As Vice President Kamala Harris faces continued pressure from progressives over U.S. military aid to Israel, some Republicans see an opportunity to win over Jewish voters in key swing states.
(Image credit: Spencer Platt)
JPMorgan Chase is filing lawsuits against customers who exploited a viral technical glitch this summer that allowed people to pull huge amounts from Chase ATMs.
(Image credit: Michael M. Santiago)
Google is bringing its AI Overviews feature to more than 100 countries around the world, a massive expansion after initially becoming available just in the U.S. and later a half dozen other countries. AI Overviews, which employ Google's Gemini AI models to summarize answers to search queries, will now be available to more than a billion monthly users.
The paragraphs written by the AI Overviews feature are concise and include links to the sources used to compose them, usually articles from publications, business websites, or related sources. Google has claimed since they debuted that AI Overviews have led to increased engagement with diverse sources on the web.
Along with the geographic expansion, Google is also adding new language support to the service. Depending on where you are located and what language you use for Google Search, you'll see AI Overviews in either English, Hindi, Indonesian, Japanese, Portuguese, or Spanish. The wider access based on location and language isn't the only upgrade for AI Overviews. Google has also unveiled a new link display to showcase the websites and content sources used to produce better AI summaries. The AI Overviews also now include right-hand link displays formatted for desktop and mobile devices. In them, you can see related content on websites, augmenting the in-line links within the AI Overview text.
“With AI Overviews in Search, it’s easier than ever for people to find the information they need and discover relevant sites across the web, which opens up more opportunities to connect with publishers, businesses, and creators.,” Google Vice President of Search Quality Srinivasan Venkatachary explained in a blog post. “Since launching in May and expanding beyond the U.S. in August, the feedback we’ve received for AI Overviews has been highly positive. People prefer using Search with AI Overviews, and they find their search results more helpful. So now, in our largest expansion yet, we’re launching AI Overviews in more than 100 countries and making them accessible in more languages — helping you search in a whole new way, no matter what questions are on your mind.”
Global AI OverviewsThe global rollout makes it clear that the signs that Google was pulling back on AI Overviews were exaggerated. Though there was some speculation that Google was leery about promoting the feature after reports of incorrect and even dangerous answers, that's clearly no longer the case.
Google has even started testing advertisements within AI Overviews, at least for U.S. mobile users. These ads are labeled to differentiate them from standard search results but are aimed at encouraging users to look at and potentially buy products and services relevant to their search terms. Search is the heart of Google's business and remains so despite judicial battles over whether the company is violating anti-monopoly laws. If Google feels comfortable enough with AI Overviews to make it a global feature, the ads are almost certain to follow in its wake, with multilingual AI-generated links that will be seen by billions.
You might also likeThe cookie encryption system that Google introduced to the Chrome browser a few months ago can easily be bypassed, experts have warned.
In fact, a security researcher has recently published a new tool that does just that.
In July 2024, Google released Chrome 127, a new version of the Chrome browser that came with Application-Bound (App-Bound) encryption. The new feature was supposed to serve as a protection mechanism, encrypting cookies using a Windows service running with SYSTEM privileges. The tool was supposed to prevent infostealing malware from grabbing sensitive information stored in the browser, such as login credentials, session cookies, and more.
Higher privileges needded"Because the App-Bound service is running with system privileges, attackers need to do more than just coax a user into running a malicious app," Google said at the time. "Now, the malware has to gain system privileges, or inject code into Chrome, something that legitimate software shouldn't be doing."
But the success of the new feature was short-lived. In late September, we reported that multiple infostealers were already able to work around the feature, including Lumma Stealer, StealC, and many others.
Google responded by saying that it was expected, and added that it was happy the changed forced a shift in attacker behavior.
"This matches the new behavior we have seen. We continue to work with OS and AV vendors to try and more reliably detect these new types of attacks, as well as continuing to iterate on hardening defenses to improve protection against infostealers for our users."
Now, security researcher Alexander Hagenah built and shared a tool on GitHub he called ‘Chrome-App-Bound-Encryption-Decryption’ which does the same as these infostealers, BleepingComputer reports.
"This tool decrypts App-Bound encrypted keys stored in Chrome's Local State file, using Chrome's internal COM-based IElevator service," the project page reads. "The tool provides a way to retrieve and decrypt these keys, which Chrome protects via App-Bound Encryption (ABE) to prevent unauthorized access to secure data like cookies (and potentially passwords and payment information in the future)."
Commenting on all of the above, Google essentially said it was satisfied, since crooks now need higher privileges to pull off the attacks:
"This code [xaitax's] requires admin privileges, which shows that we've successfully elevated the amount of access required to successfully pull off this type of attack," Google said.
Via BleepingComputer
More from TechRadar ProDavid DePape, who was sentenced to 30 years in federal prison for attacking Paul Pelosi with a hammer, was sentenced to life without the possibility of parole following a separate state trial.
(Image credit: Michael Short)
Okay, listen. Maybe I'm in the minority here; I still use and like USB-A. I know the EU wants to drag me kicking and screaming into a glorious utopian future where every device is powered and connected solely with USB-C cables and nothing else, but I'm simply not ready to surrender my sweet asymmetric port of yore. So tell me, Tim Cook, where are the USB-A ports on the new M4 Mac mini you just announced?
That's right: the next-gen Mac mini does look like a wonderful little device - small enough to fit in your hand! - but Apple has officially ended its long-term relationship with USB-A, nixing the two ports found on the previous model in favor of more USB-C ports (five in total). It's a big change, one that goes hand-in-hand with Apple redesigning its 'Magic' accessories to feature USB-C instead of the old proprietary Lightning ports (yes, the Magic Mouse charging port is still on the bottom, but I'm not kicking that particular hornet's nest right now).
At least it has some ports on the front now. Good job on that part, Apple. (Image credit: Apple)I get it. Even as a long-time Apple critic, I can sincerely say that this is a good move from the company. Switching to a uniform connection standard helps with inter-platform connectivity, reduces monopolistic influences within Apple's tightly-controlled hardware ecosystem, and most importantly helps tackle the growing problem that is e-waste. This is a good thing. This is a good thing.
I keep telling myself that - and make no mistake, I'm very happy to see Lightning go to the great electronics store in the sky - but there's a part of me that's disappointed to see a new iteration of the best Apple product (that's right, I said it) arrive without a USB-A port in sight.
USB-A still mattersI didn't want to charge into this article without any statistics to back me up, so I did what everyone seems to do these days: I asked Google for help. According to Google's generative search results, there are many reasons why USB-A is still widely used around the world: familiarity, backward compatibility, and cost being the key reasons.
Okay, I didn't just ask an AI for help with my argument and call it a day, but Google's bot does make some good points. USB-A is cheaper to manufacture and plenty of devices - my own desktop and laptop included - still have compatible ports. It's hardly a surprise that many manufacturers are still selling products that either use USB-A or feature USB-A ports. If you buy a third-party wireless mouse, there's a pretty good chance the cable it comes with will connect to a power source via USB-A rather than USB-C (we don't talk about USB-B).
It's also worth noting that while USB-C might be rapidly becoming the new normal in Europe and the US, that's not the case for the rest of the world. Many countries are effectively 'behind the curve' when it comes to computer hardware, and USB-A is still very much the norm there. Hell, even the National Health Service in my country is still notably outdated in the tech it uses; I saw an awful lot of USB-A ports when I was in and out of hospital for cancer treatment.
These things are still good, dammit!Don't even get me started on flash drives. I know I'm not the only person who still uses them, and all the ones I have use USB-A. I have all sorts of projects and old files backed up on them, plus a few with install-ready Linux distros and even one with a full Windows 10 install image. When I brought this up in a meeting, my boss (the effervescent Matt Hanson) asked how long it had been since I used one. I said 'three days ago'. They're useful, and I don't want to get rid of them.
A fond farewellNow, you're probably thinking, Christian, what's wrong with a USB adapter or dock? And yeah, sure, I don't really have a good rebuttal to that except to say that I already have enough little gadgets that I can't keep track of, and you want me to add more? I'm not having that.
What sort of ungodly contraption is this?! No thank you, sir. (Image credit: Novoo)But as much as it pains me to admit it, it might be time for me to finally bid adieu to my beloved OG connection standard. In the tech world, progress is king, and USB-C represents the rare sort of progress that is actually universally good: the environmental benefits alone are a huge plus, and anyone who knows me will attest that I can always get behind something that helps break up monopolies. Oh, and I won't miss the ol' USB-A Superposition.
That being said... come on, Apple. You can't charge $29 for a USB-C cable, especially not when I can basically buy the exact same product for ten bucks on Amazon. You're sitting at the family table now. Play nice.
Nvidia has released a new patch for its GPU Display Driver for Windows and Linux to fix a handful of rather serious vulnerabilities.
If exploited, the vulnerabilities mostly lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering, which means they are rather serious. Among them is CVE‑2024‑0126, which has a severity score of 8.2 (high severity).
Another six vulnerabilities are scored 7.8, while the final one is scored 7.1. Of the total eight flaws, five affect the Windows ecosystem. They are all user mode layer exploits, in which threat actors could initiate out-of-bound reads and thus execute code remotely. One exploit was for both Windows and Linux.
Smash and grabThe details about the vulnerabilities and how they can be exploited can be found on Nvidia’s security bulletin, here. There was no word of in-the-wild abuse, so we’re guessing crooks haven’t abused these bugs just yet.
However, with Nvidia’s popularity and prevalence, it is now only a matter of time before miscreants start looking for vulnerable endpoints to exploit.
GPUs are a popular target among cybercriminals, and not just those built by Nvidia. For example, in September 2023, security researchers warned of a flaw found in GPUs from all major manufacturers, which allowed hackers to read sensitive data displayed in browsers. Furthermore, in June 2024, ARM said it had found vulnerabilities in Bifrost and Valhall GPU kernel drivers being exploited in the wild.
At the time, the vulnerability was two years old, yet many users did not patch it on time.
Running regular updates to both software and hardware is one of the best ways to prevent cyberattacks. Users are advised to download and install the software update through the Driver Downloads page or, for the vGPU software and Cloud Gaming updates, through the Licensing Portal.
More from TechRadar ProAn Israeli airstrike on a building in northern Gaza overnight killed at least 60 Palestinians, according to Gaza's Health Ministry.
(Image credit: -)
Nadra Wilson and other Virginians got letters saying her U.S. citizenship was in question, along with her voter registration. “I was born in Brooklyn, N.Y. — I'm a citizen,” Wilson told NPR.
(Image credit: AFP via Getty Images)