Skip to main content

Posts

The Rise of Ads on YouTube: A Growing Frustration. Chapter -1

  In recent months, YouTube users have noticed a big increase in how often they see ads, and it’s causing a lot of frustration. Here’s a closer look at what’s happening:               1. More Ads, More Often: YouTube has started showing more ads than before. Instead of just one ad before a video, you’re now often seeing two or even three ads one after the other. This change means that viewers have to sit through more ads before they can watch their videos, which many people find really annoying. 2. Ads When Switching Videos: If you like to jump from one video to another, you’ll notice that ads pop up every time you make a switch. Even if YouTube is having trouble loading or the app freezes, you still end up seeing ads. This makes it feel like you’re always waiting for an ad to finish, no matter what. 3. Constant Frustration: Because of the rise in ad frequency, many people are finding ways to avoid long ad breaks by quickly changing videos. ...

Warning: Devices Running Android Versions 12, 12L, 13, or 14 at high Risk.

  The Indian Computer Emergency Response Team (CERT-In) has issued a warning to Android users. The cyber security authority has spotted “high risk” vulnerabilities on Android smart phones powered by Qualcomm and MediaTek chipsets. It added that the smartphones affected are running on Android versions 12, 12L, 13, and 14 software. These multiple vulnerabilities can be exploited by an attacker to get access to sensitive information and gain elevated privileges. As per the warning, these vulnerabilities exist in Android due to flaws in the Framework, System, Kernel, Arm component, Imagination Technologies, MediaTek components, Qualcomm components and Qualcomm closed-source components. Notably, the critical security flaw identified in the Framework component poses a risk of privilege escalation, allowing attackers to gain elevated access without any additional execution privileges. The severity of this vulnerability is determined by its potential impact on affected devices, assuming th...

Apple has unveiled the iOS 18.1 Beta

              Originally anticipated for the iOS 18 release on compatible devices, Bloomberg recently reported that it would not debut with the initial rollout. The iOS 18.1 Beta, now available to developers with active accounts, allows them to enroll and test Apple Intelligence ahead of its broader release. According to release notes from iOS 18.1 beta seen by BleepingComputer, "iOS 18.1 beta is an early preview of an update to iOS 18 scheduled for later this autumn. This beta introduces initial features powered by Apple Intelligence." "To participate in the Apple Intelligence beta, users can join the waitlist in Settings and will receive notifications when it becomes available for their devices. Both the device language and Siri language must be set to US English, and the device region must be configured to United States." "Apple Intelligence debuts on iPhone 15 Pro and iPhone 15 Pro Max, though it is not currently available in the EU or China," acco...

Cybersecurity Giant CrowdStrike Triggers Worldwide Computer to Blue Screen of Death

    Recently, a widespread issue has paralyzed computers globally, initially mistaken for a cyber attack. Speculations pointed fingers at Microsoft, as only Windows systems seemed affected. However, the real culprit was CrowdStrike, a major cybersecurity firm renowned for its endpoint protection services, akin to antivirus for corporate fleets of computers. The problem stemmed from an automatic update pushed by CrowdStrike, designed to enhance security through its endpoint sensors. Unfortunately, a critical bug slipped into the update, causing affected computers—running CrowdStrike's software—to crash irreparably. Since the sensors operate at a deep system level, the glitch caused entire systems to enter a continuous cycle of crashes, known ominously as the "blue screen of death." CrowdStrike quickly acknowledged the issue and provided a fix, albeit a cumbersome one. Affected PCs must be manually booted into safe mode to remove specific files, a process that needs to be r...
  A new malicious campaign tricks people by pretending to be Google Chrome, Word, or OneDrive errors. They use these fake alerts to convince users to run harmful PowerShell "fixes" that actually install malware. This campaign involves several cyber threat groups, including ClearFake and others like ClickFix and TA571. ClearFake has previously used tricks where websites ask users to update their browser, but the update actually installs malware. In the latest attacks, cybercriminals use JavaScript in email attachments or hacked websites. They show fake error messages that look like they're from Google Chrome, Word, or OneDrive. These messages tell users to click a button to copy a PowerShell "fix" onto their computer. They're then told to run this script in a special Windows tool called PowerShell. Even though these attacks need users to do several things to work, the trickery is clever enough to make people think there's a real problem that needs f...

Unlocking the mystery: Can EVMs resist the hack attack?

  Electronic Voting Machines (EVMs) typically don't have a Graphics Processing Unit (GPU) like a typical computer. However, the absence of a GPU doesn't mean they are immune to security threats. Here's why: 1. Software Vulnerabilities: EVMs run on specialized software, and like any software system, they can have vulnerabilities. These vulnerabilities could be exploited by attackers to manipulate the voting process or compromise the integrity of the election.   2. Hardware Manipulation: Even though EVMs lack a GPU, they contain various other components, such as microcontrollers, memory chips, input/output devices, and communication interfaces. Attackers could tamper with these components to alter the behavior of the EVM or extract sensitive information.   3. Network Connectivity: While some EVMs don't have network connectivity, others may have communication capabilities for transmitting voting data. Any device with network connectivity is potentially vulner...

Massive Data Breach Exposes Millions: boAt Lifestyle India

                                                BoAt Lifestyle India customers’ data on the Dark Web!  In a darkest corner of the internet known as a darknet forum, an entity identified as ShopifyGUY has purportedly disseminated sensitive information sourced from boAt Lifestyle India. This data breach encompasses the personal particulars of approximately 7,550,000 individuals, encompassing their names, email addresses, residential addresses, phone numbers, and potentially more. boAt, a notable entity in India renowned for its audio-centric electronic offerings including smart watches, headphones, and true wireless ear buds, appears to have become a victim of data exposure within the confines of the dark web. The compromised dataset reportedly amounts to 1.2 gigabytes in size. This revelation has elicited widespread apprehension regarding the prospective jeo...