Uninstall Kaspersky AntiVirus Software From Your Systems.kaspersky antivirus russian spy software

MSNBC reports tonight (7-28-2017) that it has exposed ties between Kaspersky labs and cyber forces within the Russian Government . Specifically the Russian Spy agency FSB.

U.S. government officials, including the Senate Intelligence Committee and members of the intelligence community are allegedly concerned that the Russian-headquartered security software manufacturer Kaspersky Lab might be colluding with the Russian government, claims the company denies and the cybersecurity community has never put much stock into.

Homeland Security, reports ABC News, issued a secret warning to avoid use of the company's products in February.

This isn't the first time someone has accused Kaspersky Lab of potentially using its software to undermine America. Similar allegations came out in 2015, when Bloomberg published a piece describing Eugene Kaspersky's friendship with government officials including those from the FSB - the Russian intelligence agency.

"I know Eugene and many of his GReAT team. All excellent and reputable," tweeted the cybersecurity consultant Jeffrey Carr who runs the Suits and Spooks intelligence conference.

We don't know what Homeland Security or the intelligence community knows, but we do know what allegations have been made in the past.

Ransomware Attack Recovery Services. Data recovery. Wannacry worm NYC

Specializing in Helping Businesses Remove Ransomware & Restore Encrypted Files.

We at Shortcircuited saw our first ransomware attack 4.5 years ago. In 2013 ransomware attacks were new and not prevalent and most companies had no clue on how to deal with infections. Once attacked there are basically two options. Restore from a backup or pay the ransom. Because of these limited options we at Shortcircuited are more focused on hack prevention as opposed to the data recovery aspect. Protect your valuable data against the recent wannacry worm.

Call us at 347-791-3311 if your office was infected with ransomware. A technician will respond to your inquiries as soon as possible.


What is a Red Team

How Secure Are Your Defenses?
Red Teaming, Pen Testing & Social Engineering


In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the “regular” forces, the Blue Team.
Whenever we discuss Information Security from a defensive point of view, we are inclined to think about protection, damage control, and reaction.

However, adopting an attacker’s mindset can effectively help businesses enhance their chances of securing themselves against ever-changing threats.

In military jargon, the term Red Team is traditionally used to identify highly skilled and organized groups acting as fictitious rivals and/or enemies to the “regular” forces, the Blue Team.

Basically, the Red Team relied on its own expertise to explore any possible way to plan and carry out an attack – thus trying to espouse the standpoint, the attitude of potential assailants.

Such simulations aimed at both reproducing a real emergency and improving the troops’ ability to fend off an aggression.

At the same time, Blue Team members were trained and expected to detect, to oppose and to weaken the Red Team’s efforts.

All of these concepts have been given a peculiar status in the Cybersecurity field, as well: in this case, the Red Team’s hostile activities take the form of sophisticated penetration tests, whose results constitute a reliable assessment of a business/organization’s defensive capabilities and its safety status.

Generally speaking, the Red Team is given a very specific task – for example, evaluating the possibility of accessing sensitive data stored in a database.

In such a scenario, the group would have to act as an external threat actor, by recognizing any opportunity to exploit bugs and weaknesses of the infrastructure, the target being the extraction of the required pieces of information.

Meanwhile, the Blue Team would be in charge of any defensive step.

The Red Team is supposed to both identify any vulnerability in the PPT (People, Process and Technology) defensive system and help the organization improve its own defensive abilities.

While the Red Team’s role is usually well-defined, the Blue Team’s (and hence, the SOC analysts and response handlers‘) task is mutable, it is not known a priori: therefore, the former’s simulated assaults are expected to test and enhance the latter’s skills, igniting a virtuous circle.

The Blue Team’s work routine includes accessing log data, using a SIEM, garnering threat intelligence information, performing traffic and data flow analysis; we may compare their mission to finding the well-known needle in the haystack…

On the other hand, Red Team members have to be aware of any potential opponent’s TTP (Tactics, Techniques, Procedures), which the Blue Team is expected to detect and counter.

While automation can prove to be useful at this stage, the Blue Team shouldn’t rely on technology alone: on both sides, human intuition, expertise and cleverness cannot be replaced (yet) – social engineering techniques (i.e. Spear phishing) being a strong reminder of this.


Recommended Security devices.

 Sonicwall Routers with cgss subscription

Malwarebytes anti malware


Protecting your data from hackers

You’ve probably got a lot of important data stored on your company computers: customer credit card numbers, confidential reports for your employees, and countless emails (some of which are full of harsh zingers directed at your biggest competitors). Needless to say, none of this is information you want made public or destroyed. So are you taking enough precautions to protect your data?

According to a recent survey from AVG [PDF], six out of seven small businesses in the US and UK have absolutely no Internet security measures in place, and could be at risk of a major security breach. If you fall into that group, here are ten things you can do to get back on the security track: