Jump to content

whitecatlab

Members
  • Posts

    16
  • Joined

  • Last visited

    Never

Posts posted by whitecatlab

  1. Many VPNs have ability to protect the genuine public IP address from being leaked in the case of an unexpected connection drop-out. I was unpleasantly surprised to discover that there is no such feature offered by Kaspersky Secure Connection. 

    This is a question to Kaspersky. Are you planning to add Kill-Switch option to the product?

  2. After Kaspersky distributed the patch, I did not hesitate to repeat my experiments. The software still injects an ID - but this is now the same for all users: FDXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX. A website can no longer recognize individual users. However, it is still possible to find out if a visitor installed Kaspersky software on their system and how old it is. An attacker could use this information to redistribute a pest tailored to the protection software or redirect it to a suitable scam page, with the slogan: "Your Kaspersky license has expired. Please enter your credit card number to renew the subscription ".
    It is a widespread practice in the industry to use scripts as Kaspersky does. The script itself and/or URL from which it is downloaded can identify the vendor of the product with or without any ID. So, the conclusion made by the author of the article is silly. Moreover, use of terms such as spying (including deliberate brand distortion), bank trojans and data leakage, where discovered fault allowed very limited web tracking, clearly indicates that the article is obviously biased.
  3. So, some experiments have been done. Currently, 2FA is available not only internally, but also in some region. However, the email can be changed without any notification for any of the accounts (with or without 2FA). This possibility seems to me very dangerous for accounts without 2FA, as account can be easily stolen if someone gets credentials from leaked databases, etc.
×
×
  • Create New...