Jump to content

Jerska

Members
  • Posts

    3
  • Joined

  • Last visited

    Never

Reputation

1 Neutral
  1. > This issue is concerning, bc, the domain is unknown (to me) This is definitely understandable. I guess you now understand what we do, but just to be clear, we’re a service provider, and you could imagine the same type of external requests for any service provider (e.g. imgur for image hosting). > It’s clearly an issue, one I cannot fix, with your contribution, maybe Kaspersky will🤔 As advised in our own community forums, I would encourage you to try to get in direct contact with Kaspersky’s support team. It seems like this would be a good route: https://support.kaspersky.com/us/b2c/US#product This is basically two reports at once: The false positive detection of those calls The UI having issues when many requests are detected, requiring you to go through the Task Manager to kill it
  2. Hi there, I work at Algolia, and stumbled upon this thread after receiving a message about this in our own forums: https://discourse.algolia.com/t/persistent-trying-to-transfer-password-alerts-for-unknown-x-algolia-domain/8996 We provide Search, including on these forums. I assume the “password” the AV detects is a read-only API key to a search index (32 chars, [a-z0-9]). This key is not linked to the current user of the page, but the credentials of the website searching in our index. Having it exposed is a non-issue, and furthermore the query is properly going through HTTPS. If I understood correctly, this pop-up would trigger on all websites using Algolia to power their search. I have 2 questions: Is there any way to have the detection code updated not to detect this pattern, which is completely legit? Is there any way to disable this detection in-app? Best,
×
×
  • Create New...