Skip to main content

Posts

Showing posts from August, 2024

The Rise of Ads on YouTube: A Growing Frustration. Chapter -1

  In recent months, YouTube users have noticed a big increase in how often they see ads, and it’s causing a lot of frustration. Here’s a closer look at what’s happening:               1. More Ads, More Often: YouTube has started showing more ads than before. Instead of just one ad before a video, you’re now often seeing two or even three ads one after the other. This change means that viewers have to sit through more ads before they can watch their videos, which many people find really annoying. 2. Ads When Switching Videos: If you like to jump from one video to another, you’ll notice that ads pop up every time you make a switch. Even if YouTube is having trouble loading or the app freezes, you still end up seeing ads. This makes it feel like you’re always waiting for an ad to finish, no matter what. 3. Constant Frustration: Because of the rise in ad frequency, many people are finding ways to avoid long ad breaks by quickly changing videos. ...

Warning: Devices Running Android Versions 12, 12L, 13, or 14 at high Risk.

  The Indian Computer Emergency Response Team (CERT-In) has issued a warning to Android users. The cyber security authority has spotted “high risk” vulnerabilities on Android smart phones powered by Qualcomm and MediaTek chipsets. It added that the smartphones affected are running on Android versions 12, 12L, 13, and 14 software. These multiple vulnerabilities can be exploited by an attacker to get access to sensitive information and gain elevated privileges. As per the warning, these vulnerabilities exist in Android due to flaws in the Framework, System, Kernel, Arm component, Imagination Technologies, MediaTek components, Qualcomm components and Qualcomm closed-source components. Notably, the critical security flaw identified in the Framework component poses a risk of privilege escalation, allowing attackers to gain elevated access without any additional execution privileges. The severity of this vulnerability is determined by its potential impact on affected devices, assuming th...