Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
UltraAV Antivirus 2024
Message
<blockquote data-quote="bazang" data-source="post: 1103114" data-attributes="member: 114717"><p>Every subscriber was sent multiple emails that explained that they could stop the auto-install of UltraAV. All the complainers either paid no attention to the emails or they don't even use Kaspersky and are strawman outraged - as is typical of social media (and forums like MT are a form of social media) - without knowing the facts or willfully ignoring the facts.</p><p></p><p></p><p>Kaspersky was not targeted. The decisions are based upon real-world, irrefutable facts. Everybody keeps thinking this about software, but it is not.</p><p></p><p>You do realize that the Russian government uses Kaspersky for its goals & objectives, right? Kaspersky has actively supported those goals and objectives. He has even publicly made statements that he assists and supports his home country's intelligence and security services. Kaspersky is not a stand-by spectator that just happened to get caught-up in a global struggle between two of the world's super powers.</p><p></p><p></p><p>Eugene Kaspersky and Kaspersky companies are only prevented from selling Kaspersky software in the US. They are not banned nor prevented from doing other business operations within the US. So your statement that Kaspersky was "kicked-out" of the US is incorrect. For one thing, Kaspersky does not just publish security software. It does a lot more than that. The company is not a one-dimensional, one-trick pony.</p><p></p><p></p><p>This is not a correct statement either.</p><p></p><p></p><p>Another false statement. The people behind The Pango Group and AURA are all leading Indian technology executives and venture capitalists. They have been in the IT security markets for decades. Their business model is to sell their software as white-label.</p><p></p><p>Kaspersky VPN is rebranded HotSpot Shield VPN which has been owned by The Pango Group, and before that the parent of Pango - the AURA group of companies. Eugene Kaspersky had decades long relationships with these various Indian technology executives and companies. That is why he chose to use them. He was very happy with the white-label products and services he purchased from them over the years.</p><p></p><p>You just don't know about these people and companies because 1) they are all Indians and India-based and 2) their business model is low-profile selling of their products to companies like Kaspersky (and other big name antivirus companies that you would be shocked to learn uses AURA, Pango, and Max Secure products and services).</p><p></p><p></p><p>Kaspersky has been hacked and breached multiple times by multiple nation-states including DPRK as well as Anonymous type hackers working out of their parents' basement.</p><p></p><p></p><p>The individual who uncovered Stuxnet was Sergey Ulasen and he owned VirusBlokAda. This was June 2010. There were also Norton and other researchers who began the public discussion about Stuxnet on Wilders Security forum. By the time Kaspersky made the public report in September of 2010 that "Stuxnet is so sophisticated that it could only have been the effort of a nation state" other researchers had already long been discussing it as a nation-state targeting of the Siemens industrial controller system.</p><p></p><p>The Iranian client was using VirusBlokAda software, not Kaspersky. Ulasen's team researched and figured-out major aspects of Stuxnet before Kaspersky ever took a look at it. Ulasen's first post on Wilders Security forum was in July 2010, and that is after he had contacted Microsoft to share the VirusBlokAda team findings. It was only then that Kaspersky scrambled to obtain a Stuxnet sample. However, by time Kaspersky published its findings in September 2010, Symantec researchers had already figured out Stuxnet at an operational level. This was completed in August 2010 - a full month before Kaspersky's report.</p></blockquote><p></p>
[QUOTE="bazang, post: 1103114, member: 114717"] Every subscriber was sent multiple emails that explained that they could stop the auto-install of UltraAV. All the complainers either paid no attention to the emails or they don't even use Kaspersky and are strawman outraged - as is typical of social media (and forums like MT are a form of social media) - without knowing the facts or willfully ignoring the facts. Kaspersky was not targeted. The decisions are based upon real-world, irrefutable facts. Everybody keeps thinking this about software, but it is not. You do realize that the Russian government uses Kaspersky for its goals & objectives, right? Kaspersky has actively supported those goals and objectives. He has even publicly made statements that he assists and supports his home country's intelligence and security services. Kaspersky is not a stand-by spectator that just happened to get caught-up in a global struggle between two of the world's super powers. Eugene Kaspersky and Kaspersky companies are only prevented from selling Kaspersky software in the US. They are not banned nor prevented from doing other business operations within the US. So your statement that Kaspersky was "kicked-out" of the US is incorrect. For one thing, Kaspersky does not just publish security software. It does a lot more than that. The company is not a one-dimensional, one-trick pony. This is not a correct statement either. Another false statement. The people behind The Pango Group and AURA are all leading Indian technology executives and venture capitalists. They have been in the IT security markets for decades. Their business model is to sell their software as white-label. Kaspersky VPN is rebranded HotSpot Shield VPN which has been owned by The Pango Group, and before that the parent of Pango - the AURA group of companies. Eugene Kaspersky had decades long relationships with these various Indian technology executives and companies. That is why he chose to use them. He was very happy with the white-label products and services he purchased from them over the years. You just don't know about these people and companies because 1) they are all Indians and India-based and 2) their business model is low-profile selling of their products to companies like Kaspersky (and other big name antivirus companies that you would be shocked to learn uses AURA, Pango, and Max Secure products and services). Kaspersky has been hacked and breached multiple times by multiple nation-states including DPRK as well as Anonymous type hackers working out of their parents' basement. The individual who uncovered Stuxnet was Sergey Ulasen and he owned VirusBlokAda. This was June 2010. There were also Norton and other researchers who began the public discussion about Stuxnet on Wilders Security forum. By the time Kaspersky made the public report in September of 2010 that "Stuxnet is so sophisticated that it could only have been the effort of a nation state" other researchers had already long been discussing it as a nation-state targeting of the Siemens industrial controller system. The Iranian client was using VirusBlokAda software, not Kaspersky. Ulasen's team researched and figured-out major aspects of Stuxnet before Kaspersky ever took a look at it. Ulasen's first post on Wilders Security forum was in July 2010, and that is after he had contacted Microsoft to share the VirusBlokAda team findings. It was only then that Kaspersky scrambled to obtain a Stuxnet sample. However, by time Kaspersky published its findings in September 2010, Symantec researchers had already figured out Stuxnet at an operational level. This was completed in August 2010 - a full month before Kaspersky's report. [/QUOTE]
Insert quotes…
Verification
Post reply
Top