Kaspersky Lab Developing Its Own Operating System? We Confirm the Rumors, and End the Speculation!

Hi all!

Today I’d like to talk about the future. About a not-so-glamorous future of mass cyber-attacks on things like nuclear power stations, energy supply and transportation control facilities, financial and telecommunications systems, and all the other installations deemed “critically important”. Or you could think back to Die Hard 4 – where an attack on infrastructure plunged pretty much the whole country into chaos.

Alas, John McClane isn’t around to solve the problem of vulnerable industrial systems, and even if he were – his usual methods of choice wouldn’t work. So it comes down to KL to save the world, naturally! We’re developing a secure operating system for protecting key information systems (industrial control systems (ICS)) used in industry/infrastructure. Quite a few rumors about this project have appeared already on the Internet, so I guess it’s time to lift the curtain (a little) on our secret project and let you know (a bit) about what’s really going on.

But first – a little bit of background about vulnerable industrial systems, and why the world really needs this new and completely different approach of ours.

The Defenselessness of Industrial Systems

Though industrial IT systems and, say, typical office computer networks might seem similar in many ways, they are actually completely different beasts – mostly in terms of their priorities between security and usability. In your average company, one of the most important things is confidentiality of data, and IT administrators are encouraged to isolate infected systems from non-infected systems to that end, among others. Thus, for example, if on the corporate file server a Trojan is detected, the simplest thing to do is disconnect the infected system from the network and then later start to tackle the problem.

In industrial systems that can’t be done, since here the highest priority for them is maintaining constant operation come hell or high water. Uninterrupted continuity of production is of paramount importance at any industrial object in the world; security is relegated to second place.

Another challenge to securing an “always on” environment arises due to software at an industrial/infrastructural installation only being updated after a thorough check for fault-tolerance – so as to make sure not to interrupt the working processes. And because such a check requires loads of effort (yet still doesn’t provide a guarantee of non-failure) many companies often simply don’t bother to update ICS at all – leaving it unchanged for decades. Updating software might even be expressly forbidden by an industrial/infrastructural organization’s safety policy. Just recently I read a nice piece about this, which listed 11 ICS security rules; rule #1 is “Do not touch. Ever.” What more of an illustration do you need?!

Still, even if the possibility to update software and patch up “holes” does exist, this doesn’t always help much. Manufacturers of specialized software aren’t interested in constant source code analysis and patching holes. As experience has shown, corners (costs) are normally cut on this kind of activity, and patches are released only if a certain exploit has been found and put on the Internet. In fairness, this is true for common, garden variety software, not just specialized software; still, today we’re talking about specifically industrial software.

The problem consists in the following: the vulnerability of control software, programmed controllers, and industrial communication networks leads to operators of industrial/ infrastructural systems not actually having the ability to receive reliable information about the systems’ total operation!Theoretically a situation is possible where, let’s say, a system for distributing electricity is attacked, as a result of which somewhere at a distant installation the other side of the country a breakdown occurs. But the control center doesn’t know anything about it: the attackers have sent to its computers false data.

Examples

You don’t need to look far to find examples of this actually happening in real life. The first method used – an example of cyber-sabotage at its potentially most dangerous – was in a direct attack on SCADA systems as far back as the year 2000 in Australia. An employee of a third-party contractor who was working on the control systems of Maroochy Shire Council carried out 46 (!) attacks on its control system, which caused the pumps to stop working or work not as they should have. No one could understand what was happening, since the communication channels inside the system had been breached and the information traveling along them distorted. Only after months did companies and the authorities manage to work out what had happened. It turned out that the worker really wanted to get a job at the sewage firm, was rejected, and so decided to flood a huge area of Queensland with sewage!

There are plenty of other such examples; they’re just not reported in the media. After all, victim companies are generally not too keen on letting the whole world know their systems have been compromised. (Public interest issues abound, but I’ll save those for another day and another post…) And in many incidents even the victims themselves don’t know they’ve been attacked. Not long ago a hole was found in RuggedCom industrial routers that permitted any average user to simply increase his/her access rights up to administrator level and gain control over the device. By who, when, how, and where else the hole could have been exploited can only be guessed at. Plus how many similar holes exist and are possibly being exploited in secret – we can only guess at.

For a bit of personal-development I recommend reading about attacks on ICS that succeeded in fulfilling their missions – here, here and here.

So who else – apart from blackmailers, disgruntled job applicants, etc. – might get access to the source code of ICS software, controllers, operating systems and the like? Of course there are the respective government and industry authorities – namely those with a department that certifies software for critically important systems. But in recent years there have been departments created for developing cyber-weapons used for attacking opponents’ systems, whomever they may be – perhaps commercial competitors, but more likely other countries in general.

I mean things like Stuxnet and the subsequent Duqu, Flame and Gauss – malware so vastly complex that it’s clear it was developed with the support of nation states. And it doesn’t really matter who’s being targeted at present; what matters is that such cyber-weapons are being developed and deployed at all. And once Pandora’s Box is open, there’s no way of getting it closed again. The building up of armaments for attacks on the industrial systems and infrastructure of enemies sooner or later will affect us all. So it turns out that the biggest threat to the planet today comes not from the regular cyber-riff-raff, and not even from organized cyber-criminals, but from nation state-backed creators of cyber-weapons.

Protection Today: Alas, Not Effective

At the same time as arming themselves, both infrastructure companies and various government authorities aren’t forgetting about protection. Indeed, they started protecting themselves long ago. But how do they actually go about it?

There are really just two methods. The first – isolating critically important objects: disconnecting them from the Internet, or physical isolation from the outside world in some other way. However, as experience has shown, if a technician during the night shift wants to watch films from an infected USB stick on the control computer – nothing’s going to stop him (we have working methods for blocking such activity, but I won’t go into that here).

Second – keeping secrets. Collective and large-scale attempts to keep secret everything and anything. Developers of ICS keep the source code secret, owners of factories and infrastructure place a “SECRET” stamp on the schematics of information and control systems, the types of used software are kept secret, and so on. However, at the same time, information about vulnerabilities in, for example, the majority of popular SCADA systems, is freely available on the Internet. And if we dig deeper we find that for several years already the SHODAN search engine has been up and running – designed for, among other things, seeking out vulnerable industrial systems (including SCADA), whose owners decide to connect them to – or forgot to disconnect them from – the Internet.

In parallel, specialists at industrial/infrastructure organizations also apply traditional methods of protection of vulnerable software and operating systems through control over program behavior and also over actions of users. But a 100% guarantee of protection can’t be provided, again because of vulnerability-by-default in the software doing the controlling. But for critical infrastructure a guarantee is what is needed most of all.

Protection as It Should Be

Ideally, all ICS software would need to be rewritten, incorporating all the security technologies available and taking into account the new realities of cyber-attacks. Alas, such a colossal effort coupled with the huge investments that would be required in testing and fine-tuning would still not guarantee sufficiently stable operation of systems.

But there is fully realizable alternative: a secure operating system, one onto which ICS can be installed, and which could be built into the existing infrastructure – controlling “healthy” existing systems and guaranteeing the receipt of reliable data reports on the systems’ operation.

First I’ll answer the most obvious question: how will it be possible for KL to create a secure OS if no one at Microsoft, Apple, or the open source community has been able to fully secure their respective operating systems? It’s all quite simple really.

First: our system is highly tailored, developed for solving a specific narrow task, and not intended for playing Half-Life on, editing your vacation videos, or blathering on social media. Second: we’re working on methods of writing software which by design won’t be able to carry out any behind-the-scenes, undeclared activity. This is the important bit: the impossibility of executing third-party code, or of breaking into the system or running unauthorized applications on our OS; and this is both provable and testable.

More details about the system, its requirements and background to its development you can read here.

In closing, in anticipation of the multitude of questions from colleagues, partners, media and simply curious folks, a few basics: the development is a truly secure environment. It’s a sophisticated project, and almost impracticable without active interaction with ICS operators and vendors. We can’t reveal many details of the project now because of the confidentiality of such cooperation. And we don’t want to talk about some stuff so competitors won’t jump on our ideas and nick the know-how. And then there are some details that will remain for certain customers’ eyes only forever, to ward off cyber-terrorist abuses. But as soon as any possibilities do appear, we’ll tell you all we can about the project in more detail.

Till next time!

193 Responses to “Kaspersky Lab Developing Its Own Operating System? We Confirm the Rumors, and End the Speculation!”

  1. Well played, the panic inducing reference to disaster movies at the beginning. Politicains like that – Still, you fail to answer the obvious question: why starting from scratch (oh so many have tried and most of them failed!) rather than throwing the force behind hardening some existing OS instead? So excuse me but I’m rather unimpressed.

    • There are multiple companies such as Greenhills and Wind River that have been doing this for more than ten years. They have products that can be used as a secure OS and/or a secure hypervisor. The products exist today, have military (DO-178B) and security (NSA) certifications. A new company starting from scratch, learning all the hard lessons again, Yawn….

    • The new operating system should use the Russian word for “body guiard” as the name of it. This OS should take the customer out into the cloud and in the background do all malware and antivirus work (in the background) and no be some app. It should be the body guard.

  2. Love it! But from a business point of view, would not this force the companies to “TRUST” the K-OS (M$ has already done that and everyone knows the results)? I dont deny the credibility of K-Labs. But thinking on this, the businesses would be “forced” to persue the K-services. The freedom of choice exists but it might cost them a fortune to migrate( incase the companies choose to). Moreover the idea of flame/stux like highly sophisticated wepaons residing inside the os might discourage the popularity. Nonetheless, any new os is always exciting. Waiting anxiously for more details!

  3. Interesting idea, but looks like embedded OS with minimal compatibility, at the same time, alot of software needs dependencies and frameworks to run, and those usually have the “holes”, but good luck on that one!

  4. Gud News…Maybe…start of Industrial Attack

  5. Dear Eugene,

    that’s good news, and of course I’m curious about the details.

    Do you also consider techniques employed in KeyKOS , its successor EROS-OS and its respective successor KapROS ? All limit the transitivity of trust by means of their capability based design.

    I question, however, two of the statements quoted from you linked to:
    “* The operating system can’t be based on existing computer code; therefore, it must be written from scratch.
    * To achieve a guarantee of security it must contain no mistakes or vulnerabilities whatsoever in the kernel, which controls the rest of the modules of the system. As a result, the core must be 100% verified as not permitting vulnerabilities or dual-purpose code.”

    The first point might work given you have that much resources – but still getting it work reliably and securely will cost a fortune even if it’s only a microkernel we are talking about.

    More fundamentally, I consider the second point almost impossible. There are only a few ways out:
    1. Using a limited language that allows for mathematical proofs of the code.
    2. Building in fences that try to contain the faults built inside the code from spreading. So try to even let faulty code not become visible by means of failures. This is a principle described with reliability in mind in Robert S. Hanmers book.

    Yours,
    Pia

  6. Does this mean..I get a Kaspersky Anti-Virus..Tank?Yippeee

  7. Reblogged this on Marinchek-Marn and commented:
    I Just Love My…Kaspersky Lab..Anti-Virus

  8. I really like the sound of that, sounds like a very cool deal to me man!

    http://www.at-privacy.tk

  9. Indeed starting from scratch needs a very good excuse. Ever considered building upon a secure and formally-verified-to-be-bug-free OS kernel like that of seL4? At least take a look and learn a bunch from what people have already been up to: http://www.sigops.org/sosp/sosp09/papers/klein-sosp09.pdf

  10. interresting, can’t wait to see how it shapes out !!

  11. And you’re writing a secure OS in C/C++. What could possibly go wrong.

  12. QueueDSR, QueueASR, QueueUserASR, nice. So how much inspiration did you take from Windows?

  13. Reblogged this on hackafrica.

  14. Reblogged this on thewordpressghost and commented:
    Everyone,

    I know you have already read this some where else in the news.

    OK, you and I know you haven’t, because the news is not very great anymore.

    Kaspersky committed to building a secure OS from scratch.

    One of the best anti-virus companies is taking it to the next level. I think that this is great news?

    What do you think?

    Ghost.

  15. Secure OS is great. But still it is running on a hardware which is not secure. So, Complement this effort, need to make sure that OS is executed in plaforms supported with Hardware Security Module.

  16. hate to go off topic but that font in the blue background kicks ass.what is it’s name?

  17. We all live in Cyber war EK has the plan to protect U 6. ; to every one reading this will be in steps to protect your wallet U identify issues Kaspersky institute runs to clean the threats & people it never ends so the War on hackers & rogue Governments. Protection
    Is 24 /7 issue folks.

  18. Uhh, has he never heard of OpenBSD? Those guys are security nuts.

  19. Noble effort, perhaps, but where does this flawless secure OS reside? Does it replace proprietary software managing the scan cycle on the PLC’s or Unix on data historians or Windows on all the engineering work stations, PC-based HMI’s and monitoring and management systems, or onsupport workstations? What about control servers and routers and RTU’s on the SCADA network? And…

    There is neither a single hardware platform nor a common OS in the complex, custom-tailored world of ICS software. I’m skeptical that this approach can work even if the OS can be built. And this is to say nothing of the enormous diversity of the marketing target, where every plant and factory is a one-off, custom-designed, hand-configured installation. This is not the desktop world–not even close.

    What is right about this approach is the recognition that the vulnerabilities in ICS’s are built into the very structure of how the systems are designed and built, from the PLC hardware modules to the ladder logic in the control application, all the way to the HMI. The problems will not be made to go away by a patchwork of partial solutions, by fresh layers of signature-based and behavioral barricades or ad hoc plugs filling up holes that should not have been there in the first place.

    As I said at EST 2012 in Lisbon, these problems are architectural and will require architectural solutions. Whether a new OS will help much remains to be seen, but I certainly wish my colleagues at KL good luck in their pursuit.

    –Prof. Larry Constantine (Lior Samson)

    • Dear Larry,

      > The problems will not be made to go away by a patchwork
      > of partial solutions, by fresh layers of signature-based
      > and behavioral barricades or ad hoc plugs filling up holes
      > that should not have been there in the first place.

      I agree with you. What I have meant with “fences” has been limited to a certain context: If a fault already became visible in terms of a failure, in my opinion you have to change the code to fix the fault and change the process (e.g. improve education) to fix the error to help preventing the same fault happening again. Building in fences instead only adds to the complexity, and the fences or barriers probably add their own faults to the overall system. The situation I meant, however, was the case that you do not know the faults yet, but must assume that there are faults simply because human beings are limited. Too much self-confidence or testosterone is dangerous – therefore one should contain the faults one does not know about yet. Or – as others and I have said – use mathematically provable programming languages.

      Yours,
      Pia

      • I think we are in agreement about the need for proactive rather than merely reactive approaches to industrial security. In this theater, the conventional route of responding after vulnerabilities are discovered as zero-day exploits could mean first waiting for a major portion of some power grid be taken down or a chemical plant to be reduced to rubble and then figuring out how it could/should have been prevented.

        I was talking with ICS security expert Ralph Langner yesterday. We agreed that the biggest barriers to enhancing industrial cyber-security are not so much technical–formidable though those may be–as financial. In the absence of government mandates there are no economic incentives for operators to improve ICS security. The large investment has no near-term payoff; it is costly and it complicates already complex systems. Until the industrial equivalent of the Twin Towers, we are not likely to see great strides forward in terms of protecting critical infrastructure from cyber-attacks. Even then, it would not be too surprising if most of the effort went into initiatives analogous to airport security–showplace charades more about public reassurance.through the illusion of security than about the reality.

        –Prof. Larry Constantine

  20. A secure OS written in C is doomed to fail. You need to enrich the language and the runtime to provide automatic bounds checking and also prevent the programmer from allocating/deallocating memory manually. And this is just the start.

    (of course the memory manager still need to have unbounded access to memory. but it should be the only part of the system with this much privilege).

    Using this approach will allow you to run code safely on architecture without an MMU, because you move the problem into the compiler: thus if you can prove your compiler creates safe code (ie. there is no escaping bounds checking) then you win, and you don’t have to prove the whole code base. However I’m not touching here the reliability issue, ie. what to do when code crashes.

  21. I see they didn’t hear and read about Qubes OS.

  22. Any chance we could see a future kaspersky browser just like comodo dragon?

  23. Disconnect the systems from the internet and remove all USB ports etc. Done.

  24. I think the admin of this web site is in fact working hard
    in favor of his site, for the reason that here every material is quality
    based stuff.

  25. These are actually fantastic ideas in on the topic of blogging.
    You have touched some nice factors here. Any way keep up wrinting.

  26. I visited many web pages except the audio quality for audio
    songs current at this website is really wonderful.

  27. Industrial systems are indeed vulnerable. Consider, however, that the biggest reason for the vulnerability is that production systems are being connected via networks to business systems. Most industrial controls people would rather just disconnect the production systems from the Intranet, but the business people recognize the monetary benefit of knowing the state and abilities of the production systems. These business benefits far outweigh the technical and security aspects supposedly coming from the insecurities of production staff.
    Boeing took a different approach through The Open Group to secure the industrial control systems. It is a network control system that cryptographically identifies all the people and systems of the production system and also cryptographically separates the industrial systems from the business systems. The Open Group published a technical study in 2004 called the Secure Mobile Architecture (SMA). Get a free pdf at https://www2.opengroup.org/ogsys/catalog/E041. It is based on the Host Identity Protocol (HIP) from the IETF (RFC4423). SMA was developed and implemented on the Boeing 777 production line in 2007 to support the mobile crawlers and in 2010 was extended to the other production systems. The SMA system includes using HIP protocols over existing TCP/IP Intranets and the Internet, a secure Metadata Access Point server from the Trusted Computing Group (IF-MAP) that uses publish-subscribe to distribute information, and a policy engine based on COPS over TLS. Devices called SMA Endboxes are available from Asguard (http://www.asguardnetworks.com/) and Tofino (http://www.tofinosecurity.com/) and the software for SMA-Enabled End Devices (SEEDs) is available from http://www.openhip.org.

    SMA/HIP is not a new operating system, but it uses the Linux kernel as the basis for the OS on the Endbox. Our experience is that bare bones Linux is adequate for an OS to run the network-based SMA security mechanisms. You may be right that any OS not designed for industrial control systems security will be inadequate, but there are more vulnerabilities than the OS. In my opinion, the network is more vulnerable than the OS at the present time.

    There are two books written on the subject, the Andrei Gurtov book entitled Host Identity Protocol (HIP): Towards the Secure Mobile Internet and the Richard Paine book entitled Beyond HIP: The End to Hacking As We Know It, 2009. They are both available through Amazon.

    An updated SMA architecture document is in final review in The Open Group which will be available early in 2013 for review.

Trackbacks/Pingbacks

  1. Η Kaspersky Lab επιβεβαιώνει της φήμες ότι αναπτύσει δικό της λειτουργικό σύστημα - October 16, 2012

    […] της λειτουργικό σύστημα, σύμφωνα με δημοσίευμα του Eugene Kaspersky στο blog του. Και περιληπτικά λέει τα […]

  2. Eugene Kaspersky Unveils Plans for New Secure SCADA OS | SICK Sensor Vietnam - SICK Vietnam - SICK Việt Nam - SICK Sensor Việt Nam-AUMI-Đại diện SICK Sensor Việt Nam - October 16, 2012

    […] things still need to be done. Will keep you posted.More information on the project is available on Eugene Kaspersky's personal blog.  Commenting on this Article will be automatically closed on January 16, […]

  3. Η Kaspersky Lab επιβεβαιώνει τις φήμες ότι αναπτύσει δικό της λειτουργικό σύστημα | ITComputerRoom - October 16, 2012

    […] της λειτουργικό σύστημα, σύμφωνα με δημοσίευμα του Eugene Kaspersky στο blog του. Και περιληπτικά λέει τα […]

  4. Kaspersky Lab revelou planos para lançar seu próprio sistema operacional (muito mais seguro) | Limbotech - October 16, 2012

    […] Após rumores, Eugene Kaspersky, um programador russo e co-fundador da Kaspersky Lab, confirmou que a empresa de segurança está trabalhando no desenvolvimento de um Sistema de Controle […]

  5. Kaspersky builds its own antimalware OS — but not for you | WestPenn Journal - October 16, 2012

    […] blog posted today, company CEO Eugene Kaspersky confirmed the rumors of a new OS, describing the background behind the effort and hinting at the development […]

  6. Curator » Kaspersky builds its own antimalware OS — but not for you - October 16, 2012

    […] blog posted today, company CEO Eugene Kaspersky confirmed the rumors of a new OS, describing the background behind the effort and hinting at the development […]

  7. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | allcom.se - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  8. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | The Worlds Tech Blog - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email this | <a […]

  9. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare ← techtings - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  10. Kaspersky trabaja en un sistema operativo seguro para aplicaciones industriales - October 16, 2012

    […] de negocio. Aunque era algo que se rumoreaba, el mismísimo Eugene Kaspersky se ha encargado de confirmarlo en su blog: Kaspersky está desarrollando un sistema operativo seguro para su uso en aplicaciones […]

  11. Rumor: Kaspersky está criando seu próprio O.S | DayvsonTI - October 16, 2012

    […] Segundo Eugene Kaspersky o projeto do O.S é um esforço para tornar os sistemas industriais  mais seguros. […]

  12. Kaspersky trabaja en un sistema operativo seguro para aplicaciones industriales | El Tenanpa - October 16, 2012

    […] de negocio. Aunque era algo que se rumoreaba, el mismísimo Eugene Kaspersky se ha encargado de confirmarlo en su blog: Kaspersky está desarrollando un sistema operativo seguro para su uso en aplicaciones […]

  13. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | Appyummy - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  14. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | | - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  15. Rob’s Radar 10/16 | Robert Croak - October 16, 2012

    […] Kaspersky Lab Developing Its Own Operating System? We Confirm the Rumors, and End the Speculation! Today I’d like to talk about the future. About a not-so-glamorous future of mass cyber-attacks on things like nuclear power stations, energy supply and transportation control facilities, financial and telecommunications systems, and all the other installations deemed “critically important”. Or you could think back to Die Hard 4 – where an attack on infrastructure plunged pretty much the whole country into chaos. http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  16. Kaspersky trabaja en un sistema operativo seguro para aplicaciones industriales - La Isla Buscada Noticias - October 16, 2012

    […] de negocio. Aunque era algo que se rumoreaba, el mismísimo Eugene Kaspersky se ha encargado de confirmarlo en su blog: Kaspersky está desarrollando un sistema operativo seguro para su uso en aplicaciones […]

  17. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | Project Konnect - October 16, 2012

    […] The Next Web | Eugene Kaspersky, Securelist | Email this | […]

  18. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare : Lenned - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  19. ¿Está Kaspersky Lab desarollando su propio sistema operativo? - October 16, 2012

    […] más: Nota Bene (Blog de Eugene Kaspersky) Kaspersky Lab, sistema […]

  20. Kaspersky desarrolla nuevo Sistema Operativo - Marcianos - October 16, 2012

    […] de K Lab decidió levantar un poco el telón y revelar lo que están haciendo tras bambalinas. Kaspersky Lab Developing Its Own Operating System? We Confirm the Rumors, and End the Speculation!En esencia es un sistema altamente adaptado, desarrollado para resolver una tarea específica […]

  21. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | tekifeed.com – Gadget Feeds, Gadget News and more! - October 16, 2012

    […] Next Web Eugene Kaspersky, Securelist Email […]

  22. Kaspersky Labs trabaja en su propio sistema operativo como trinchera contra ciberataques industriales y nacionales ← Blog DesignMulticolor - October 16, 2012

    […] ocultas y a salvo de hackers alcahuetes, espías y terroristas. [Vía The Next Web]Read | Permalink | Email […]

  23. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | Eric Glasser - October 16, 2012

    […] Next Web  |  Eugene Kaspersky , Securelist  | Email this | Comments Share this: communication, cyber […]

  24. Kaspersky trabaja en un sistema operativo seguro para aplicaciones industriales | El Correo - October 16, 2012

    […] de negocio. Aunque era algo que se rumoreaba, el mismísimo Eugene Kaspersky se ha encargado de confirmarlo en su blog: Kaspersky está desarrollando un sistema operativo seguro para su uso en aplicaciones […]

  25. Industrieanlagen: Kaspersky will SCADA-Systeme sicher machen | Edv-Sicherheitskonzepte.de – News Blog aus vielen Bereichen - October 16, 2012

    […] soll, will der AV-Hersteller trotzdem nicht preisgeben. Stattdessen ergeht sich die epische Ankündigung und die angebliche Beschreibung in sehr allgemeinen Aufzählungen von Problemen und […]

  26. Kaspersky desenvolve sistema operacional - October 16, 2012

    […] desenvolvendo um sistema operacional próprio. Segundo Eugene Kaspersky, fundador da empresa, em seu blog oficial, a empresa visa em desenvolver a plataforma mais segura do […]

  27. News › Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare - October 16, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  28. ste williams » Kaspersky Lab to create new OS ‘to save the world’ - October 17, 2012

    […] systems, and even if he were – his usual methods of choice wouldn’t work,” Kaspersky writes. “So it comes down to KL to save the world, […]

  29. Acabou o mistério. Fãs de Kaspersky podem comemorar! | Sem Bugs - October 17, 2012

    […] Kaspersky, fundador da empresa, anunciou hoje em seu blog oficial que Kaspersky está desenvolvendo seu próprio sistema operacional. Ela que sempre foi super […]

  30. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | SP1RACY - All things tech & more - October 17, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email this | Comments Engadget sp1racy is the creator of […]

  31. Kaspersky Lab to create new OS ‘to save the world’ | Brad Dickinson - October 17, 2012

    […] systems, and even if he were – his usual methods of choice wouldn’t work,” Kaspersky writes. “So it comes down to KL to save the world, […]

  32. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare - October 17, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  33. An Operating System for the Cyber War Era - Tech Talk | Tech Talk - October 17, 2012

    […] company Kaspersky, which has led discovery and analysis of state-backed malware such as Stuxnet, wrote in a blog post today that the project was needed to protect “defenseless” industrial control software. […]

  34. » Blog Archive » Kaspersky desenvolve sistema operacional - October 17, 2012

    […] desenvolvendo um sistema operacional próprio. Segundo Eugene Kaspersky, fundador da empresa, em seu blog oficial, a empresa visa em desenvolver a plataforma mais segura do […]

  35. Kaspersky vai criar seu próprio sistema operacional super seguro voltado para empresas | Micro Ploft - October 17, 2012

    […] de fábricas e empresas de setores estratégicos, como energia e comunicações. Pensando isso, a Kaspersky Labs está desenvolvendo seu próprio sistema operacional para prover mais uma camada de proteção contra grandes exploradores, funcionários descontentes e […]

  36. Kaspersky trabaja en un sistema operativo seguro para aplicaciones industriales « BlackBerry Warez | Blog - October 17, 2012

    […] de negocio. Aunque era algo que se rumoreaba, el mismísimo Eugene Kaspersky se ha encargado de confirmarlo en su blog: Kaspersky está desarrollando un sistema operativo seguro para su uso en aplicaciones […]

  37. Kaspersky desenvolve sistema operacional | Geekedy - October 17, 2012

    […] desenvolvendo um sistema operacional próprio. Segundo Eugene Kaspersky, fundador da empresa, em seu blog oficial, a empresa visa em desenvolver a plataforma mais segura do […]

  38. Kaspersky works in a secure operating system for industrial applications | Tech Crash - October 17, 2012

    […] line. Although it was something that was rumored, Eugene Kaspersky himself was responsible for confirmation on his blog : Kaspersky is developing a secure operating system for use in industrial […]

  39. Kaspersky Labs builds new OS to combat Stuxnet, major exploits | Technology News - October 17, 2012

    […] It won’t be an operating system like Windows or Mac, but will work as an “additional security layer” that runs on top of an original OS — monitoring healthy systems and isolating threats including malware. Eugene Kapersky writes: […]

  40. .:[ d4 n3wS ]:. » Kaspersky OS - October 17, 2012

    […] le blog d’Eugene Kaspersky. kaspersky, operating system, stuxnet Address: […]

  41. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | Techno Gadget Feed - October 17, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  42. Kaspersky Lab Developing Its Own Operating System | Robert Accettura's Fun With Wordage - October 17, 2012

    […] Lab, of AntiVirus fame is apparently developing its own operating system: We’re developing a secure operating system for protecting key information systems (industrial […]

  43. Kaspersky reveals plans to launch their own operating system, claims it will be more secure than Apple or Microsoft | 1v8 NET - October 17, 2012

    […] seems that Kaspersky is not content with merely creating security-based software. Nope, according to Eugene Kaspersky, it looks like the company has their sights on creating an operating system of […]

  44. 스턱스넷을 막아라…카스퍼스키, 독자 OS 개발 추진 | Tech IT! | All about IT Trend - October 17, 2012

    […] 스턱스넷을 막아라…카스퍼스키, 독자 OS 개발 추진   By delight/기쁘미 2012년 10월 17일    No Comment TAGGED : 보안, 카스퍼스키 Tweet안티바이러스 소프트웨어 업체인 러시아의 카스퍼스키가 독자적인 운영체제(OS)를 개발하겠다고 밝혀 주목된다. […]

  45. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | eMagility :: defining mobile agility - October 17, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email this | Comments Share […]

  46. perantiNET Kaspersky Lab sedang kembangkan sistem operasi baru » perantiNET - October 17, 2012

    […] Kaspersky memberikan dua alasan bahwa usaha perusahaanya lebih baik daripada yang lainnya. “Pertama: sistem kami sangat disesuaikan, dikembangkan untuk memecahkan tugas yang spesifik, dapat mengedit video liburan, atau blathering pada media sosial,” tulis Kaspersky dalam laman resmi. […]

  47. Archiwum Dane firm na celowniku miniFlame. Skuteczną ochronę zapewni dopiero Kaspersky OS? - October 17, 2012

    […] je wszystkimi stosowanymi współcześnie technologiami. Wychodząc naprzeciw potrzebom, eksperci podjęli decyzję, że stworzą swój system operacyjny, który będzie „nadbudową” dla obecnych rozwiązań. Ma […]

  48. Anonymous - October 17, 2012

    […] […]

  49. Kaspersky entwickelt eigenes Betriebssystem | ZDNet.de - October 17, 2012

    […] an einem eigenen sicheren Betriebssystem. CEO Eugene Kaspersky hat entsprechende Gerüchte in einem Blogeintrag bestätigt. Das OS soll allerdings in erster Linie auf Industriesystemen zum Einsatz kommen und […]

  50. » Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare Gamez Menu - October 17, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  51. Kaspersky Lab developing secure OS for industrial control systems | LIVE HACKING - October 17, 2012

    […] post for Kaspersky Lab, Eugene Kaspersky has confirmed that the security company is working on a new, secure operating system on top of which  industrial control systems (ICS) can be installed. The aim is to provide a secure environment that incorporate all the latest security technologies […]

  52. Kaspersky arbeitet an eigenem Betriebssystem |silicon.de - October 17, 2012

    […] Das Betriebssystem soll in erster Linie auf Industriesystemen zum Einsatz kommen und nicht für normale Heim-PCs genutzt werden, schreibt Kaspersky in einem Blogeintrag. […]

  53. Kaspersky Lab plantea su propio sistema operativo de alta seguridad « Francisco Unica - October 17, 2012

    […] | Kaspersky Lab Más información | Informe […]

  54. Kaspersky Lab plantea su propio sistema operativo de alta seguridad : CarWarez - October 17, 2012

    […] | Kaspersky Lab Más información | Informe […]

  55. Kaspersky développe son OS sécurisé | Korben - October 17, 2012

    […] c’est pas con comme idée… Eugene Kaspersky, le papa de l’antivirus du même nom, a annoncé que sa société était en train de concevoir un système d’exploitation conçu spécialement […]

  56. Kaspersky Lab arbeitet an einem sicheren Betriebssystem für Industrieanlagen | IT-News - October 17, 2012

    […] Mehr Details zur Sicht von Kaspersky Lab auf Industrial Control Systems in der Industrie und die grundlegenden Erfordernisse zu einem sicheren Betriebssystem finden sich im Blog-Beitrag von Eugene Kaspersky: http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  57. 1081009 | Kaspersky ประกาศทำระบบปฏิบัติการ ช่วยป้องกันซอฟต์แวร์ภาคอุตสาหกรรม | ร้อยแปดพันเก้า.com 1081009 - October 17, 2012

    […] ที่มา – Eugene Kaspersky’s Blog […]

  58. Kaspersky Lab plantea su propio sistema operativo de alta seguridad - October 17, 2012

    […] | Kaspersky Lab Más información | Informe […]

  59. Kaspersky Lab is building ‘unhackable’ OS for industrial control systems | COLLABGENIES - October 17, 2012

    […] Kaspersky, co-founder of Russian security company Kaspersky Lab announced on Tuesday that his company is building its own operating system specifically for industrial control systems for critical infrastructure such as nuclear power and […]

  60. Kaspersky kritik bilgi sistemlerini korumak adına işletim sistemi geliştiriyor - October 17, 2012

    […] >> Kaspersky Etiketler: altyapı, bilgisayar korsanlığı, enerji, eugene kaspersky, Güvenlik, iletişim, […]

  61. Kaspersky lanzará un sistema operativo con seguridad reforzada - October 17, 2012

    […] estáis interesados en este tema os recomendamos leer el informe completo, así como la explicación de Eugene […]

  62. [Kurzinfo] Kaspersky entwickelt eigenes Betriebssystem…für die Industrie | Beatmasters WinLite Blog - October 17, 2012

    […] mal den ausführlichen Blogeintrag lesen, welcher auch Hintergrundinformationen dazu liefert. [Quelle] /* jQuery(document).ready(function($){ var shpOptions = […]

  63. Kaspersky lanzará un sistema operativo : TuSoft - October 17, 2012

    […] Si estáis interesados en este tema os recomendamos leer el informe completo, así como la explicación de Eugene Kaspersky. […]

  64. 30310012 - Kaspersky Labs builds new OS to combat Stuxnet, major exploits - October 17, 2012

    […] top of an original OS — monitoring healthy systems and isolating threats including malware. Eugene Kapersky writes: “Our system is highly tailored, developed for solving a specific narrow task, and not […]

  65. » Blog Archive » Kaspersky Lab plantea su propio sistema operativo de alta seguridad - October 17, 2012

    […] | Kaspersky Lab Más información | Informe compelto comments: 0 » « Microsoft confirma la […]

  66. Kaspersky Hopes to “Save The World” With New, Ultra-Secure OS | SiliconANGLE - October 17, 2012

    […] Kaspersky says in a blog post that the new OS will be designed to protect key information for the world’s most critical […]

  67. Anonymous - October 17, 2012

    […] interesados en este tema os recomendamos leer el informe completo, así como la explicación de Eugene […]

  68. Kaspersky Lab desarrollará su propio sistema operativo - October 17, 2012

    […] ese anuncio oficial no se dan demasiados detalles sobre ese sistema operativo seguro, sino que se ofrece una […]

  69. Kaspersky Lab está desarrollando un sistema operativo orientado a la industria | Gigle.net - October 17, 2012

    […] Kaspersy ha confirmado en su blog, los rumores que apuntaban que la compañía lleva tiempo trabajando en el desarrollo de un nuevo […]

  70. Kaspersky Lab vyvíjí vlastní operační systém | IT MooV.eu - October 17, 2012

    […] informací o připravovaném systému pro průmysl se dočtete na blogu Eugena Kasperskyho.Více na: […]

  71. Kaspersky Lab Is Working On A Super Secure OS | The Tech Journal - October 17, 2012

    […] Source: Kaspersky […]

  72. Today’s Links October 17, 2012 - October 17, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  73. Kaspersky Kendi İşletim Sistemini Geliştiriyor | Webesen.com - October 17, 2012

    […] “Önemli bilgileri barındıran sistemleri (Endüstriyel Kontrol Sistemleri – EKS) korumak adına güvenli bir işletim sistemi geliştiriyoruz. Bu konuda daha önce internette birkaç dedikodu görmüştüm, sanırım şimdi gizli projemizi örten perdeyi biraz aralayıp, size neler yaptığımızı söylemenin zamanı geldi.” diyor Eugene Kaspersky şu blog gönderisinde. […]

  74. Kaspersky, un OS per salvare il mondo | infropy - information entropy - October 17, 2012

    […] di Internet dal 1996 (Leggi l’articolo originale…) Roma – Eugene Kaspersky ha annunciato ufficialmente la nuova iniziativa della omonima società di sicurezza da lui fondata, vale a dire […]

  75. Kaspersky vuole realizzare un sistema operativo ad alta sicurezza - October 17, 2012

    […] sofisticati come Stuxnet, Flame, Duqu and Gauss, il miliardario russo Eugene Kaspersky ha annunciato che la sua azienda di software antivirus omonima, sta sviluppando internamente un sistema […]

  76. Kaspersky Lab plantea su propio sistema operativo de alta seguridad | TecnoApps.net - October 17, 2012

    […] | Kaspersky LabMás información | Informe compelto Etiquetas: Industrial Control System, Kaspersky, sistemas […]

  77. Russian Anti-Virus Firm Plans Secure Operating System to Combat Stuxnet - Gadsit Buzz - October 17, 2012

    […] industrial/infrastructural environments whose produced data on processes could be fully trusted,” wrote company founder Eugene Kaspersky in a blog post. “And this left us with no other option than to begin developing something new […]

  78. Eugene Kaspersky: “La escalada en la ciberguerra es una llamada a la acción” | PCFORMAT MX - October 17, 2012

    […] En el blog publicado por Eugene Kaspersky: http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  79. Kaspersky prepara su propio sistema operativo - October 17, 2012

    […] clave “11.11″ lleva en desarrollo nada menos que 10 años, y aunque existían algunos rumores en Internet sobre su existencia esta es la primera confirmación oficial de que dicho proyecto está […]

  80. Kaspersky está desarrollando un sistema operativo 100% seguro para control industrial - October 18, 2012

    […] información: Kaspersky Temas: Kasperskyseguridad GA_googleFillSlot("visualbeta_robacont_336x280"); 0 Twittear […]

  81. Kaspersky développe son OS sécurisé - October 18, 2012

    […] c’est pas con comme idée… Eugene Kaspersky, le papa de l’antivirus du même nom, a annoncé que sa société était en train de concevoir un système d’exploitation conçu spécialement […]

  82. Kaspersky Lab está desenvolvendo um sistema operacional próprio - October 18, 2012

    […]  (Fonte da imagem: Reprodução/Nota Bene) […]

  83. カスペルスキー、産業用システム向けのセキュアなOSを開発へ[#cbajp] | CBA – Cloud News Japan - October 18, 2012

    […] Kaspersky Labの人々がセキュアな独自OSの開発を目指している。このOSはユーザーの普通の家庭用PCではなく、産業用システム上で動作する。同社の最高経営責任者(CEO)であるEugene Kaspersky氏は現地時間10月16日のブログ投稿の中で、新OSのうわさが事実であることを認めた。そして、その取り組みの背景を説明し、開発プロセスをそれとなく示した。 […]

  84. Russian Firm Works to Prevent ‘Die Hard’ Cyberattacks | SICK Sensor Vietnam - SICK Vietnam - SICK Việt Nam - SICK Sensor Việt Nam-AUMI-Đại diện SICK Sensor Việt Nam - October 18, 2012

    […] pretty much the whole country into chaos," wrote company co-founder and CEO Eugene Kaspersky on his personal blog yesterday (Oct. 16). "Alas, John McClane isn't around to solve the problem of vulnerable industrial […]

  85. Kaspersky Lab plantea su propio sistema operativo de alta seguridad | The Last Blog - October 18, 2012

    […] | Kaspersky Lab Más información | Informe […]

  86. Kaspersky Lab Developing Secure Operating System for SCADA | Media GeniusHackers - October 18, 2012

    […] engineers at Russian security firm Kaspersky Lab to create a secure-by-design OS for ICS. In an interview Kaspersky said ” It’s true no one else ever tried to make a secure operating system. This may […]

  87. The Secure Operating System Equation | SICK Sensor Vietnam - SICK Vietnam - SICK Việt Nam - SICK Sensor Việt Nam-AUMI-Đại diện SICK Sensor Việt Nam - October 18, 2012

    […] a secure operating system specifically for SCADA and industrial-control system environments. In a post on his own blog yesterday, he said the ideal way to secure these critical systems would entail rewriting all ICS […]

  88. Kaspersky Kembangkan OS untuk Lindungi Sistem Informasi Penting | Indonesian Geeks Portal - October 18, 2012

    […] [via Kaspersky] Posting Populer Hari Ini : […]

  89. Ciberguerra: una llamada a la acción - October 18, 2012

    […] En el blog publicado por Eugene Kaspersky: http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  90. Nuovo sistema operativo sicuro da Kaspersky | Multimedia | Digital.it - October 18, 2012

    […] tale sistema operativo erano emerse qualche giorno fa, ma l’arrivo di questa novità è stato confermato direttamente da Eugene Kaspersky, fondatore della società; egli ha deciso di alzare il sipario su […]

  91. Kaspersky Lab está desenvolvendo um sistema operacional próprio « Blog do Luiz Antonio Silva - October 18, 2012

    […] (Fonte da imagem: Reprodução/Nota Bene) […]

  92. Kaspersky Lab Developing Its Own Secure Operating System | The Techi News - Latest technology news websites, mobile technology news, technology news uk, Computing Technology News Gadget news - October 18, 2012

    […] his engineers at Russian security firm Kaspersky Lab to create a secure-by-design OS for ICS. In an interview Kaspersky said ” It’s true no one else ever tried to make a secure operating system. This may […]

  93. Kaspersky تكشف عن نظام تشغيل جديد آمن موجه للقطاع الصناعي يحد من الهجمات الأمنية | المجلة التقنية - October 18, 2012

    […] لأنظمة التحكم الصناعية الحساسة، يمكن الإطلاع على التدوينة التي نشرها Eugene Kaspersky على مدونته الخاصة. عزيزي الزائر، […]

  94. Kaspersky Lab announces a brand-new OS focused on security | CELL and COMPUTER - October 18, 2012

    […] used in industry/infrastructure,” wrote Eugene Kaspersky, chairman and CEO of Kaspersky Lab, in a blog post on […]

  95. Kaspersky développe son propre OS pour sécuriser les Scada | LeMagIT - October 18, 2012

    […] un billet de blog, Eugene Kaspersky, qui dirige la société de sécurité éponyme, a confirmé que son entreprise […]

  96. Kaspersky Lab announces a brand-new OS focused on security | Printing Service Ft Myers - October 18, 2012

    […] used in industry/infrastructure,” wrote Eugene Kaspersky, chairman and CEO of Kaspersky Lab, in a blog post on […]

  97. Kaspersky secure operating system in production « seCURE Connexion - October 18, 2012

    […] Kaspersky Lab held the operating system as a secret for quite a while, but now will be releasing information and updates: “Quite a few rumors about this project have appeared already on the Internet, so I guess it’s time to lift the curtain (a little) on our secret project and let you know (a bit) about what’s really going on,” Eugene Kaspersky, CEO of Kaspersky Lab, said in a blog post. […]

  98. Kaspersky Lab announces a brand-new OS focused on security | Tux Doc - October 18, 2012

    […] used in industry/infrastructure,” wrote Eugene Kaspersky, chairman and CEO of Kaspersky Lab, in a blog post on […]

  99. Kaspersky, kendi işletim sisteminin hazırlığı içinde | Teknoloji Portalı - October 19, 2012

    […] bu konu hakkında bilgilendirilmesi gerektiğini açıkladı. Eugene Kaspersky’nin kendi blogu üzerinden yaptığı açıklamada bu işletim sisteminin nükleer santraller, telekomünikasyon […]

  100. Kaspersky Lab Announces a Brand New OS Focused on Security - October 19, 2012

    […] in industry/infrastructure,” wrote Eugene Kaspersky, chairman and CEO of Kaspersky Lab, in a blog post on […]

  101. RedesWEB.com » Sistema operativo 11.11 de Kaspersky Lab - October 19, 2012

    […] Si quieren leer el articulo en el blog de Eugene, aquí les dejo el link http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  102. Kaspersky irá desenvolver SO seguro para controle industrial | Web Developer IT - October 19, 2012

    […] "Muito rumores sobre o projeto já apareceram na Internet, então eu acho que é hora de levantar uma ponta da cortina de nosso projeto secreto e deixar você saber (um pouco) sobre o que está realmente acontecendo", disse Kaspersky em um post de blog. […]

  103. 卡巴斯基实验室规划新操作系统 | S9Tech - October 19, 2012

    […]     on Wed 17th Oct 2012 23:48 UTC, submitted by poundsmackKaspersky is working on its own secure operating system for highly specialised tasks. “We’re developing a secure operating system for […]

  104. Kaspersky prépare un système d’exploitation hypersécurisé « Vincent ARSENE – Blog - October 19, 2012

    […] Kaspersky Labs a confirmé, dans une note de blog datant du 16 octobre 2012, qu’il est en train de développer un système d’exploitation […]

  105. [Software] K-OS: Antivirenexperte Kaspersky baut eigenes Betriebssystem | TechFieber | Smart Tech News. Hot Gadgets. - October 19, 2012

    […] [Link] Tweet […]

  106. Kaspersky تكشف عن نظام تشغيل جديد آمن موجه للقطاع الصناعي يحد من الهجمات الأمنية | شبكة أفدنـي إستفد وأفد غيرك - October 19, 2012

    […] لأنظمة التحكم الصناعية الحساسة، يمكن الإطلاع علىالتدوينة التي نشرها Eugene Kaspersky على مدونته الخاصة. شاركها […]

  107. Kaspersky, kendi işletim sisteminin hazırlığı içinde | Bedava İzle, Yükle, Download, Resim İndir - October 19, 2012

    […] bu konu hakkında bilgilendirilmesi gerektiğini açıkladı. Eugene Kaspersky’nin kendi blogu üzerinden yaptığı açıklamada bu işletim sisteminin nükleer santraller, telekomünikasyon […]

  108. IT Digest: Apple’s iPad Mini, Gmail Search, Surface by Microsoft and Much More | Zfort Group Blog - October 19, 2012

    […] Kaspersky Lab is under the development of its own secure operating system. The news came into light after a Russian news service reported the company is looking for requirements analyst and senior security system designer for SCADA automated control systems. […]

  109. Kaspersky Labs to develop a Secure OS - KabayanTech - October 19, 2012

    […] Source: Eugene Kaspersky […]

  110. Philippines news: Kaspersky making its own operating system | Pinas news library - October 19, 2012

    […] In a blog post, Kaspersky Labs chairman and CEO Eugene Kaspersky confirmed such rumors circulating on the Internet – but made clear this early the OS will not be for playing video games, social networking or editing home videos. “So it comes down to KL (Kaspersky Labs) to save the world, naturally! We’re developing a secure operating system for protecting key information systems (industrial control systems (ICS) used in industry/infrastructure. Quite a few rumors about this project have appeared already on the Internet, so I guess it’s time to lift the curtain (a little) on our secret project and let you know (a bit) about what’s really going on,” he said. […]

  111. SCADA Security Friday News & Notes for 19 Oct 2012 - October 19, 2012

    […] Kaspersky’s announcement of a new secure SCADA OS was the buzz story of the week. It’s an ambitious effort with low likelihood of impact on SCADA and DCS for a variety of reasons. I do like the discussion of reducing the attack surface and would recommend vendors look at supporting Microsoft’s Server Core. A few ICS vendors support installations on Server Core. (DP Note – while I think Kaspersky’s attempt is a long shot, so is Project Basecamp. Nothing wrong with taking a shot if you believe in it and think it’s important … and the next Basecamp release comes out Thursday morning) […]

  112. Kaspersky un sistem de operare - | - October 19, 2012

    […] privire la acest sistem de operare a apărut acum câteva zile, dar sosirea această știre a fost confirmată în mod direct de Eugene Kaspersky, fondatorul companiei, a decis să ridice cortina de pe acest […]

  113. Kaspersky promises the impossible: A fully secure OS | SICK Sensor Vietnam - SICK Vietnam - SICK Việt Nam - SICK Sensor Việt Nam-AUMI-Đại diện SICK Sensor Việt Nam - October 20, 2012

    […] way of context, Kaspersky used Threatpost (The Kaspersky Lab Security News Service) and his personal blog to talk up a project under way at Kaspersky Labs: a new secure-by-design operating system for the […]

  114. Kaspersky's exploit-proof OS leaves security experts skeptical | On wide-area, cooperative network emulators - October 20, 2012

    […] a blog post this week fast picked adult by news outlets around a world, Kaspersky reliable rumors that Kaspersky Lab is […]

  115. Kaspersky met au point un OS sécurisé pour le contrôle industriel | Univers jeunesse - October 20, 2012

    […] un peu plus sur ce qui se passe réellement », a déclaré le patron de la firme dans un billet de blog. Dans un monde où les attaques contre les infrastructures des pays se font de plus en plus […]

  116. La escalada en la ciberguerra es una llamada a la accion | Enterese.Net - October 21, 2012

    […] En el blog publicado por Eugene Kaspersky: http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  117. Visto nel Web – 49 « Ok, panico - October 21, 2012

    […] nello stile de la Repubblica, poco ci manca che mettessero dentro gli OGM ::: la Repubblica ::: Nota Bene ::: […]

  118. [fwd] 卡巴斯基開發自有安全作業系統 | visual's blog - October 21, 2012

    […] 原文、ithome的報導 […]

  119. Eugene Kaspersky: “La escalada en la ciberguerra es una llamada a la acción” | Computerworld Venezuela - October 21, 2012

    […] En el blog publicado por Eugene Kaspersky: http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  120. Kaspersky’s exploit-proof OS leaves security experts skeptical | Printing Service Ft Myers - October 21, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  121. Kaspersky’s exploit-proof OS leaves security experts skeptical | CELL and COMPUTER - October 21, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  122. Kaspersky’s exploit-proof OS leaves security experts skeptical | how to get the most from your gaming console - October 21, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  123. Kaspersky’s exploit-proof OS leaves security experts skeptical » Nottingham PC Repair - October 21, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  124. Kaspersky’s exploit-proof OS leaves security experts skeptical « Breaking News « Theory Report - October 21, 2012

    […] a blog post this week fast picked adult by news outlets around a world, Kaspersky reliable rumors that Kaspersky Lab is […]

  125. Kaspersky’s exploit-proof OS leaves security experts skeptical | Tux Doc - October 21, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  126. Kaspersky’s exploit-proof OS leaves security experts skeptical | Random tech stuff - October 21, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  127. Russia: Kaspersky AV company is Developing Its Own Operating System « ClearSky Cyberdefense Forum - October 21, 2012

    […] http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  128. Kaspersky's exploit-proof OS leaves security experts skeptical - Quick Download free stuff - Quick Download - October 22, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  129. Kaspersky's exploit-proof OS leaves security experts skeptical - itcenter-bg.com | itcenter-bg.com - October 22, 2012

    […] a blog post this week quickly picked up by news outlets around the world, Kaspersky confirmed rumors that Kaspersky Lab […]

  130. Kaspersky Lab Developing Secure OS for Industrial Control Systems - Computing - October 22, 2012

    […] control systems (ICS)) used in industry/infrastructure,” company CEO Eugene Kaspersky confirmed in a blog post. “Quite a few rumors about this project have appeared already on the Internet, so I […]

  131. Kaspersky Lab Developing Secure OS for Industrial Control Systems | TechContentWatch - October 22, 2012

    […] (industrial control systems (ICS)) used in industry/infrastructure,” company CEO Eugene Kaspersky confirmed in a blog post. “Quite a few rumors about this project have appeared already on the Internet, so I guess […]

  132. Kaspersky irá desenvolver SO seguro para controle industrial | Programa Ctrl Alt Del - October 22, 2012

    […] “Muito rumores sobre o projeto já apareceram na Internet, então eu acho que é hora de levantar uma ponta da cortina de nosso projeto secreto e deixar você saber (um pouco) sobre o que está realmente acontecendo”, disse Kaspersky em um post de blog. […]

  133. K-OS: η Kaspersky φτιάχνει το δικό της λειτουργικό - October 22, 2012

    […] επιβεβαιώθηκε από την ηγεσία της εδρεύουσας στη Μόσχα εταιρείας […]

  134. کسپرسکی سیستم‌عامل اختصاصی خود را می‌سازد - October 22, 2012

    […] منبع : Kaspersky […]

  135. Liquidmatrix Security Digest Podcast - Episode 13 - Liquidmatrix Security Digest - October 23, 2012

    […] Kaspersky… what the fuck. […]

  136. | Computerworld Venezuela - October 23, 2012

    […] lo recoge el CEO de la compañía, Eugene Kaspersky, en un reciente escrito: “estamos desarrollando un sistema operativo seguro para proteger sistemas de información […]

  137. Handy PC Repair – – – – – – – – – – – – – – – – – – (661) 368-5111 » Kaspersky Labs preps its own OS to guard vital industry against cyberwar - October 23, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email […]

  138. Kaspersky Lab plantea su propio sistema operativo de alta seguridad | Blog Serinfo - October 24, 2012

    […] | Kaspersky Lab Más información | Informe […]

  139. Mark's Tech Tock » Blog Archive » Protecting Infrastructure from Hacking - October 24, 2012

    […] http://eugene.kaspersky.com/2012/10/16/kl-developing-its-own-operating-system-we-confirm-the-rumors-… […]

  140. Industrial Internet links: NYC Data Week sensors, industrial Internet in transportation, and more - O'Reilly Radar - October 25, 2012

    […] Kaspersky Lab developing its own operating system? (Eugene Kaspersky) — Networked industrial devices have become common enough to get the attention of Kaspersky Lab, Russia’s security giant, which confirmed last week that it’s developing an operating system for industrial control systems. The system is still under development and, as Kaspersky himself notes, will only take final form after it goes through lots of application-specific development. Kaspersky will have plenty of competition from established producers of industrial-control software with large installation bases, so his move seems to anticipate lots of total retrofits of industrial systems in the next several years. […]

  141. Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare | AIVAnet - October 30, 2012

    […] Next Web  |  Eugene Kaspersky, Securelist  | Email this | Comments This entry was posted in News, Software […]

  142. Kaspersky developing OS to protect critical information systems | AIVAnet - October 30, 2012

    […] [via Kaspersky] […]

  143. Enterprise Conversation - Keith Dawson - Promises of a Locked-Down Industrial OS - October 31, 2012

    […] himself confirmed the rumors on his blog in mid October, […]

  144. John W. Verity - Kaspersky's Plan to Secure Cities | Future Cities - November 1, 2012

    […] Eugene Kasperksy confirmed the plans on October 16 on his blog, Nota Bene, sketching out the thinking behind the effort and describing the proposed system, to be written […]

  145. Will software revamp guard grid against cyberattack? - Shy ShahG - November 2, 2012

    […] Kaspersky, the firm’s co-founder, says itssecure operating system will prevent such attacks by stopping SCADA software from sending malicious commands to […]

  146. Eugene Kaspersky: There’s ‘no neutral’ on his secure industrial OS concept | My Blog - November 16, 2012

    […] month ago, Kaspersky outlined an effort to develop an industrial OS that would be secure. In a blog post, Kaspersky […]

  147. Kaspersky Lab trabaja en su propio sistema operativo | SiliconWeek.com - November 19, 2012

    […] proyecto no es algo nuevo sino que, según ha confirmado el propio Kaspersky, lleva en activo una década y se conoce con el nombre en código de […]

  148. Kaspersky Lab plantea su propio sistema operativo de alta seguridad - November 21, 2012

    […] sí explica los ICS actuales y cómo pretende Kaspersky crear un sistema totalmente seguro. Vía | Kaspersky Lab Más información | Informe compelto Fuente: […]

  149. Security Guru Pledges to Strengthen Critical Computers | My Blog - November 23, 2012

    […] like Eugene Kaspersky, CEO of the Moscow-based antivirus company Kaspersky Lab. He has been talking about building secure operating systems for industrial systems, a subject he discussed with MIT […]

  150. Kaspersky bastelt an eigenem Betriebssystem für die Industrie - November 23, 2012

    […] erfahren in seinem Blog-Beitrag vom letzten Monat zwar nicht, wann exakt das System marktreif sein soll, bekommen aber eine Ahnung […]

  151. Security Guru Pledges to Strengthen Critical Computers | deskboy.tk - November 23, 2012

    […] like Eugene Kaspersky, CEO of the Moscow-based antivirus company Kaspersky Lab. He has been talking about[2] building secure operating systems for industrial systems, a subject he discussed with MIT […]

  152. Kaspersky developing super-secure operating system : Market Metrics Inc. - December 17, 2012

    […] Eugene Kaspersky’s original blog posting is here. […]

  153. A Move in the Right Direction. | Nota Bene - February 18, 2013

    […] risk to critical infrastructure is real and represents an international challenge that must be addressed by governments and the […]

  154. Kaspersky Labs builds new OS to combat Stuxnet, major exploits | Teckat - Technology blog - February 28, 2013

    […] It won’t be an operating system like Windows or Mac, but will work as an “additional security layer” that runs on top of an original OS — monitoring healthy systems and isolating threats including malware. Eugene Kapersky writes: […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: