logo
#

Latest news with #AdBlock

YouTube's latest tactic targets ad blockers with fresh measures to make users pay for Premium subscription
YouTube's latest tactic targets ad blockers with fresh measures to make users pay for Premium subscription

Hindustan Times

timea day ago

  • Business
  • Hindustan Times

YouTube's latest tactic targets ad blockers with fresh measures to make users pay for Premium subscription

Ad blockers mustn't flourish - at least according to YouTube. The Alphabet-owned video platform has been cracking down on viewers who continue to use ad blockers on its site, all because they must submit to the demands of major tech companies eager for your money. If you have an ad blocker extension turned on, YouTube no longer allows playback until you disable it. In its current iteration, YouTube is mostly successful in ensuring that free users can't get away with using ad blockers. Now, the company has added another layer of defence against ad blockers. According to many Reddit users, popular workarounds like uBlock Origin and AdBlock are no longer effective against YouTube ads. That means users are now seeing warnings to stop using ad blockers. For some who rely on these services, the YouTube page appears completely blank. Naturally, this has led to an uproar against Google for its strong stance against ad blockers. Even if we acknowledge that ads help creators generate revenue from their videos, it's clear that Google is ultimately looking out for its own interests. As always, though, users will likely devise new ways to bypass these restrictions. We're at an impasse: users don't want to pay for Premium, and YouTube doesn't want anyone to bypass ads. It's hard to imagine, but there was a time when the internet was virtually ad-free. Sure, pop-ups existed here and there, but you didn't have to pay for every service just to enjoy it without ads. Over the last decade, that has changed. Every company has gradually shifted to premium models that promise an ad-free experience. While many users have caved and paid for these services, it feels like a never-ending battle. For example, companies could randomly introduce a new subscription tier for users who want to pay less but are okay with a few ads. Recently, Prime Video announced that, starting June 17, users would have to pay extra if they don't want to see ads while watching content. That's especially strange considering users already pay for a Prime subscription. Now, the ad-free tier is an add-on for subscribers who don't want ads. This has caused a lot of uproar on social media, but Amazon is moving ahead with its new subscription model in India. As more companies play with subscription tiers to offer users more options regarding ads, it's also becoming unclear what exactly we're paying for besides content. Who wins at the end of all this? In most cases, it's just the companies making massive profits.

16 hijacked browser extensions expose 3.2 million users
16 hijacked browser extensions expose 3.2 million users

Fox News

time08-03-2025

  • Fox News

16 hijacked browser extensions expose 3.2 million users

Cybercriminals are constantly finding new ways to exploit trusted apps and browser extensions. Since people tend to trust tools that seem legitimate, attackers use them to spread malware or steal sensitive data. A new report reveals that over 3.2 million users have been affected by a security breach involving malicious browser extensions. These extensions, which appeared genuine, were secretly embedding harmful scripts, stealing data and manipulating search results. GitLab Security has uncovered a major security breach affecting over 3.2 million users through a network of compromised browser extensions, including some linked to GitLab. The attack stemmed from a supply chain breach, where threat actors infiltrated legitimate extensions and pushed malicious updates. These updates embedded hidden scripts that allowed unauthorized data collection, altered HTTP requests and injected ads into web pages — all without users noticing. Originally built for tasks like ad blocking, emoji input and screen recording, these extensions were repurposed through covert updates that exploited the extensive permissions users had granted, enabling real-time manipulation of web activity. Typically, malicious extensions or apps are created solely to steal data, with their advertised functionality being an afterthought or simply a way to get listed in an official store. That was not the case here. These were legitimate extensions that became harmful only after attackers injected malicious updates into them. Several of the compromised extensions are commonly utilized and may be present in your browser. For instance, ad blockers such as AdBlock are valued for eliminating disruptive advertisements and enhancing browsing privacy. However, in this breach, these tools were manipulated to deliver malicious payloads. The following extensions have been identified as affected: If any of these extensions are installed on your browser, it is recommended that you assess their permissions and consider their removal until official security updates are verified. The malicious extensions bypassed Content Security Policy protections, which are designed to prevent cross-site scripting attacks, allowing attackers to modify web content without detection. They also communicated with command-and-control servers to receive further instructions, showing a high level of coordination. The attackers exploited the trust users place in the Chrome Web Store and its automatic update system. Investigations suggest this activity has been ongoing since at least July 2024. If you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome, follow these steps: Here are 6 ways to safeguard your sensitive information and maintain your online privacy: 1. Keep your browser and extensions up-to-date: Outdated software is a goldmine for cybercriminals. Bugs or security gaps in old versions of your browser or extensions can be exploited to inject malicious code, steal data or take control of your system. Updates patch these vulnerabilities, making them a critical line of defense. Turn on automatic updates for your browser (e.g., Chrome, Firefox, Edge) so you're always running the latest version without thinking about it. See my guide on keeping your devices and apps updated for more information. 2. Install extensions only from trusted sources: Official browser stores like the Chrome Web Store or Firefox Add-ons have rules and scans to catch bad actors, but they're not perfect. Extensions from random websites or third-party downloads are far more likely to hide malware or spyware. Stick to the official store for your browser — don't download extensions from sketchy links. 3. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 4. Be skeptical of extensions requesting unnecessary access: Some extensions overreach on purpose. A calculator tool asking for your browsing history or a weather app wanting your login data is a huge red flag. Before installing, ask: "Does this permission match the extension's job?" If the answer's no, don't install it. Watch out for broad permissions like "Read and change all your data on websites you visit" unless it's clearly justified (e.g., a password manager). If an update suddenly adds new permission requests, dig into why. It might mean the extension has been sold or hacked. 5. Update your passwords: Change passwords for any accounts that may have been affected by the incident, and use unique, strong passwords for each account. Consider using a password manager. This can help you generate and store strong, unique passwords for all your accounts. Get more details about my best expert-reviewed Password Managers of 2025 here. 6. Remove your personal data from public databases: If your personal data was exposed in this security incident, it's crucial to act quickly to reduce your risk of identity theft and scams. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Browser extensions can improve functionality but also pose significant security risks if not carefully managed. If you have any of the above extensions installed in Chrome, you should remove them immediately. Treat your browser as a key part of your digital security. Regularly check your extensions, remove unnecessary permissions and be cautious about automatic updates, even from trusted sources. Should browsers implement stricter restrictions on what extensions can do by default? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store