Kaspersky secure operating system in production
Kaspersky Lab is currently working on their own operating system from scratch, which includes the ability to help monitor business and government servers, further protecting them from government malware attacks. Government malware include Stuxnet, Flame, Duqu, Gauss, etc.
The whole point of the OS is to protect the various complex industrial systems we see today, especially in government facilities, corporations, and other industrial sectors.
Many government agencies are in fear that their systems/servers are still compromised, and without a good operating system, these systems/servers may still be at risk. Meanwhile, some companies/government facilities are overwhelmed with the idea of having to update their programs, keep patches up-to-date, etc., and also keeping the system continually running. Therefore, a secure operating system is a good plan to be in the works.
Kaspersky Lab held the operating system as a secret for quite a while, but now will be releasing information and updates: “Quite a few rumors about this project have appeared already on the Internet, so I guess it’s time to lift the curtain (a little) on our secret project and let you know (a bit) about what’s really going on,” Eugene Kaspersky, CEO of Kaspersky Lab, said in a blog post.
Apparently, the protocols SCADA (Supervisory Control and Data Acquisition) and PLCs (Programmable Logic Controllers) don’t require authentication to access them, which present a huge security risk. With that in mind, the secure OS will work on making that more of a secure approach.
With these new ideas into a secure OS, it will pave the way for a greater security realm in the industrial, corporate, governmental sectors, etc.
Tags: China, Duqu, Eugene Kaspersky, Flame, Gauss, Government agency, Government malware, Industrial control system, Industrial sector, Iran, Japan, Kaspersky Lab, Operating system, Programmable logic controller, Russia, SCADA, Servers, Stuxnet, Supervisory Control and Data Acquisition, United States, Vulnerabilities, Vulnerability Control System
About Dr Jay
MarketerRecent Posts
Topics
Popular Tags
Editor’s Twitter
Error: Twitter did not respond. Please wait a few minutes and refresh this page.
Blogroll
- SANS Internet Storm Center
- AVG Blogs
- Wired ThreatLevel Blog
- Dynamoo's Blog
- Kafeine's Malware Don't Need Coffee
- Lavasoft Security Blog
- mxlab Blog
- Contagio Malware Dump
- FireEye Blog
- Security Battlefield with George Kurtz
- Google Online Security Blog
- Bill Mullins Weblog
- GFI Labs Blog
- TaoSecurity Blog
- SWW Blog
- Securosis Blog
- S!Ri.URZ Blog
- Damballa Press Center
- SANS Securing The Human Blog
- ThreatPost
- avast! blog
- Bart Blaze's Security Blog
- Stop Badware Blog
- Xylitol's Xylibox Blog
- evilfantasy's Blog
- Web of Trust Blog
- Unmask Parasites
- Lookout Mobile Security Blog
- Crowdstrike Blog
- Arbor Networks
- Delete Malware
- F-Secure Weblog
- SecureList Blog by Kaspersky
- Websense Security Labs Blog
- MSNBC Red Tape Blog
- SecuraGeek Forums
- RKHunter Sec/Mal Blog
- hpHosts Blog
- Malwarebytes Unpacked
- Krebs on Security
- TrendLabs Malware Blog
- DSL Reports Sec. Forum
- Dejan Kosutic's ISO 27001/22301 Standards
- Symantec Security Response Weblogs
- Fortinet FortiBlog
- McAfee Labs Blog
- Naked Security
- Skidlist
- Tigzy's RogueKiller Blog
- Bleeping Computer Virus, Spyware, & Malware Removal Guides