A case in point: for almost four years, AV products from Kaspersky Lab injected a unique identifier into the HTML of every website a user visited, making it possible for sites to identify people even when using incognito mode or when they switched between Chrome, Firefox, or Edge.
A strange discovery on my office computer led me to unearth an astonishing data leak caused by Kaspersky's antivirus software.The data leak allowed websites to unnoticeably read the individual ID of Kaspersky users.
As a result, if tools with the ability to circumvent the blacklist don’t play ball by respecting its contents, they also face being blocked by ISPs. This proposal came to head earlier this year when telecoms watchdog Roscomnadzor wrote to several major VPN providers – NordVPN, ExpressVPN, TorGuard, IPVanish, VPN Unlimited, VyprVPN, Kaspersky Secure Connection, HideMyAss!, Hola VPN, and OpenVPN – demanding compliance .
Ahead of her talk, Galperin has notched her first win: Russian security firm Kaspersky announced today that it will make a significant change to how its antivirus software treats stalkerware on Android phones, where it's far more common than on iPhones.
Moscow-based cyber security provider Kaspersky Lab said the attack took place between June and November last year and was used to deliver a software update with a “backdoor” that would give hackers access to infected machines.