Updated An update to Kaspersky's popular anti-virus software on Monday falsely identified Google AdSense as a malicious script.
Kaspersky Lab published an update correcting the the Google AdSense on Monday. In a statement (extraxt below), the Russian security firm apologised for any inconvience caused by its admitted false alert.
An incorrect signature was added to the company's antivirus databases on 25 January at 07:00 Moscow time (GMT+3). As a result, Kaspersky Lab products erroneously blocked some legitimate websites containing the link on script http://pagead2.googlesyndication.com/pagead/show_ads.js, which is used in the contextual advertising system Google AdSense.
When users visited an affected web resource, a message was displayed stating that the page contained the malicious program Trojan.JS.Redirector.ar.
The problem was quickly resolved and by 19:00 Moscow time the company's products had stopped generating alerts for legitimate internet pages. Kaspersky Lab would like to apologize for any inconvenience this problem may have caused users. The company is continually improving its procedures for testing products and releasing updates to prevent such errors from occurring in future.
The AdSense cockup happened just hours after the bit.ly web address shortening service was wrongly added to Kaspersky's blocklist en masse as links to phishing sites. The Russian security firm said a fix for that problem would be published with its next malware definition update.
False positives still make for a well known shortcoming with anti-virus packages that affects just about every vendor from time to time. Flagging Windows systems files as potentially infected and shuffling them off to quarantine causes far more problems than if a false alarm happens to involve general applications.
Black-flagging such a widely used web application as Google AdSense arguably creates even more confusion, as the problem with dodgy Kaspersky Labs updates on Monday serves to illustrate. ®