Kaspersky Internet Security (often abbreviated to KIS) is an
internet security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
suite developed by
Kaspersky Lab
Kaspersky Lab (; Russian language, Russian: Лаборатория Касперского, Romanization of Russian, tr. ''Laboratoriya Kasperskogo'') is a Russian Multinational corporation, multinational cybersecurity and anti-virus provider head ...
compatible with
Microsoft Windows and
Mac OS X
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
. Kaspersky Internet Security offers protection from
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
, as well as
email spam
Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email ( spamming).
The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoi ...
,
phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
and
hacking attempts, and
data leaks. Kaspersky Lab Diagnostics results are distributed to relevant developers through the
MIT License
The MIT License is a permissive free software license originating at the Massachusetts Institute of Technology (MIT) in the late 1980s. As a permissive license, it puts only very limited restriction on reuse and has, therefore, high license co ...
.
Windows edition
Version 2007 (6.0)
Version 6.0 was the first release of KIS.
PC World
''PC World'' (stylized as PCWorld) is a global computer magazine published monthly by IDG. Since 2013, it has been an online only publication.
It offers advice on various aspects of PCs and related items, the Internet, and other personal tec ...
magazine praised version 6.0's detection of malware. KIS detected 100 percent of threats on a subset of the January 2006 wild-list, a list of prevalent threats. The suite detected almost 100 (99.57%) percent of
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
samples. KIS has the ability to scan within compressed or
packed files, detecting 83.3 percent of the "hidden" malware. However, version 6.0 was criticized for not completely removing malware by leaving
Registry entries and files. PC World also highlighted the suite's
false positive
A false positive is an error in binary classification in which a test result incorrectly indicates the presence of a condition (such as a disease when the disease is not present), while a false negative is the opposite error, where the test resul ...
s — eight of 20,000 clean files were incorrectly flagged as malicious — and its noticeable impact on
computer performance
In computing, computer performance is the amount of useful work accomplished by a computer system. Outside of specific contexts, computer performance is estimated in terms of accuracy, efficiency and speed of executing computer program instructio ...
. However, data is cached from each scan, making each subsequent scan faster. The firewall blocked all attacks from inside and outside the computer when tested.
The magazine found the
graphical user interface
The GUI ( "UI" by itself is still usually pronounced . or ), graphical user interface, is a form of user interface that allows User (computing), users to Human–computer interaction, interact with electronic devices through graphical icon (comp ...
to be awkward to navigate. Features such as
parental controls
Parental controls are features which may be included in digital television services, computers and video games, mobile devices and software that allow parents to restrict the access of content to their children. These controls were created to ...
and
instant messaging
Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
protection, found in competing suites from
Symantec Symantec may refer to:
*An American consumer software company now known as Gen Digital Inc.
*A brand of enterprise security software purchased by Broadcom Inc.
Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
and
McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
, were not a part of version 6.0. Both
CNET and PC World criticized the suite's relatively high
retail price, US$79.95.
KIS 6.0 supports
Windows 98 SE
Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. The second operating system in the 9x line, it is the successor to Windows 95, and was released t ...
,
ME,
NT Workstation 4.0,
2000 Professional,
XP Home Edition,
XP Professional,
XP Professional x64, and
Vista. 50
megabyte
The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB. The unit prefix ''mega'' is a multiplier of (106) in the International System of Units (SI). Therefore, one megabyte is one million bytes o ...
s of free space,
Internet Explorer 5.5
Microsoft Internet Explorer 5 (IE5) is a graphical web browser, the fifth version of Internet Explorer, the successor to Internet Explorer 4 and one of the main participants of the first Browser wars, browser war. Its distribution methods and Wi ...
, and
Windows Installer
Windows Installer (msiexec.exe, previously known as Microsoft Installer, codename Darwin) is a software component and application programming interface (API) of Microsoft Windows used for the installation, maintenance, and removal of softwar ...
2.0 are required.
RAM and
CPU
A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and ...
requirements are dependent on the operating system.
Version 2008 (7.0)
Version 7.0 introduced a redesigned GUI. Components were renamed and reorganized; the ''Anti-hacker'' module was renamed to the ''Firewall'', and the ''Anti-Spy'' module was integrated with the ''Privacy Control'' module.
PC World
''PC World'' (stylized as PCWorld) is a global computer magazine published monthly by IDG. Since 2013, it has been an online only publication.
It offers advice on various aspects of PCs and related items, the Internet, and other personal tec ...
described the new interface as "intuitive" and "great-looking".
Parental controls were introduced, with specific settings for different age categories, such as "child" or "parent". Within age categories are content categories, such as
drugs
A drug is any chemical substance that causes a change in an organism's physiology or psychology when consumed. Drugs are typically distinguished from food and substances that provide nutritional support. Consumption of drugs can be via inhalat ...
or
violence
Violence is the use of physical force so as to injure, abuse, damage, or destroy. Other definitions are also used, such as the World Health Organization's definition of violence as "the intentional use of physical force or power, threatened ...
. Users can manually configure profiles. Filtering profiles can be associated with users. Since content is filtered at the network level, the feature will work with any
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
browser. The filter relies on a database of known URLs and can analyse websites in real-time. Attempts to access forbidden URLs are logged, and sites visited are tracked as well, raising privacy issues. Limits on Internet access may be set based on time, and chat rooms along with
webmail
Webmail (or web-based email) is an email service that can be accessed using a standard web browser. It contrasts with email service accessible through a specialised email client software. Examples of webmail providers are 1&1 Ionos, AOL Mail, ...
sites can be manually blocked.
Spam filtering integrates with
Microsoft Outlook
Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as c ...
,
Outlook Express
Outlook Express, formerly known as Microsoft Internet Mail and News, is a discontinued email and news client included with Internet Explorer versions 3.0 through to 6.0. As such, it was bundled with several versions of Microsoft Windows, from ...
,
Windows Mail, and
The Bat!. E-mail content is analysed and scored, and e-mail with scores above two specified thresholds are either marked as "!!spam" or "??probably spam". The ''Mail Dispatcher'' feature shows subject and sender information for messages, and allows users to avoid downloading blatant spam by selecting which messages to download. The filter self-trains by analyzing incoming and outgoing e-mail not marked as spam, or by analyzing folders only containing spam or valid e-mail. Senders of verified valid e-mail are
whitelist
A whitelist, allowlist, or passlist is a mechanism which explicitly allows some identified entities to access a particular privilege, service, mobility, or recognition i.e. it is a list of things allowed when everything is denied by default. It is ...
ed. E-mail can also be whitelisted or
blacklist
Blacklisting is the action of a group or authority compiling a blacklist (or black list) of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list. If someone is on a blacklist, ...
ed based on phrases present in the text. E-mail with non-
ASCII
ASCII ( ), abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Because ...
characters or invisible text can also be blocked. However, version 7.0 had a relatively poor showing, misidentifying 30 percent of valid messages in PC Magazine testing. 30 percent of spam also made to the inbox.
Protection against
data leaks was incorporated in this release. The suite warns users when programs attempt to access or send data from certain areas, such as where Internet Explorer stores
webform
A webform, web form or HTML form on a web page allows a user to enter data that is sent to a server for processing. Forms can resemble paper or database forms because web users fill out the forms using checkboxes, radio buttons, or text fields. ...
information.
Malware protection was mostly positive in detection and disinfection tests by AV-Test.org. Version 7.0 detected 100 percent of wildlist threats. Using one-month-old
signatures
A signature (; from la, signare, "to sign") is a handwritten (and often stylized) depiction of someone's name, nickname, or even a simple "X" or other mark that a person writes on documents as a proof of identity and intent. The writer of a ...
and a set of new malware, however, detection fell to 14 percent. Files were scanned at 5.24 megabytes per second. Version 7.0 successfully identified all six actively running
rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
s, four of six inactive
rootkits, and was only able to remove two of six rootkits. The firewall correctly blocked all attempted outside connections, with a reasonable level of security when left on default settings.
This version drops support for the Windows 98, 2000, and NT.
Windows XP Service Pack 2
Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Windows 2000 for high-end and ...
is required, except in the case of XP Professional x64 edition. Vista is supported as well. RAM and CPU requirements are dependent on the operating system. 75 megabytes of free space, Internet Explorer 5.5, and Windows Installer 2.0.
Version 2009 (8.0)
This version introduces a revised user interface, an application filtering module, an updated anti-virus engine, and a
vulnerability scanner. The main window separates settings in four categories, compared to eight in its predecessor. A status bar changes colour (green, yellow, and red) to reflect overall program status and flashes to divert attention when needed.
PC Magazine also noted pop-up notifications were kept to a minimum.
Kaspersky claims the core anti-virus engine was revised to increase scan speed. PC Magazine found an initial scan took over two hours, however subsequent scans took two minutes to complete. However, malware detection was relatively low in comparison to other anti-virus applications tested. Out of 650 thousand samples, version 8.0 detected 95.6 percent. The top score was around 99 percent. Using two-week-old signatures, version 8.0 detected 52 percent of viruses in a different set of samples. Kaspersky also blocked about 60 percent of malware based solely on
behaviour
Behavior (American English) or behaviour ( British English) is the range of actions and mannerisms made by individuals, organisms, systems or artificial entities in some environment. These systems can include other systems or organisms as w ...
. The top performers scored 55.3 percent and 80 percent respectively. Version 2009 detected 98.1 percent of
adware
Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
. However, PC World noted to achieve that kind of performance, users will have to modify program settings. On default settings, KIS allowed
Zango to install. To block the installation, users must enable KIS to scan for "other malware".
The ''Security Analyzer'' looks for operating system and program patches. It also looks for vulnerable system settings, presenting users with a list of recommended actions to prevent malware from gaining access to a system. However, PC World criticized the amount of computer
jargon
Jargon is the specialized terminology associated with a particular field or area of activity. Jargon is normally employed in a particular communicative context and may not be well understood outside that context. The context is usually a partic ...
used and lack of information about how adjust settings appropriately. On the other hand, PC Magazine found the feature straightforward, and often the solution involved downloading and installing an update.
KIS uses a whitelist by
Carbon Black
Carbon black (subtypes are acetylene black, channel black, furnace black, lamp black and thermal black) is a material produced by the incomplete combustion of coal and coal tar, vegetable matter, or petroleum products, including fuel oil, fluid ...
to classify trusted and malicious programs. Malicious programs are not allowed to run at all. Unknown programs falling in between the two categories are restricted in the actions they can perform. Its firewall blocked all attacks in PC Magazine testing.
Phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
protection was introduced in this release. Testing by PC Magazine found the feature blocked 44 percent of phishing URLs.
Internet Explorer 7
Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a web browser for Windows. It was released by Microsoft on October 18, 2006, as the seventh version of Internet Explorer and the successor to Internet Explorer 6. Internet Explorer 7 is par ...
blocked 67 percent of the URLs, and
Mozilla Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current a ...
blocked 81 percent.
Spam filtering now integrates with
Mozilla Thunderbird
Mozilla Thunderbird is a free and open-source cross-platform email client, personal information manager, news client, RSS and chat client developed by the Mozilla Foundation and operated by subsidiary MZLA Technologies Corporation. The projec ...
and scans
NNTP
The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (''netnews'') between news servers, and for reading/posting articles by the end user client applications. Brian Kantor of the Univ ...
traffic. Spam can be automatically diverted to its own folder. When using an unsupported e-mail client to download POP3, IMAP or NNTP mail, Kaspersky will still generate a report of all messages. However, in an unsupported client, there will be no toolbar nor will the program classify any messages as spam in the client itself.
Version 2010 (9.0)
Version 2010 of Kaspersky Internet Security introduced an overhauled user interface and a
sandbox for running applications in a virtualized environment. The 9.0.0.736 build of KIS 2010 fully supported the
Windows 7
Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009. It is the successor to Windows Vista, released nearl ...
operating system.
Version 2011 (11.0)
The beta version was released for all windows users on 8 June 2010. This version included a new interface, as well as a
gadget
A gadget is a mechanical device or any ingenious article. Gadgets are sometimes referred to as '' gizmos''.
History
The etymology of the word is disputed. The word first appears as reference to an 18th-century tool in glassmaking that was develo ...
only available for Windows Vista and Windows 7 users. PC Mag rated this version "very good" (4/5 stars). Its firewall was noted to be very good, but that made up for its only adequate malware detection rates. Two critical fixes have been released by Kaspersky Lab, making the current version 11.0.2.556.
Version 2012 (12.0)
On 1 March 2011, Kaspersky released the first build of version 2012, it came out as beta version and in English, French and Russian version, with more versions due out later.
On 7 June 2011 Kaspersky Lab announced the commercial release of Kaspersky Internet Security 2012 in France, Germany, Switzerland. The current version is 12.0.0.374.
Version 2013 (13.0)
The beta version was released for all windows users on 3 March 2012. This version includes an interface which looks (currently, at least) much like Internet Security 2012. There is no Safe Run option, no Proactive Defense, while instead the behavioural monitoring System Watcher seems to be taking greater responsibility for detecting malware and a Safe Banking feature has been added.
The release candidate (build 13.0.1.4088 RC) was released for all windows users on 20 July 2012.
The Final Version was released on 28 August 2012 build 13.0.1.4190
Version 2014 (14.0)
Beta testing started on 12 March 2013.
This version introduced a
Windows 8 like GUI design. The final version was released on 3 August 2013 build 14.0.0.4651 in India and Russia, then on August 13 in the US and August 27 in the UK. The 2014 release was frequently characterized as inferior to user expectations, largely due to its removal of a range of
granular fine-tuning options in 2013 and earlier, which were used by experienced users; a number of these were added back in the 2015 beta by the time of its technical release (build 463).
As of February 13, 2014 build 14.0.0.4651(E) was released. Build 14.0.0.4651(I) is the latest (current) version.
Version 2015 (15.0)
In April 2014, a
beta version
A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impr ...
of the 2015 product, build 463, was released, followed by a technical release preview, of the near-complete 2015 product. The first official release of the product was in
Bangladesh
Bangladesh (}, ), officially the People's Republic of Bangladesh, is a country in South Asia. It is the List of countries and dependencies by population, eighth-most populous country in the world, with a population exceeding 165 million pe ...
in June 2014.
Version 2017 (17.0)
Version 2018 (18.0)
Version 2019 (19.0)
Version 2020 (20.0)
Version 2021 (21.0)
Controversies regarding security
In March 2015,
Bloomberg Bloomberg may refer to:
People
* Daniel J. Bloomberg (1905–1984), audio engineer
* Georgina Bloomberg (born 1983), professional equestrian
* Michael Bloomberg (born 1942), American businessman and founder of Bloomberg L.P.; politician and ...
accused Kaspersky of having close ties to Russian military and intelligence officials.
Kaspersky slammed the claims in his blog, calling the coverage "sensationalist" and guilty of "exploiting paranoia" to "increase readership".
As a result of alleged Russian involvement in the
2016 Presidential Election
This national electoral calendar for 2016 lists the national/federal elections held in 2016 in all sovereign states and their dependent territories. By-elections are excluded, though national referendums are included.
January
*7 January: Kirib ...
and ongoing investigations, the
Department of Homeland Security
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-te ...
officially banned the use of the Kaspersky Internet Security by the United States federal government in September, 2017.
As of December 12, 2017, the use of Kaspersky software is banned from use by the American federal government by law.
See also
*
Antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
*
Internet Security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
*
Comparison of antivirus software
This article compares notable antivirus products and services. It is Wikipedia list article rather than a deep analysis of the strengths and weaknesses of each.
Legend
The term "on-demand scan" refers to the possibility of performing a manual ...
*
Comparison of firewalls
*
Comparison of computer viruses
*
Eugene Kaspersky
*
Natalya Kaspersky
*
Kaspersky Anti-Virus
*
Kaspersky Lab
Kaspersky Lab (; Russian language, Russian: Лаборатория Касперского, Romanization of Russian, tr. ''Laboratoriya Kasperskogo'') is a Russian Multinational corporation, multinational cybersecurity and anti-virus provider head ...
References
External links
*
{{Firewall software
2006 software
Antivirus software
Firewall software
Security software
Proprietary software
Windows security software
MacOS security software
Linux security software