Discussion on Google's measures to prevent malware sites in their ads, issues with using multiple profiles on Android devices, a speculative execution vulnerability in Apple Silicon, and the pros and cons of TP-Link Omada and Ubiquiti Unifi for managing small and medium business networks.
The clever use of puny code in a malvertising attack highlights the importance of verifying the source of files before downloading.
A bug in Android 14 is causing storage access issues for users with multiple profiles on their Pixel 6 devices, making it advisable to postpone updating.
Deep dives
Clever Malvertising Attack Exploits Puny Code for Key Pass's Official Website
Attackers used puny code to create a look-alike website for Key Pass, which appeared legitimate due to the use of a visually similar character with a dot underneath it. The attack made it difficult to spot the presence of puny code in the address bar. Furthermore, the attackers went the extra mile by digitally signing the malware with a seemingly legitimate certificate, highlighting the importance of verifying the source even if a file appears to be signed. The incident emphasizes the need for caution when downloading files and ensuring they are indeed from the expected source.
Pixel 6 Users Face Storage Access Issue with Multiple Profiles After Updating to Android 14
A bug in Android 14 is causing problems for Pixel 6 users who have multiple user profiles on their devices. After the update, the primary profile loses the ability to access storage, leading to issues such as being unable to take pictures. Users are forced to log in to a secondary profile to regain storage access, but this creates a problem as the data is still trapped under the primary profile. This bug has been confirmed on Pixel 6, Pixel 6 Pro, Pixel 7, and Pixel 5 devices. It is advisable for users with multiple profiles to hold off on updating to Android 14 until a fix is released.
iOS and macOS Browsers Vulnerable to Data Exposure Exploit
Researchers have discovered a side channel attack vulnerability in iOS and macOS browsers that allows hackers to extract sensitive information from the device's RAM. The exploit demonstration website showcased its ability to access various data points, including parts of passwords, tokens for websites, browser history, and even Gmail contents. This vulnerability affects all browsers on iOS due to the underlying WebKit framework used by Apple. While Apple has acknowledged the issue and is working on a patch, users are advised to exercise caution when browsing and ensure the prompt installation of updates.
TP-Link Omada Recommended Over Ubiquiti Unify for Small and Medium Business Networks
When it comes to software-defined networking and managing networks for small and medium businesses, TP-Link Omada is recommended over Ubiquiti Unify. While Unify may have a more visually appealing interface, Omada offers a more streamlined and reliable experience. The Omada interface stays out of the way and allows users to efficiently manage their network configurations. In contrast, Unify firmware updates often come with functionality issues and can be frustrating to navigate. Omada provides a solid alternative, offering ease of use, reliability, and efficient network management.
What Google should do to prevent malware sites in their ads, why you might want to avoid using multiple profiles on Android devices, a speculative execution vulnerability in Apple Silicon, and the pros and cons of TP-Link Omada and Ubiquiti Unifi.