
YouTube Adds New “Jump Ahead” Feature Available to Premium Android Users
- Written by Andrea Miliani Former Tech News Expert
- Fact-Checked by
YouTube has been testing a new AI-powered feature called “Jump Ahead” and recently made it available to all premium customers and YouTube content creators with Android devices in the United States.
The Jump Ahead feature skips to the most relevant part of a video based on the user’s personal behavior data as well as data about how other users watch the video. Data is collected through YouTube’s voluntary experiments and is used to determine where the most relevant part of the video is.
As explained by 9to5Google , users who request to test Jump Ahead will be able to double-tap the skip ahead button, which will reveal the Jump Ahead feature. Users will see the message “jumping over commonly skipped section” after clicking on it, and the video will play from the most relevant section.
For now, Jump Ahead is only available for English-language videos. Content creators don’t need a Premium account to test the feature.
According to Android Authority , Jump Ahead will only be available until June 1. However, this isn’t confirmed by YouTube, so this trial time could be extended or soon rolled out for all premium users globally.
This isn’t the first time a feature like this has been introduced. Google’s Key Moments service, for example, shows a relevant portion of a video in Chrome to help users spot the information they need faster.
But some aren’t so sure how helpful this AI-powered Jump Ahead feature will actually be. One reader commented on Lifekhacker’s article , “But doesn’t YouTube WANT me to watch the whole thing?” Another X user said, “Terrible idea, stop catering to low attention spans.”
Moreover, a few creators worry about their income and engagement in the long term, even if the feature is currently available only for Premium users with ad-free access. The consequences or benefits of Jump Ahead are yet to be seen as YouTube continues with trials.

One-Third of Americans’ Data May Have Been Compromised in UnitedHealth Hack
- Written by Shipra Sanganeria Cybersecurity & Tech Writer
- Fact-Checked by
The February ransomware attack on Change Healthcare, a UnitedHealth Group subsidiary, may have exposed a third of Americans’ data, UnitedHealth CEO Andrew Witty disclosed in testimony to Congress on May 1.
During the tense Congressional hearing , Witty faced questions regarding the Group’s handling of the breach and the disruption inflicted on the US healthcare system. The breach paralyzed the healthcare system nationwide , affecting healthcare providers, patients, and the processing of medical claims.
The Change Healthcare breach left lawmakers clamoring for information, as the company handles approximately 15 billion transactions annually and manages medical claims for around 50% of the US population.
The Congressional committee consisting of the Senate Finance Committee and a panel of the House Energy and Commerce Committee was convened after UnitedHealth declined to appear before the House health subcommittee in April, according to the New York Times .
In the hearing, lawmakers questioned whether the failure of UnitedHealth’s existing security system had led to the breach. It also questioned its adherence to the Health Insurance Portability and Accountability Act (HIPAA) and whether these factors led to the exposure of the personal information of millions of Americans.
When pressed by lawmakers to give a definite answer regarding the stolen data, Witty said, “maybe a third [of Americans] or somewhere of that level” had their healthcare and personally identifiable information (PII) compromised. But, he hesitated to provide a more conclusive response as the investigation into the breach is ongoing.
In a written statement presented to the House subcommittee before the May 1 Senate hearing, Witty expressed that “it is likely to take several months” for the company to analyze the “full scope of impacted patient, provider, and payer information” compromised. He indicated that so far, there’s no evidence that any medical histories had been leaked.
The hearing also cited a December 2023 joint warning issued by the FBI and U.S. cyber and health officials regarding potential attacks on the US healthcare system by groups like AlphV or BlackCat. The warning also recommended mitigation measures, including enabling a multifactor authentication system.
When questioned whether the company’s failure to implement robust security measures had led to the hack, Witty acknowledged the absence of a strong security system. He said that hackers had used stolen credentials to remotely access Change Healthcare’s server, which, despite the joint warning, did not have a multi-factor authentication system in place.
During the hearing, Witty reassured the committee that as of the day of the hearing, all UHG systems have multi-factor authentication enabled. He also said that the company is working with regulators to investigate the breach and will soon notify the impacted customers and individuals.