Starting June 30, 2016 Indian news site have put in ad blocker mechanisms. So if you don’t want to be tracked you can’t access their news.
IMHO its no big loss as you can read most of the really important news on sites like the BBC and CNN :p
Or you can use an ad blocker like uBlock Origin on Mozilla Firefox like I do. The plugin is also available on Chrome and on Opera (are there any other noteworthy browsers?)
Of the many ad blockers (free and paid) available ‘Origin is the best. Its completely replaced Ghostery and Disconnect for me. Both add considerable resource overhead (no-no when using an older computer with under 2 GB RAM).
Update@July 12/16: Times of India web edidition isn’t being bypassed by the ad blocker 🙁 but if you click the stop button when the page loads you can read without ads.
And ‘Origin let’s you white list specific pages via Ctrl+Click. Not exact but it should tide you over until the news providers come to their senses.
POODLE is the latest Internet threat that targets our need to prefer secure (aka https) connections over unsecured (aka http) ones. POODLE (Padding Oracle On Downgraded Legacy Encryption) specifically targets a weakness in the SSL (Secure Sockets Layer) 3.0 protocol by exploiting a hard-coded flaw within SSL 3.0 to gain access to your data through browser cookies! (more…)
About a day before this post a new security vulnerability has been detected in Adobe Flash player that causes Flash to switch on the webcam (if available). Of course you have to visit a website running the compromised code.
At risk are all versions of Flash released so far (Flash Player 11 is the latest build). And the exploit works (for now) on OS X Safari and Firefox. Windows browsers may be safe along with Google Chrome because of of a bug affecting opacity within CSS files. Wow! Imagine being saved by bad protocol.
Attackers exploits the bug by using a form of “clickjacking” where clicks on a seemingly innocuous webpage launch malicious functions. All you script kiddies have to do is hide the camera settings within an invisible iFrame. Once launched the clicks activating the webcam are hidden behind clicks in a simple Flash game!
But there’s a catch: for now the only page that allows an attack to work is hosted by Adobe “Websites Privacy Settings Panel” that controls the webcam and mic security settings. So all Adobe has to do is fix how this page works. Something its working to do immediately.