Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Kaspersky
Kaspersky browser extension versus KIS web-protection
Message
<blockquote data-quote="ExecutiveOrder" data-source="post: 961590" data-attributes="member: 93099"><p>AV extensions have nothing to do with certificates for the encrypted connections, you have to disable encrypted connection scan right from the main UI of every AV but you should know that most malware is distributed from encrypted connections. It's still highly possible to block the threat after it gets downloaded, but it will be difficult in some cases like in supply chain attacks (because the update data are encrypted, it also could be used to run a script to execute file-less attack directly into memory), post-infection is also possible to remediate but should take not that it already bypassed some of the protection layers.</p><p></p><p>uBlock Origin is safe but it can't be compared to this topic because the extension isn't just about Ad-Block as you can see from previous explanations, well because you can't use AV extension, then use uBlock it's safe and quite good for blocking ads and some other stuff.</p><p></p><p>That news from Washington was from a 2017 issue about Kaspersky that ends up banning the software of Kaspersky on US government computers. If you look at every news and other things regarding the issue, it's more like "caught in the geopolitical fight". Also, the news suggests that it was from the mechanism of AV product (a lot of vendors did this) specifically KSN (Kaspersky Security Network, other vendor has their own name for cloud infrastructure) and they just speculate that vendor A could be forced to cooperate for dirty work of their country and etc. So, if they did do the dirty job, you should disable KSN and secure the connection, this made the product far worse than the others (with full functionality, including 2 of these similar method). Even if "silent signatures" is complete, true, they can steal your data anyway, and you shouldn't trust their transparency report, two valid major business audits, and other things = just don't use Kaspersky.</p><p></p><p>As a regular user (not a US govt employee), you shouldn't get distracted by this issue.</p><p>There's a forum thread specifically talking about this with tons of opinions from multiple members:</p><p><a href="https://malwaretips.com/threads/is-kaspersky-trustable.110395/" target="_blank">Q&A - Is Kaspersky trustable?</a></p></blockquote><p></p>
[QUOTE="ExecutiveOrder, post: 961590, member: 93099"] AV extensions have nothing to do with certificates for the encrypted connections, you have to disable encrypted connection scan right from the main UI of every AV but you should know that most malware is distributed from encrypted connections. It's still highly possible to block the threat after it gets downloaded, but it will be difficult in some cases like in supply chain attacks (because the update data are encrypted, it also could be used to run a script to execute file-less attack directly into memory), post-infection is also possible to remediate but should take not that it already bypassed some of the protection layers. uBlock Origin is safe but it can't be compared to this topic because the extension isn't just about Ad-Block as you can see from previous explanations, well because you can't use AV extension, then use uBlock it's safe and quite good for blocking ads and some other stuff. That news from Washington was from a 2017 issue about Kaspersky that ends up banning the software of Kaspersky on US government computers. If you look at every news and other things regarding the issue, it's more like "caught in the geopolitical fight". Also, the news suggests that it was from the mechanism of AV product (a lot of vendors did this) specifically KSN (Kaspersky Security Network, other vendor has their own name for cloud infrastructure) and they just speculate that vendor A could be forced to cooperate for dirty work of their country and etc. So, if they did do the dirty job, you should disable KSN and secure the connection, this made the product far worse than the others (with full functionality, including 2 of these similar method). Even if "silent signatures" is complete, true, they can steal your data anyway, and you shouldn't trust their transparency report, two valid major business audits, and other things = just don't use Kaspersky. As a regular user (not a US govt employee), you shouldn't get distracted by this issue. There's a forum thread specifically talking about this with tons of opinions from multiple members: [URL='https://malwaretips.com/threads/is-kaspersky-trustable.110395/']Q&A - Is Kaspersky trustable?[/URL] [/QUOTE]
Insert quotes…
Verification
Post reply
Top