News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

This Clever Kindle Trick Lets You Download 25 Books at Once - but It's Risky

A new hack allows Kindle users to download up to 25 books at a time instead of the tedious process of downloading them individually, significantly reducing the time and effort required to back up a large library. This method involves using a Chrome extension called Tampermonkey to run a script that automates the download process, although it comes with significant risks, including potential security vulnerabilities and the possibility of data loss. Users are cautioned to proceed with caution, understanding that the effectiveness of the method can vary based on individual setups and the potential for unexpected technical issues.

See Also

Saving Money on Kindles: Amazon's Secret Discounts Δ1.80

Amazon has secret ways to slash Kindle prices, and most shoppers miss them. I've noticed that there tend to be two types of reactions from users: some want to move off the Kindle platform as quickly as possible, while others desire a new Kindle. As part of the bulk download process, my wife realized she could no longer load Kindle books on her old devices due to outdated security protocols.

5 Hidden Ways to Upgrade Your Kindle Without Paying Full Price Δ1.79

Amazon offers several lesser-known strategies for customers to save money when upgrading their Kindle devices, enabling significant discounts through trade-ins, cashback, and promotional deals. The article outlines methods such as trading in old devices for a 20% discount, using an Amazon credit card for additional savings, and taking advantage of Kindle Unlimited promotions to maximize the overall value of the purchase. These strategies reveal that with careful planning and attention to detail, Kindle users can enhance their reading experience while minimizing costs.

Best Kindle Deals Right Now Δ1.72

The best Kindle (2024) deals offer various options for readers looking to upgrade their e-reader experience, from budget-friendly choices like the entry-level Kindle starting at $109.99 to more premium options like the Paperwhite Signature Edition. Amazon has also introduced a new kid-friendly version of its popular e-reader, the Kindle Kids, which comes with additional features and accessories. For those seeking deals, discounts on these models can be found, but be aware that prices may vary depending on the retailer.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.71

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

The Dark Side of Chrome Extensions: Hidden Dangers Lurking on Your PC Δ1.70

As recent news reminds us, malicious browser add-ons can start life as legit extensions. Reviewing what you’ve got installed is a smart move. Earlier this month, an alarm sounded—security researchers at GitLab Threat Intelligence discovered a handful of Chrome extensions adding code in order to commit fraud, with at least 3.2 million users affected. But the add-ons didn’t start as malicious. Instead, they launched as legitimate software, only to be later compromised or sold to bad actors.

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.70

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.70

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

DVD Pirates Face Justice as Feds Crack Down on Online Piracy Δ1.69

A 37-year-old Tennessee man has been arrested for allegedly stealing Blu-rays and DVDs from a manufacturing and distribution company used by major movie studios and sharing them online before the movies' scheduled release dates, resulting in significant financial losses to copyright owners. The alleged DVD thief, Steven Hale, is accused of bypassing encryption that prevents unauthorized copying and selling stolen discs on e-commerce sites, causing an estimated loss of tens of millions of dollars. This arrest marks a growing trend in law enforcement efforts to curb online piracy.

Getting Extra Storage Space with a Tiny Flash Drive Δ1.69

A compact 256GB USB flash drive is the easiest way to add extra storage space on your laptop without breaking the bank. Samsung's 256GB Fit Plus thumb drive is currently available for $23 on Amazon, offering a significant 34% discount from its regular price. This tiny drive is robust, waterproof, and compatible with multiple devices, making it an ideal solution for users who need a fast and reliable way to transfer files.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.68

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

How I Got 15GB of Gmail Storage for Free - and Without Losing Any Files Δ1.67

A simple and effective method allows Gmail users to archive their emails and media while freeing up storage without losing important data. By utilizing Google Takeout for backups and creating a new Gmail account for archiving, users can declutter their inbox and optimize storage capacity without the hassle of manual deletions. This strategy not only preserves essential emails but also ensures a fresh start with the original account.

Securely Erasing Your Digital Footprint with a Data Shredder Stick Δ1.67

A data shredder stick is the easiest and most secure way to wipe your old laptop's contents, providing peace of mind when selling or recycling it. This Windows-friendly tool overwrites data, making it impossible to recover once done, giving users greater control over their digital legacy. By using a data shredder stick, individuals can ensure their personal information and files are protected from falling into the wrong hands.

Revolutionizing Reading: AI-Powered Bookmark Mark 1 Offers Intelligent Summarization Δ1.67

The new Mark 1 AI-powered bookmark aims to transform the reading experience by generating intelligent summaries, highlighting key themes and quotes, and tracking reading habits. This device can collate data on reading pace, progress, and knowledge scores, providing users with a more engaging and intuitive way to absorb information. By integrating with a companion application, readers can share insights and connect with others who have read similar texts.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.67

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

5 Devices to Help Ease Your Smartphone Addiction Δ1.67

The prevalence of smartphone addiction has led to a surge in innovative devices aimed at helping users reduce their screen time while still maintaining connectivity. Products like Unpluq and Boox Palma 2 offer unique approaches, from physical blocking mechanisms to distraction-free e-readers, catering to various user preferences and needs. This trend highlights a growing recognition of the need for balance in a digitally dominated world, encouraging users to re-evaluate their relationship with technology.

Avoid Unexpected Credit Card Charges With My Ultimate Online Shopping Hack Δ1.67

Using virtual cards can significantly enhance online shopping security by allowing consumers to manage their spending and limit exposure to fraud. Services like Privacy.com enable users to create virtual card numbers with specific spending limits, making it easier to handle subscriptions and free trials without the risk of unexpected charges. This method not only protects personal financial information but also offers peace of mind when dealing with unfamiliar vendors.

5 Ways to Add Laptop Storage — Without Installing a New SSD Δ1.67

Expanding a laptop's storage can be achieved through various methods without the need for an internal SSD upgrade. Options such as using SD or microSD cards, USB flash drives, external drives, network-attached storage (NAS), and cloud storage provide flexibility for users facing storage limitations. Each method has its own advantages and trade-offs, allowing users to choose the best solution based on their specific needs and usage patterns.

Snail Mail Spam Takes Center Stage in Ransomware Campaigns Δ1.67

A company's executives received an extortion letter in the mail claiming to be from BianLian ransomware group, demanding payment of $250,000 to $350,000 in Bitcoin within ten days. However, cybersecurity researchers have found that the attacks are likely fake and the letter's contents bear no resemblance to real ransom notes. Despite this, the scammers are using a new tactic by sending physical letters, potentially as part of an elaborate social engineering campaign.

Cybercriminals Caught for Stealing Hundreds of Concert Tickets Through StubHub Exploit Δ1.66

The recent arrest of two cybercriminals, Tyrone Rose and Shamara Simmons, has shed light on a sophisticated scheme to steal hundreds of concert tickets through a loophole in StubHub's back end. The pair, who have been charged with grand larceny, computer tampering, and conspiracy, managed to resell about 900 tickets for shows including Taylor Swift, Adele, and Ed Sheeran for around $600,000 between June 2022 and July 2023. This brazen exploit highlights the ongoing threat of ticket scams and the importance of vigilance in protecting consumers.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.66

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Unlocking Wordle's Secrets — Find Today's Answer and Hints for Game #1352 Δ1.66

Today's Wordle has vowels in two places, starts with the letter D, has no repeated letters, ends with Y, and features a supreme being as its answer. The game requires strategic thinking, as the absence of repeated letters makes it more challenging to narrow down options. With the right starting word, players can tackle this puzzle and keep their streak going.

Microsoft Discoveries Vulnerable Software Attack. Δ1.66

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Go Read This: The Verge’s Favorite Reads From All over the Web Δ1.66

The Verge has compiled a continually updated list of engaging articles and longreads from across the internet, aimed at helping readers navigate the overwhelming volume of content available online. This curated collection spans a variety of topics, including journalism, technology, culture, and history, ensuring there’s something for everyone. By presenting these diverse reads, The Verge invites discussion and exploration of ideas that resonate with its audience.

How Major Bank Rolls Out Multi-Layered Security for Millions of Customers. Δ1.66

Commonwealth Bank is introducing a new layer of security to its internet banking, requiring millions of customers to approve each login attempt via the app. The bank claims this will make it harder for fraudsters to access customer accounts. However, critics argue that the added complexity may push some users away from mobile banking altogether.

BadBox Malware Hit After Infecting Over 500,000 Android Devices Δ1.66

Cybersecurity experts have successfully disrupted the BadBox 2.0 botnet, which had compromised over 500,000 low-cost Android devices by removing numerous malicious apps from the Play Store and sinkholing multiple communication domains. This malware, primarily affecting off-brand devices manufactured in mainland China, has been linked to various forms of cybercrime, including ad fraud and credential stuffing. Despite the disruption, the infected devices remain compromised, raising concerns about the broader implications for consumers using uncertified technology.