Friday, October 31, 2025

AI-Powered Browsers: The Hidden Security Crisis We Can’t Ignore

The Wake-Up Call

Image Courtesy: Microsoft Copilot


Brave Browser recently uncovered a vulnerability so deep it shakes the very foundations of web security. This isn’t just another patch cycle—it’s a paradigm shift. AI-powered browsers, designed to summarize, automate, and assist, are now being exploited through prompt injection attacks that can hijack banking credentials, work accounts, and even health data.

Let that sink in: the very tools meant to simplify our digital lives may be opening doors to invisible intruders.

What’s a Prompt Injection—and Why It’s Dangerous?

Prompt injection is a stealthy technique where malicious instructions are embedded into content that AI agents read or summarize. These hidden commands can trick the browser into executing actions without user consent.

There are two types:

  • Direct Injection: Attackers manipulate input fields to override user intent.

  • Indirect Injection: Malicious prompts are buried in webpages, PDFs, or social media posts. When the AI interacts with this content, it unknowingly follows the attacker’s instructions.

In AI browsers, this can lead to:

  • Credential theft via clipboard or autofill manipulation

  • Unauthorized bank transfers or access to financial dashboards

  • Session hijacking through exposed cookies or tokens

  • Email and work account compromise via automated summaries or replies

Why AI Browsers Are Uniquely Vulnerable

Unlike traditional browsers, AI-powered ones:

  • Interpret and act on content autonomously

  • Execute tasks based on inferred intent

  • Often lack robust sandboxing or permission boundaries

This makes them fertile ground for attackers who understand how to manipulate language, context, and automation.

What Can Users and Teams Do to Stay Safe?

Here’s a strategic checklist for individuals, teams, and enterprises:

Personal Measures

  • Disable AI summarization on sensitive sites (banking, health, work portals)

  • Avoid interacting with unknown or untrusted content via AI agents

  • Use privacy-first browsers like Brave that actively monitor and patch vulnerabilities

  • Clear clipboard and session data after using AI tools

Organizational Measures

  • Audit AI browser permissions across teams and endpoints

  • Educate employees on prompt injection risks and safe usage

  • Segment access—don’t allow AI agents to interact with critical systems without oversight

  • Demand transparency from vendors on how AI agents are sandboxed and monitored

The Leadership Imperative

This isn’t just a technical issue—it’s a leadership moment. As AI becomes embedded in our workflows, we must ritualize resilience, clarity, and emotional intelligence in how we adopt and govern these tools.

Security isn’t just about defense—it’s about dignity. It’s about protecting the trust our customers, partners, and readers place in us.

Final Reflection

AI browsers are powerful. But power without boundaries is vulnerability. Let’s not wait for a breach to start asking the right questions.

If you're building, deploying, or simply exploring AI-powered tools, now is the time to pause, reflect, and manage your security posture.

Let’s lead with clarity. Let’s protect what matters.


Notes:

Should We Encourage Standard Browsers Without AI Plug-ins?

Yes—for sensitive tasks, absolutely. For banking, healthcare, enterprise dashboards, and any activity involving confidential credentials, users should default to standard browsers like Microsoft Edge, Google Chrome, or Safari without AI plug-ins or extensions. These browsers are battle-tested, regularly audited, and generally more predictable in how they handle session data, cookies, and form inputs.

Why AI Plug-ins Pose a Risk

AI plug-ins often:

  • Interpret page content dynamically, which can expose them to prompt injection attacks.

  • Access clipboard, autofill, and session tokens, sometimes without clear boundaries.

  • Summarize or act on content, which can be manipulated by attackers embedding hidden instructions.

Even well-intentioned AI features can become attack vectors if they’re not sandboxed properly.

Strategic Recommendation

Rather than banning AI browsers outright, we should customize their use:

  • Use standard browsers for sensitive tasks—banking, work portals, health records.

  • Reserve AI-powered browsers for research, summarization, and low-risk browsing.

  • Educate users and teams on when and how to safely engage AI tools.

  • Demand transparency from vendors about how AI agents are sandboxed and monitored.

This isn’t about fear—it’s about clarity. AI browsers are powerful, but they must be treated as autonomous agents with boundaries.

~ Mohan Krishnamurthy

#Article in collaboration with Microsoft Copilot


Saturday, October 25, 2025

Bridging the Generational Gap: Managing New Generation Team Members

Managing a team with significant generational differences requires empathy, adaptability, and intentional communication. Here’s a structured approach to address the challenges while fostering a productive and cohesive environment:

Image Courtesy: OpenAI ChatGPT


1. Understand the Generational Context

First, recognize that differing work attitudes often stem from generational values rather than disinterest. For example:

  • Generation Z (25s): May prioritize work-life balance, flexibility, and purpose-driven tasks. They often expect clear feedback and value autonomy.
  • Millennials/Gen X (34s): May appreciate stability but also seek meaningful growth and recognition. They might prefer digital tools and collaborative workflows.

Avoid stereotypes—instead, engage in individual conversations to understand their motivations (e.g., “What aspects of your role feel most fulfilling?” or “What challenges do you face in managing tasks?”). This builds trust and reveals underlying issues (e.g., unclear goals, lack of growth opportunities).


2. Clarify Expectations Transparently

Many generational gaps arise from misaligned assumptions about work norms.

  • Define “core hours”: If punctuality is critical for meetings, specify non-negotiable times (e.g., 9 AM–12 PM) while allowing flexibility for start/end times if productivity isn’t impacted.
  • Set boundaries for availability: Explain why after-hours calls are necessary (e.g., client time zones, urgent deadlines) and clarify exceptions (e.g., “Non-urgent calls can wait until morning”).
  • Standardize task management: Introduce tools like Microsoft ToDo, Trello, or Notion to track todos, deadlines, and progress. Frame this as a collaborative system, not just a “checklist,” to reduce resistance.

Ground rules in shared goals (e.g., “Punctuality ensures we deliver projects on time, which keeps clients happy and supports team morale”).


3. Adopt a Flexible, Supportive Leadership Style

Younger teams often respond better to leaders who balance structure with empathy:

  • Foster autonomy: Assign clear outcomes rather than micromanaging daily tasks. For example, “I need this report by Friday—how do you plan to approach it?” instead of dictating steps.
  • Offer flexibility where possible: If frequent breaks (e.g., smoke, soft drinks) don’t disrupt workflow, allow them. Research shows short breaks can boost productivity.
  • Provide growth opportunities: Address “no hunger to grow” by linking daily tasks to their career goals. For instance, “This project will help you develop skills in X, which aligns with your interest in Y.”


4. Reinforce Purpose and Recognition

Motivate through meaning, not just compliance:

  • Connect tasks to impact: Explain how their work contributes to the team/company’s mission (e.g., “Your client follow-ups directly improve retention rates”).
  • Celebrate progress: Acknowledge small wins (e.g., “Great job finishing that task early—it helped us avoid delays”). Public recognition (e.g., team shoutouts) can be highly motivating.
  • Invest in development: Offer training (e.g., time-management workshops, industry certifications) or mentorship. This signals you care about their growth, increasing commitment.


5. Model the Behavior You Want to See

Lead by example to set a positive tone:

  • Arrive on time for meetings and respect agreed-upon boundaries (e.g., avoid unnecessary after-hours messages unless urgent).
  • Use the task-management tools yourself and share your own todo lists to normalize their use.
  • Demonstrate adaptability (e.g., learn to use their preferred communication apps like Microsoft Teams) to bridge gaps in tech familiarity.


6. Address Underperformance Proactively

For persistent issues (e.g., repeated lateness, missed deadlines):

  • Have private, constructive conversations: Focus on impact, not blame. Example: “I noticed the last two client calls were delayed—how can we adjust your schedule to ensure timely responses?”
  • Link consequences to shared goals: If flexibility is revoked, explain it’s to protect team efficiency (e.g., “If meetings start late, we risk missing project milestones”).
  • Set clear incentives: Reward consistent performance (e.g., extra PTO, project ownership) and align consequences with company policies (e.g., formal warnings for repeated lateness).


7. Build a Collaborative Culture

Encourage mutual learning to bridge gaps:

  • Leverage their strengths: Younger team members may excel at digital tools or social media—ask for their input on process improvements (e.g., “How could we streamline client communication?”).
  • Share your experience: Frame your expertise as a resource, not a mandate (e.g., “In my past roles, I found X strategy effective—what do you think?”).
  • Team-building activities: Organize informal sessions (e.g., lunch-and-learns, problem-solving workshops) to foster connection and reduce “us vs. them” dynamics.


Key Takeaway:

Generational differences are an opportunity to blend experience with fresh perspectives. By prioritizing understanding, clear communication, and support, you can transform attitudes into engagement. Focus on outcomes over rigid adherence to traditional norms, and align expectations with their values (flexibility, purpose, growth).


Remember, effective leadership adapts to the team, not the other way around. Small, consistent efforts to connect and collaborate will yield long-term results.


#Article in Collaboration with K2 Think AI. 

Wednesday, October 22, 2025

The AI Browser War Has Begun: Dia, Atlas, Comet vs. Chrome, Edge, Safari

The browser is no longer just a window to the web—it's becoming your co-pilot, your strategist, your memory. In 2025, three AI-native contenders—Dia, OpenAI Atlas, and Perplexity Comet—are rewriting the rules of internet navigation. This isn't just a tech upgrade. It's a paradigm shift.

The New Challengers: Vision, Disruption, and Emotional Intelligence

Dia: The Research Companion

  • Developed by The Browser Company, Dia is designed for multi-tab thinkers, writers, and researchers.

  • Features include AI summarization, customizable chatbots, and “Skills” that automate code snippets, writing, and content curation.

  • Dia remembers your browsing journey like a trusted friend, offering context-aware assistance and emotional continuity.

  • Target audience: creators, analysts, and anyone who treats the browser as a workspace.



OpenAI Atlas: The Agentic Super-Assistant

  • Built around ChatGPT, Atlas replaces the traditional search bar with a conversational interface.

  • Agent Mode can autonomously complete tasks—booking travel, comparing products, retrieving files.

  • Deep memory integration allows seamless recall of past sessions and tab groups.

  • Atlas is OpenAI’s bid to own the entire browsing experience, not just live inside it.

Perplexity Comet: The Predictive Navigator

  • Comet blends intelligent search, contextual awareness, and automation into a Chrome-based shell.

  • It anticipates user needs, executes small tasks, and offers voice commands and shopping assistance.

  • Comet is free, fast, and designed to feel like a browser that “thinks with you.”

What They're Trying to Change

  • From passive browsing to active assistance: These browsers don’t just display content—they interpret, summarize, and act.

  • From search engines to task engines: AI browsers aim to replace traditional search with goal-oriented workflows.

  • From tabs to memory: They remember your context, preferences, and previous actions—turning the browser into a continuity engine.

The Traditional Titans Respond

Microsoft Edge: Copilot Mode

  • Edge now features Copilot Mode, integrating AI into every tab.

  • Unified input box for chat, search, and navigation; future updates promise task automation and memory-based journeys.

  • Microsoft is betting on deep integration across Windows, Office, and enterprise workflows.

Google Chrome: Gemini Integration and Defensive Strategy

  • Chrome remains dominant but faces erosion from AI-native challengers.

  • Google is integrating Gemini AI into Chrome and Android, while defending its search monopoly in court.

  • Chrome’s future may hinge on how well it blends AI without disrupting its massive ad ecosystem.

Apple Safari: Quiet but Strategic

  • Apple is exploring AI search integrations with ChatGPT, Perplexity, and Claude.

  • Safari’s search volume declines and Apple’s intent to rethink default search partnerships.

  • Safari may become the stealth disruptor—embedding AI into Siri, Spotlight, and device-native experiences.

What This Means for Users—and the Web

  • Browsing becomes personalized, predictive, and proactive.

  • Search engines may lose relevance as AI agents bypass traditional links.

  • Privacy, transparency, and trust will become central battlegrounds.

  • Publishers and advertisers must adapt to AI-mediated discovery.

Final Thought: The Browser as Creative Command Center

For creators, strategists, and legacy builders, this war isn’t just about features—it’s about agency. The browser is evolving into a space where memory, intention, and action align. Whether you're drafting a novel, onboarding a partner, or orchestrating a business transformation, your browser may soon become your most emotionally intelligent collaborator—one that understands your goals, adapts to your workflow, and reflects your creative journey.


~ Mohan Krishnamurthy

#Article in collaboration with Microsoft Copilot

Thursday, June 19, 2025

Blackbox vs. Whitebox vs. Graybox Testing


This blog post provides a concise overview of the three main types of software testing: Blackbox, Whitebox, and Graybox testing. It outlines the key differences between these approaches, focusing on the level of internal system knowledge required and the testing methodologies employed. Understanding these distinctions is crucial for developing a comprehensive and effective testing strategy.

Courtesy: Napkin.ai


Blackbox Testing

Blackbox testing, also known as behavioral testing, is a software testing technique where the internal structure, design, and implementation of the item being tested are not known to the tester. The tester treats the software as a "black box," focusing solely on the inputs and outputs.

Key Characteristics:

  • No Knowledge of Internal Structure: Testers do not need to know the code, internal architecture, or implementation details.

  • Focus on Functionality: Testing is based on requirements and specifications.

  • Input-Output Driven: Tests are designed to provide specific inputs and verify the corresponding outputs.

  • User Perspective: Simulates how an end-user would interact with the software.

Examples:

  • Testing a website by entering different search queries and verifying the results.

  • Testing a calculator by inputting various mathematical expressions and checking the calculated values.

  • Testing a login form by entering valid and invalid credentials and verifying the system's response.

Advantages:

  • Simple to implement as no knowledge of the internal code is required.

  • Unbiased perspective, as testers are not influenced by the internal workings.

  • Effective for identifying usability issues and functional defects.

  • Can be performed by non-programmers.

Disadvantages:

  • May not uncover hidden errors or logic flaws within the code.

  • Can be less efficient in finding bugs compared to whitebox testing.

  • Difficult to design test cases for complex systems without some understanding of the underlying logic.

Whitebox Testing

Whitebox testing, also known as structural testing or glass box testing, is a software testing technique where the internal structure, design, and implementation of the item being tested are known to the tester. The tester has access to the code and uses this knowledge to design test cases.

Key Characteristics:

  • Knowledge of Internal Structure: Testers need to understand the code, internal architecture, and implementation details.

  • Focus on Code Coverage: Testing aims to cover all code paths, branches, and statements.

  • Code-Driven: Tests are designed based on the code's structure and logic.

  • Developer Perspective: Simulates how a developer would test the software.

Examples:

  • Testing individual functions or methods within a class.

  • Testing specific code branches or loops.

  • Testing error handling routines.

  • Performing code coverage analysis to ensure all code is executed during testing.

Advantages:

  • Effective for identifying hidden errors, logic flaws, and security vulnerabilities.

  • Allows for thorough testing of all code paths and branches.

  • Can optimize code for performance and efficiency.

Disadvantages:

  • Requires in-depth knowledge of the code and programming languages.

  • Can be time-consuming and complex, especially for large systems.

  • May not uncover usability issues or functional defects from a user perspective.

  • Can be expensive due to the expertise required.

Graybox Testing

Graybox testing is a software testing technique that combines elements of both blackbox and whitebox testing. The tester has partial knowledge of the internal structure, design, and implementation of the item being tested.

Key Characteristics:

  • Partial Knowledge of Internal Structure: Testers have some understanding of the code, architecture, or algorithms.

  • Focus on Integration and Data Flow: Testing aims to verify the interaction between different components and the flow of data through the system.

  • Hybrid Approach: Combines blackbox techniques (input-output testing) with whitebox techniques (code analysis).

  • Developer/Tester Collaboration: Often involves collaboration between developers and testers.

Examples:

  • Testing web services by understanding the API contracts and data formats.

  • Testing databases by understanding the schema and data relationships.

  • Testing security features by understanding the authentication and authorization mechanisms.

Advantages:

  • Provides a balance between blackbox and whitebox testing.

  • Can identify both functional and structural defects.

  • Allows for more targeted and efficient testing.

  • Facilitates better communication and collaboration between developers and testers.

Disadvantages:

  • Requires a certain level of technical expertise.

  • Can be more complex to implement than blackbox testing.

  • May not be as thorough as whitebox testing in covering all code paths.

Monday, October 21, 2024

New Stock Market Fraud Alert!

 Let me share the latest stock market fraud going around the country. The terms you will be hearing are:

  • Institutional Trading
  • Block Deals
  • AI Algorithms, and
  • Confirmed IPO allocations

Modus Operandi

  1. You will be searching for some Stock Market resources on the Social Media Websites
  2. Advertisement lures you with 10x to 30x returns
  3. Invitation comes to join a WhatsApp or Telegram Group
  4. You will find several people posting their trade screenshots
  5. Each one of these screenshots shows 30%-50% gains
  6. An 'expert' will help you with formalities to open an account
  7. You have to invest anything from 1 - 10 lakhs (1 million)
  8. You will deposit the money into various bank accounts (why?) as advised by the expert
  9. You will get an advice to 'buy' a stock when they say
  10. You will get an advice to 'sell' a stock when they say
  11. You can't sell a stock whenever you want. The sell button is disabled.
  12. First few days, you will be getting 20-30% returns
  13. You are then pushed by the agents to invest more
  14. Assured by the returns you will be funding your account more
  15. 'No Demat' account is required (How?)
  16. Everything happens in 'their' app (So they can show whatever gains they want)
  17. They'll allow you to withdraw profits first few times
  18. Later on, you will not be able to withdraw your profits or your investments
  19. Similar approach to IPO. They will ask you to invest in an upcoming IPO. To your surprise, you will get 100% allocation. They will ask you to introduce more funds.

It looks like a mafia, run under the banner of some big stock trading companies. Often linked to foreign companies. Once you are inside, you can never come out. More luring with schemes follows. Introduce your friends get 10% discount on your brokerage. One-month 300x returns, etc. Aim of this mafia is to loot small amounts from large number of people. Assume 100,000 people investing 100,000 bucks to 1 million bucks every day. Imagine the amount of money the backend network makes per day.

Government has banned hundreds of loan apps that wiped-out the wealth of the middle class in India. Several people have committed suicide. This is one such platform.

Middle-class have been scammed several times in the past. Emu farm, multi-level marketing, binary gold purchase schemes, and Teak trees, etc.

Alert!

  1. Never buy stocks on the tips from WhatsApp, Telegram, and other Social Media websites
  2. Stay away from Trading platforms that says no need to have a 'Demat' account
  3. Limit yourselves with authorised trading platforms such as ICICI Direct, Kotak Securities, and HDFC Securities.
  4. Stay away from all new trading platforms, and apps.
  5. If you don't understand Stock market, stay away from it.
  6. If you have surplus, then invest little, invest regularly. Stay away from dramatic returns.
  7. Multi-bagger is a theory. Not for regular investors.
  8. Never introduce your friends to any of your Stock networks; even the intention is to help them earn money.
  9. Limit your exposure to manageable limits (of loss).
  10. Don't indulge in intra-day unless you can handle a loss.
  11. If you don't have time to learn stock market, invest in Mutual funds, in small amounts.
  12. Don't go for margin trading. You can't have more liabilities than your assets.
  13. Don't go for Futures & Options. This is not for part-time investors.
  14. If you are 'scammed' by any such platforms, openly share this to your friends and relatives so that they can be cautioned.

There is no easy way to make money. Only hard work pays. Anybody or any company claims there is an easy way to make money, your inner voice should say 'stay away', and 'it's too good to be true'.

Leave your comments if you have heard about, or experienced similar scams.

Source: Personal experience of one my contacts who has lost a lot of money.


Article by: Mohan K Madwachar

AI-Powered Browsers: The Hidden Security Crisis We Can’t Ignore

The Wake-Up Call Image Courtesy: Microsoft Copilot Brave Browser recently uncovered a vulnerability so deep it shakes the very foundations o...