Today’s hottest smartphone deals come from Motorola and REDMAGIC

Motorola Razr camera app folded

Credit: Ryan Haines / Android Authority

Are you looking to get a new smartphone? These are pretty much tiny pocket computers, and they are priced as such. Smartphones aren’t cheap! I am firmly against paying full price for anything, so I am always on the lookout for great deals. Today, we have a couple. The Motorola Razr 2024 is available for just $449, which equates to a $250.99 discount. If you want something with more raw power, the REDMAGIC 9S Pro is $20 off, bringing the cost down to $629.

Buy the Motorola Razr 2024 for $449

YouTube tests hiding views and upload dates, leaves fans bemused (Update: Not what it looks like)

YouTube app logo

Credit: Robert Triggs / Android Authority
  • YouTube is testing hiding views and upload dates on its homepage.
  • The proposed changes have drawn a largely negative initial reaction from fans.
  • The platform hasn’t revealed the reasons for the testing, but it could be to encourage engagement with a wider range of videos.

Update, October 30, 2024 (06:27 PM ET): Earlier this week, the internet (or, at least, the subset of it that’s very invested in YouTube) kind of collectively freaked out when the screenshot featured here, appearing to depict a YouTube home page devoid of useful information like upload dates and view counts, started getting attention. No one really seemed to have anything positive to say about it — other than being glad that they weren’t running into this on their own devices. As it turns out, there’s probably a good reason for that, as this wasn’t actually something YouTube was testing at all.

Following up to a thread on X where the screen was shared, the official TeamYouTube account posts that this is not the result of a new interface tweak Google is trying out, but likely a consequence of users installing browser extensions that interfere with the site (via 9to5Google).

The Hidden Threat of Web Scraping and How to Fight Back

Today’s organizations face a daunting challenge: effectively and at scale detecting and preventing web scraping attacks. These attacks, which involve automated data extraction from websites, can have far-reaching consequences, ranging from increased infrastructure costs to the loss of sensitive information and intellectual property. 

Web scraping attacks pose a unique challenge due to their versatility and adaptability. Unlike other forms of automated abuse, such as account takeover or denial of inventory attacks, web scraping can target any application or endpoint within a domain. This breadth of potential targets makes detection and mitigation particularly challenging,  mainly when traditional approaches rely on application instrumentation, adding complexity and delay to development workflows. 

Key Challenges in Prevention 

Scraping attacks have the potential to occur throughout an organization’s domain, unlike other automated forms of business logic abuse that tend to target specific applications and related endpoints. For instance, while account takeover/credential stuffing attacks focus on applications requiring user credentials and denial of inventory attacks concentrate on checkout applications and their API requests, scraping aims at a broader range of endpoints. This wide-reaching nature of scraping makes prevention a challenge.  

Ensuring effective detection and mitigation of web scraper attacks requires a comprehensive approach that covers all public-facing applications, including those with dynamically generated URIs. However, attempting to prevent scraping using a bot mitigation tool that necessitates application instrumentation can present significant obstacles. Injecting an agent into every web application and endpoint within the domain can lead to delays and complexities in the application development and deployment workflow. If the URI is dynamically generated, adding an agent may further impede page load times, exacerbating the processing burden. 

Scraping attacks rely on HTTP GET requests, automated attacks initiated by sending straightforward HTTP GET requests to targeted URIs. Since HTTP GET requests typically constitute 99% of all transactions on a standard domain, any bot mitigation strategy must be capable of processing all such transactions. However, this presents challenges in both scalability and efficacy, given that most bot mitigation approaches struggle to handle the entirety of site/domain traffic. Additionally, the emphasis on utilizing HTTP POST for sending device fingerprinting logic means these traditional management approaches often overlook most attack signals originating from HTTP GET requests. 

Lastly, scraping attacks exploit application APIs and endpoints, which are increasingly pivotal in transitioning toward a faster, more iterative application development workflow. These API endpoints provide access to the same information users access via rich web-based interfaces, catering to mobile customers, partners, and aggregators. In the face of resistance from web applications, scraping attacks seamlessly pivot to utilizing API endpoints to achieve their objectives. However, first-generation bot mitigation tools encounter a significant challenge in thwarting scraping attacks targeting these API endpoints. Unlike web pages or software development kits (SDKs), API endpoints lack a tangible surface for installing agents. Since API consumers often operate as bots, integrating JavaScript or a Mobile SDK proves exceedingly challenging. 

Getting Ahead 

Organizations must adopt a strategic approach to defense to effectively combat web scraping attacks. Rather than relying solely on traditional bot mitigation tools, which may struggle to keep pace with evolving attack techniques, a comprehensive strategy centered around API security is essential.  

Organizations can detect and prevent even the most sophisticated scraping attacks by leveraging behavioral fingerprinting and machine learning without intrusive application instrumentation. Invest in solutions that offer holistic coverage across all public-facing applications, including web, mobile, and API-based endpoints. By utilizing tools that continuously monitor and analyze incoming traffic, security teams can efficiently identify patterns indicative of scraping activity, enabling proactive intervention to mitigate potential threats before they escalate. 

The Benefits of Proactive Defense 

The threat of web scraping attacks is real and pervasive but not insurmountable. Organizations can fortify their defenses with API-centric security solutions to future-proof their infrastructure against emerging threats and maintain a competitive edge in an increasingly digitized landscape. Organizations can mitigate the financial and reputational risks associated with scraping attacks, enhance operational efficiency, and ensure uninterrupted business continuity by adopting a proactive stance towards web scraping prevention.  

 

The post The Hidden Threat of Web Scraping and How to Fight Back appeared first on Cybersecurity Insiders.

What to Do If Hit by Ransomware

Ransomware attacks are increasingly common, and falling victim to one can be a terrifying experience. If you find yourself in this situation, here’s a step-by-step guide on how to respond effectively.

1. Stay Calm and Assess the Situation  

• Don’t panic. Take a moment to assess what’s happening. Identify which files or systems have been affected.

 • Note the ransom message. Document the details, including the ransom amount, payment methods, and any deadlines provided.

2. Disconnect from the Network

• Immediately isolate the infected device to prevent the ransomware from spreading to other computers or devices on your network.
 

• Disconnect from Wi-Fi and unplug any Ethernet cables.

3. Do Not Pay the Ransom
   

• Paying the ransom does not guarantee that you will regain access to your files. It can also encourage further attacks.
   

• Law enforcement agencies generally advise against paying the ransom.

4. Identify the Ransomware
   

• Try to identify the specific type of ransomware by researching the ransom note or using online resources. Websites like ID Ransomware can help you determine the variant.
   

• Knowing the ransomware type can assist in finding possible decryption tools.

5. Report the Incident
   

• Report the attack to local law enforcement and any relevant authorities. In the U.S., you can contact the FBI’s Internet Crime Complaint Center (IC3).

• If your organization is involved, notify your IT department or security team immediately.

6. Consult Security Professionals
   

• Engage cybersecurity experts who can help analyze the situation, recover data, and improve your defenses against future attacks.

7. Restore from Backups

• If you have backups of your data, begin the process of restoring them. Ensure that backups are clean and unaffected by the ransomware before restoring.

• Regularly test your backup systems to ensure they function properly in emergencies.

8. Remove the Ransomware

• Use reputable antivirus or anti-malware software to scan and remove the ransomware from your system.

• Make sure the removal process is thorough to prevent reinfection.

9. Change Passwords
   

• After addressing the ransomware, change all passwords, especially those related to sensitive accounts. This helps prevent unauthorized access.

10. Implement Preventative Measures
   

• Update Software: Regularly update your operating system and applications to patch vulnerabilities.

• Educate Users: Train employees on recognizing phishing attempts and other attack vectors.

• Regular Backups: Maintain frequent, automated backups to minimize data loss in future incidents.

11. Monitor Systems and Data
   

• Keep an eye on your systems for any unusual activity post-recovery.

 • Implement monitoring solutions to detect potential threats in real-time.

Conclusion

Dealing with a ransomware attack is challenging, but following these steps can help mitigate damage and facilitate recovery. Always prioritize prevention through education and robust cybersecurity practices to minimize the risk of future attacks.

The post What to Do If Hit by Ransomware appeared first on Cybersecurity Insiders.

Need a good USB-C hub? This UGREEN Uno one is cute, capable, and 20% off

UGREEN Uno 6 in 1 USB C Hub

Credit:

Our devices are getting thinner than ever, but having such slim and gorgeous designs comes with downsides. The main one is that even laptops are starting to lack ports, which many of us still consider essential. If you need some extra ports, looking into a good USB-C hub is the easiest solution. While there are many great ones, sometimes I am left scratching my head when I look at some of these prices. This is why I love the UGREEN Uno 6-in-1 USB-C Hub, which usually costs only $19.99, and today, it’s 20% off, bringing the cost down to just $15.99!

Buy the UGREEN Uno 6-in-1 USB-C Hub for just $16.99

Alphabet shares Q3 revenue up 15% to $88.27 billion

  • Alphabet reports Q3 2024 revenue of $88.27 billion, up from $76.67 billion in 2023.
  • Search, Cloud, and YouTube growth all helped drive the year-to-year rise.

Google may be facing some eye-wateringly high fines from Russian courts, and while we’ll likely never see those paid, parent company Alphabet sure has a lot of money sitting around at the moment. Today the company shares just how well it’s been doing, with the release of some very favorable Q3 2024 financial figures.

Overall, revenue is up 15% year-to-year from 2023, hitting $88.27 billion. Alphabet shares that YouTube ad revenue is up nearly a billion dollars alone, coming in at $8.92 billion. Between that and subscriptions, CEO Sundar Pichai tells us that over the past year, YouTube’s brought in over $50 billion, setting a new record for itself in the process.

Apple Intelligence is here, and these are the features it’s still missing

Apple iPhone 16 back

Credit: Ryan Haines / Android Authority

Virtually every single tech giant has jumped on the AI bandwagon and Apple is no exception. The iPhone maker has eschewed its typical wait-and-watch approach to new technologies in favor of an aggressive feature push to compete with Google and Samsung. And that’s how we got Apple Intelligence, a suite of AI features that promise to make your iPhone, iPad, and Mac more proactive and useful. But not every Apple Intelligence feature will make its way to your device right now and you may even have to wait until 2025 for some of the highlights.

So in this article, let’s break down which Apple Intelligence features you can use today, and which ones you’ll need to wait a bit longer for.

You can now do an official Google course to learn how to talk to AI chatbots

google gemini live interruption summary

Credit: Rita El Khoury / Android Authority
  • Google is now offering a course on AI prompting, to teach you how to talk to AI.
  • The program is designed to teach people how to talk to AI chatbots and make the most of Generative AI — no experience required.
  • You’ll have to pay a small fee for the certificate course.

Ever wonder why you can’t get the most out of an AI chatbot, and your friend can seem to always find the best use for it? That’s because you’re probably not using the right AI prompts, a.k.a. you don’t know how to talk to AI. Well, Google knows this better than anyone, so it’s now offering a course to share its knowledge and teach people how to prompt its AI.

OnePlus 13: Bigger battery, fast charging, and fan-favorite features revealed

OnePlus 13 Evan Blass

Credit: Evan Blass
  • OnePlus confirmed key details for the OnePlus 13, including a 6,000mAh battery with 100W wired and 50W wireless charging, offering 11 hours of video playback on a full charge.
  • The phone will support Wi-Fi 7, NFC upgrades, and feature four AI noise-reducing microphones for enhanced call clarity.

OnePlus has confirmed a number of details about the OnePlus 13 over the weekend. We think by the time the phone launches on October 31, we will have heard and seen almost everything about the upcoming Snapdragon 8 Elite phone. The latest details spilled by OnePlus include information about the OnePlus 13’s battery, charging, buttons, connectivity, and more.

Google quietly fixed the biggest problem with Quick Share for Windows

  • Quick Share for Windows no longer requires your Windows PC and Android phone to be connected to the same Wi-Fi network to get decent transfer speeds.
  • Instead, your Windows PC just needs to have Wi-Fi turned on, even if it’s not connected to any network.
  • Previously, if your Windows PC and Android phone weren’t on the same network, your files would transfer really slowly over Bluetooth.

One of the best tools to transfer files between your Android phone and your Windows PC is Quick Share. It’s easy to set up, easy to use, and transfers files really quickly. However, one major issue with the Quick Share for Windows client is that it transfers files really slowly if your Windows PC isn’t on the same Wi-Fi network as your Android phone. At least, that’s how things used to be, because Google quietly fixed this problem some time back.

When Google launched Quick Share for Windows back in 2023, it stressed that both your Android phone and your Windows PC need to be connected to the same network in order to get the best file transfer speeds. If not, then Quick Share would transfer files over a Bluetooth connection, which is dramatically slower than a Wi-Fi connection. For example, when I tried to transfer a 5.4GB file from my Android phone to my Windows PC over a Bluetooth connection, the transfer rate hovered around 60KB/s, meaning it would take close to a day to complete the transfer.

Google updates Quick Share for Windows, fixing several issues

Quick Share

Credit: Damien Wilde / Android Authority
  • Google is rolling out a new update for the Quick Share app on Windows.
  • This update, version 1.0.2002.2, focuses on fixing bugs and improving performance, not adding new features.
  • Some of the key fixes address issues with file names, saving preferences, and Bluetooth/Wi-Fi connectivity.

Google’s Quick Share, born from a merger of Android’s Nearby Share and Samsung’s Quick Share, lets you quickly beam files between Android phones, Chromebooks, and Windows PCs. Now, a new update has just given its Windows app a significant stability boost. (h/t: 9to5Google)

The version 1.0.2002.2 update is currently rolling out and focuses primarily on resolving issues that impacted the app’s performance and reliability. Notably, the update addresses problems with file names containing non-ASCII characters, which previously caused crashes or prevented files from opening correctly. Additionally, it resolves issues with saving user preferences and ensures the application icon reliably appears in the Start menu. Further improvements target connectivity, with fixes for Bluetooth and Wi-Fi stability during file transfers.

Using an old Samsung phone? Your device could be at risk from a serious vulnerability

samsung galaxy stock photo

Credit: Rita El Khoury / Android Authority
  • Google discovered a severe vulnerability in certain older Samsung Exynos processors that hackers are actively exploiting.
  • The flaw allows attackers to gain control over affected devices, potentially accessing sensitive functions remotely.
  • Samsung has acknowledged the flaw and issued an October security patch to fix it.

Google’s security team has just revealed a severe vulnerability of certain Samsung phones, and hackers are already exploiting it. Google’s Threat Analysis Group (TAG) uncovered this exploit, detailing how attackers are leveraging a bug within Samsung’s processors to gain unauthorized access and execute arbitrary code on devices. (h/t: The Register)

The vulnerability, identified as CVE-2024-44068, targets Samsung’s mobile processors, including older models like Exynos 9820, 9825, 980, 990, 850, and W920. This vulnerability could impact a variety of Samsung devices, especially older models like the Galaxy S10 and Note 10 series. Samsung has released a patch as part of its October 7 security maintenance update, but older devices might miss out on this protection if they lack regular software support.

Google might be wrapping up a Gemini surprise for the holidays

  • Gemini 2.0 may launch as soon as this December.
  • The landmark release would arrive roughly one year after Gemini 1.0.

Google has been on an AI kick all year long, and it feels like it’s never a few weeks before we’re hearing about the latest work on Gemini, whether that’s Nano, Live, or one of its many Extensions. Now a new report attempts to predict when the next generation of Gemini will be ready to make its debut.

Earlier today we checked out a report from The Verge claiming that OpenAI is getting ready to introduce its next big model in December. Apparently this could be a very busy month for the industry, as the site now claims that Google could be preparing Gemini 2.0 for December, as well (via 9to5Google).

Apple MacBook Air prices plunge ahead of M4 announcement, and even I got one!

apple macbook air 15 inch lid

Credit: Ryan Haines / Android Authority

Apple has been teasing the release of its upcoming M4 MacBooks, which we should learn more about in the coming week. We’ll have to wait and see what those are all about, but one thing is for sure: most of you can live very happily with an M3 or even an M2 processor. If you’re looking to save some cash and get one of the industry’s best laptops, the M2 and M3 MacBook Airs are on a fire sale right now. You can get the Apple MacBook Air M3 for just $849.99. Alternatively, the Apple MacBook Air M2 is down to a mere $699.99.

Buy the Apple MacBook Air M3 for only $849.99

Oxygen OS 15 adds a new Simple Mode that makes it easier to use your OnePlus phone

  • Oxygen OS 15 adds a new accessibility feature called Simple Mode.
  • Simple Mode makes sounds louder and also makes text and home screen icons much larger.
  • This feature will make OnePlus phones and tablets easier to use, especially for the elderly or people with visual impairments.

OnePlus is a smartphone brand that’s well-known for offering great bang for your buck, which makes it tempting to buy some of their devices as gifts to give to friends or family members. Since OnePlus devices run on Android, anyone you give them to should be able to use them without many issues, thanks to the abundance of built-in accessibility options. To make their phones and tablets even easier to use by the elderly or people with visual impairments, OnePlus is introducing a new feature called Simple Mode in Oxygen OS 15.

Located under Settings > Accessibility & convenience in Oxygen OS 15, Simple Mode makes text and icons larger, simplifies the home screen and Settings, and boosts the ringtone and notification volume streams to the maximum level.

-- Get the right stuff from a partner you trust. --

Partners

-- IT NEWS --

Blog

admin December 11th, 2025

Credit: Edgar Cervantes / Android Authority TL;DR Spotify is getting a new “Prompted Playlist” feature to help users create more […]

admin December 11th, 2025

TL;DR Four of the best Good Lock modules aren’t working properly on the One UI 8.5 beta. Home Up and […]

admin December 10th, 2025

This is an open thread. We want to hear from you! Share your thoughts in the comments and vote in […]