -- by Mathy Vanhoef of KU Leuven, the Belgian researcher who discovered it.
KRACK exploits a weakness in the way a client joins a WPA2-protected network, a procedure known as the four-way handshake. Critically, Vanhoef noted that the flaw exists in properly configured wireless networks. "The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected," Vanhoef wrote on a Web site created to explain the vulnerability, www.krackattacks.com.
By manipulating and replaying cryptographic handshake messages, KRACK tricks the victim system into re-installing keys that are already in use, Vanhoef wrote. While the attack does not reveal the wireless network password, it does allow some to all of the network traffic to be visible to an attacker, depending on the encryption protocol in use.
Like any wireless attack, KRACK requires the attacker to be within wireless signal range of the target, and only circumvents the encryption provided by WPA2, not the encryption of the underlying data using Transport Layer Security or other types of protection. (In a proof-of-concept video on his Web site, however, Vanhoef used the SSLStrip tool in combination with KRACK methods to simulate a man-in-the-middle attack to view an Android phone user's encrypted Internet traffic.)
Read more here: adtmag.com/articles/2017/10/16/krack-flaw.aspx