Monday, February 29, 2016

Photo gallery: RSA Conference 2016

The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos of the first day of the conference, with the Expo Floor still being set up, and the crowd gathering to hear one of the many interesting talks and panels, participate in workshops and learning labs, visit the RSAC CyberSafety Village and see what’s new at the Innovation Sandbox.
from Help Net Security http://ift.tt/21FFBz3

Endpoint Protector: Fight data leakage on Linux workstations

At RSA Conference 2016 in San Francisco, CoSoSys released Endpoint Protector DLP for Linux in Private Beta, enabling protection against data leakages for confidential data on organization’s Linux workstations. “With a number of sectors including education, government, nuclear and aviation, relying extensively on Linux, we are pleased to announce Endpoint Protector DLP for Linux,” said Roman Foeckl, CoSoSys CEO. “By continuing our work to support enterprises with mixed environments, we are able to empower organizations … More
from Help Net Security http://ift.tt/1SexkQ4

Privileged identity management for SSH keys

ManageEngine launched Key Manager Plus, a comprehensive, Web-based, SSH key management solution at RSA Conference 2016. Available immediately, the new product joins ManageEngine’s privileged identity management suite to help administrators take control of SSH keys. Safeguarding data in transit has always been a big challenge for security administrators. Most IT organizations today use SSH for remote administrative access and data transfer. While robust and convenient when compared to password-based authentication, SSH keys present some unique … More
from Help Net Security http://ift.tt/21FDYkX

Qualys releases app for ServiceNow Configuration Management Database

Qualys announced it has received certification of its application with ServiceNow. The Qualys App for ServiceNow CMDB is an application that synchronizes Qualys IT asset discovery and classification with the ServiceNow Configuration Management system. The App automatically updates the ServiceNow CMDB with any assets discovered by Qualys and with up-to-date information on existing assets, giving ServiceNow users full visibility of their global IT assets on a continuous basis. Qualys collects real-time inventory information about IT … More
from Help Net Security http://ift.tt/1QgHTj3

Snapchat snared by phishers impersonating CEO, employee data swiped

Snapchat said that it is "impossibly sorry" for the breach, which exposed an unknown number of past and present workers to identity theft.
from Naked Security http://ift.tt/1oJEGzk

Identifying abuse of compromised credentials in real-time

DB Networks announced at RSA Conference industry-first capabilities to non-intrusively identify compromised credentials in real-time by uniquely applying machine learning and behavioral analysis to every database communication. This powerful new feature is now available in its DBN-6300 and Layer 7 Database Sensor products. Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new approach. Those who were once considered trustworthy may have lost … More
from Help Net Security http://ift.tt/1OIvxMm

Employee and HR data is the most commonly encrypted data

The use of encryption continues to grow in response to cyber-attacks, privacy compliance regulations and consumer concerns, and the majority of organizations plan to transfer sensitive data to the cloud within the next two years, the results of the latest 2016 Global Encryption Trends Study by Ponemon Institute have shown. The global encryption study is in its 11th year and shows how organizations around the world are dealing with increased vulnerabilities and implementation of encryption … More
from Help Net Security http://ift.tt/1LQ1UZD

War Room app for enterprise incident response and collaboration

Today at RSA Conference, Rook Security introduced War Room, an enterprise app that provides real-time unified incident and crisis management collaboration in the cloud. Designed out of necessity to raise the bar beyond the highly inefficient and disparate ways enterprises communicate when managing incidents and crisis response, War Room is an action-oriented cloud service command center that aggregates the pieces of information enterprises need to have a comprehensive view of incident details in one shared … More
from Help Net Security http://ift.tt/1nbRSM5

Minimize your organization’s threat exposure with Qualys ThreatPROTECT

At RSA Conference 2016, Qualys announced the Qualys ThreatPROTECT solution. Built on the Qualys Cloud Platform, ThreatPROTECT correlates data from vulnerability scans and active threat data from multiple sources into a single dynamic dashboard to provide a holistic and contextual view of an organization’s threat exposure. With ThreatPROTECT, customers can visualize, prioritize and take action to minimize exposure from vulnerabilities related to the threats that matter most. Not all Common Vulnerabilities and Exposures (CVEs) are … More
from Help Net Security http://ift.tt/1OI5hC2

The “HawkEye” attack: how cybercrooks target small businesses for big money

Here's a type of malware attack that makes it easy for low-tech criminals to pull off high-tech crimes...
from Naked Security http://ift.tt/1RA3KlP

Passwordless security for consumer-facing websites

At RSA Conference 2016, iovation launched its new Customer Authentication service that allows consumer-facing websites to enhance security while streamlining and improving the customer experience. The easy-to-integrate device authentication service eliminates friction by allowing consumers with “known devices” to bypass passwords and immediately access relatively low-risk but still confidential sections of their online accounts—like account balances, shopping records and activity histories. If needed, iovation’s device authentication triggers stronger “step-up” authentications like one-time passwords for higher … More
from Help Net Security http://ift.tt/1OI22KQ

ThreatStream rebrands as Anomali, redefines threat intelligence

ThreatStream changed its name to Anomali and launched two new products at RSA Conference: Harmony Breach Analytics for mid-to-large enterprises and the Anomali Threat Analysis Reports Service for small to medium sized businesses. “SIEMs today can only ingest and correlate a small fraction of the 25 Million indicators of compromise we’ve curated that are currently listed as active. We see threat intelligence as the next ‘big data’ problem,” said Hugh Njemanze, CEO of Anomali. “For … More
from Help Net Security http://ift.tt/1KXQ2dg

European Commission presents EU-US Privacy Shield

The European Commission – the executive body of the European Union – issued the legal texts that will put in place the EU-US Privacy Shield, a new framework for protecting the fundamental rights of Europeans where their data is transferred to the United States and ensure legal certainty for businesses. The new framework reflects the requirements set by the European Court of Justice in its ruling from 6 October 2015. The US authorities provided strong … More
from Help Net Security http://ift.tt/1TMuMK2

Google knows where your photos were taken

Street View images + machine learning = Google pinpointing almost any pic.
from Naked Security http://ift.tt/21vF46h

How mobile apps leak user data that’s supposedly off-limits

Ad networks give away data on age, gender, whether we have kids, income, political affiliation, martial status and more, researchers found.
from Naked Security http://ift.tt/1QfMamY

IRS raises number of Get Transcript app breach victims yet again

Remember when back in May 2015 the IRS took offline its Get Transcript app because it was misused by cybercriminals to access sensitive personal information of more than 100,000 taxpayers? Well, the final number is much, much higher. In a statement released on Friday, the Internal Revenue Service said that “the Treasury Inspector General for Tax Administration conducted a nine-month long investigation looking back to the launch of the application in January 2014 for additional … More
from Help Net Security http://ift.tt/1LPqTfD

Tor users being actively blocked on some websites

On other sites, they're being fed a degraded service or forced to deal with "awful" CAPTCHAs.
from Naked Security http://ift.tt/1QmZcQL

“Acceptable Ads”: Are there any? And who gets to monetize them?

OK, just how much do you hate web and mobile ads? Necessary evil? Must destroy all? Or somewhere in between?
from Naked Security http://ift.tt/1VMHGWz

Disney rumored to be using anti-drone drones to protect Star Wars filming

Disney production teams will be filming scenes for "Star Wars: Episode VIII" in Croatia, and the studio is rumored to be taking exceptional measures to keep any footage from leaking out.
from Naked Security http://ift.tt/1RzwEm9

Going to RSA? Get exclusive free swag!

Heading to RSA in San Francisco this week? We have a special prize giveaway just for Naked Security readers!
from Naked Security http://ift.tt/1Thjeiq

CTB Locker ransomware now also encrypts websites

The well-known crypto ransomware CTB Locker is back. After a considerable slowdown in distribution, it is being pushed onto users again, and this time its executable have been signed with a stolen certificate. But what is even more interesting is that there is a new variant of the malware, and this one targets websites instead of Windows workstations. According to a security researcher that goes by the online handle Benkow, at least 102 websites have … More
from Help Net Security http://ift.tt/1pkbdwq

Phishing underground: Exploiting the human vulnerability

At the RSA Conference in San Francisco, PhishLabs exposed the murky evolution of a thriving, sophisticated phishing underworld. Their report is based on more than one million confirmed malicious phishing sites residing on more than 130,000 unique domains, and the movement of more than 90 threat actor groups and organizations actively deploying spear phishing. Key findings Spear phishing remains the primary initial attack vector used by APT actors. However, 22 percent of spear phishing attacks … More
from Help Net Security http://ift.tt/1TJVuBW

Monday review – the hot 24 stories of the week

From the Apple/backdoors debate to an explanation of "mousejacking" - Catch up with everything we wrote in the last seven days.
from Naked Security http://ift.tt/1OHgDGr

Are CIOs wasting millions on infosec that doesn’t work?

There’s overwhelming consensus among IT executives that the foundation of cybersecurity—cryptographic keys and digital certificates—is being left unprotected, leaving enterprises blind, in chaos, and unable to defend their businesses, according to Venafi. CIOs acknowledge they are wasting millions of dollars on layered security defences because these tools blindly trust keys and certificates – unable to differentiate between which keys and certificates should be trusted and which shouldn’t. With Gartner predicting that 50% of network attacks … More
from Help Net Security http://ift.tt/1RexTob

IoT wishes for RSA Conference 2016

With so many questions to be answered on the future of security and IoT, I’m happy to see that, once again, it’s that special time of the year when the collective movers and shakers of the security world get together to meet at RSA Conference in San Francisco. This year’s theme is “Connect to Protect” which is, I think, either a masterfully summoning clarion call for the industry as a whole, or perhaps the most … More
from Help Net Security http://ift.tt/1KX12HQ

Sunday, February 28, 2016

A mobile data breach could cost you $26.4 million

While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile devices can be a critical part of any cyber attack. Based on a study of 588 IT and security leaders at Global 2,000 companies, a new report by the Ponemon Institute and Lookout examines the risk introduced by employees accessing increasing amounts of corporate data via … More
from Help Net Security http://ift.tt/1oIxnI2

The rise of polymorphic malware

97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats are truly global and highly dynamic. Many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. Countering these threats requires an innovative approach to attack detection that leverages advanced techniques and up-to-the-second threat intelligence. Key findings from … More
from Help Net Security http://ift.tt/1oRXv3Y

Week in review: Linux Mint hack, crypto ransomware hits hospitals, and educating policymakers on cybersecurity

Here’s an overview of some of last week’s most interesting news and articles: Can poorly designed embedded devices kill? The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and security-aware embedded systems design around the world. MouseJack: Remote exploitation via radio frequencies Using an attack which researchers have named MouseJack, malicious actors are able to take over a … More
from Help Net Security http://ift.tt/1UtrECk

Protecting enterprise data centers from threats that target Linux servers

Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more aggressive campaigns. Traditionally these have consisted of DDoS attacks, but more recently attackers are increasing their utilization of these comprised resources to distribute malware to other systems outside the affected company. When it comes to protection, Linux systems suffer from the same shortcomings inherent in … More
from Help Net Security http://ift.tt/1XUbHFc

ServiceNow reinvents security response

ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams a single platform to respond to security incidents and vulnerabilities. ServiceNow Security Operations includes two cloud-based applications: Security Incident Response and Vulnerability Response. By extending ServiceNow’s workflow and automation software to incident and vulnerability response, organizations can remove inefficient, manual processes – such as using emails, phone calls or spreadsheets. ServiceNow … More
from Help Net Security http://ift.tt/1LOO1ei

CyberCalifornia initiative to facilitate research and innovation

More than ever, California stands at the forefront of new technologies based on the Internet of Things (IoT). We are also increasingly vulnerable, a fact underscored by breaches of corporations and government agencies that have impacted millions across the nation. Toward that end, a state-wide alliance of cyber security leaders, companies, educators and elected officials – CyberCalifornia – has been formed. The non-profit coalition will work closely with select representatives from government, industry and academia … More
from Help Net Security http://ift.tt/1oIkttu

Remove Candle Wax From Your Carpet With a Hair Dryer and Paper Towels

Don’t cry over spilled candle wax. You can pull it out of your carpet quickly and easily with some paper towels and a hair dryer.

In this video from the HouseholdHacker YouTube channel you’ll learn how to pull candle wax from the fibers of your carpet using some items you probably have at home. Lay some paper towels over the wax, then blow air at the spot with your hair dryer on high heat. You’ll see the wax start to bleed into the paper towel. Once one paper towel gets saturated with wax, swap it out for a fresh one. Eventually you won’t have any more wax to absorb out of the carpet. You can also do a similar trick with a paper bag and an iron.

http://ift.tt/214JZFE...

8 Mind-Blowing Ways To Use Your Hair Dryer | YouTube


Contact the author at patrick.allan@lifehacker.com.


from Lifehacker http://ift.tt/1UsV2Zy

Saturday, February 27, 2016

Isn’t Linux immune to malware? [Chet Chat Podcast 233]

Here'sthe latest episode of our award-winning security podcast - enjoy!
from Naked Security http://ift.tt/1Rw7Awh

Listen With Your Eyes, Ears, and Gut to Avoid Miscommunication

You probably know that listening is an important part of effective communication, but so is how you listen. Real listening is more than just hearing.

In this animation from the TED-Ed YouTube channel, Katherine Hampsten explains how miscommunication happens and reveals a few helpful tips on how you can avoid it in your daily life. Miscommunication can often be traced back to someone not listening to someone else, even if they heard what was being said. If you want to be a better listener, you need to listen with your eyes and gut in addition to your ears when someone is talking. Communication is more than just words, and you’ll be able to pick up on what’s actually being expressed if you give your full attention to someone who’s talking to you. Look at their body language and facial expression while you listen, and use your gut to get a better idea of what they’re really saying. Proper listening is a full body exercise.

http://ift.tt/1knWUE3...

How miscommunication happens (and how to avoid it) - Katherine Hampsten | YouTube


Contact the author at patrick.allan@lifehacker.com.


from Lifehacker http://ift.tt/1QbG9HZ

Give Any Drink a Smokey Taste and Appearance by Mixing a Smoked Cocktail

You’ve probably had some rich, flavorful smoked meat before, but now you can have the same flavor in your favorite cocktails. Also, when you pour and serve, it will look like a magic smoking elixir.

The Cocktail Chemistry YouTube channel is back to make mixing cocktails almost look more fun to mix than drink. This time around you’ll learn how to properly “smoke” a cocktail. You’ll need a sealable, clear bottle (he uses an empty whiskey bottle), some wood to smoke (apple, cherry, or hickory), plus whatever ingredients and tools you need for your cocktail (he makes an old fashioned in this video). Begin burning part of your wood so it catches on fire. Once it’s lit, extinguish the flame and put the bottle over the wood to capture the smoke. When the bottle is filled with smoke, seal it off. Now mix your cocktail, pour it into the smoke-filled bottle, and shake. After a few moments, pour your cocktail in a glass to be served and watch smoke pour out with it to settle in and around the glass.

http://ift.tt/1KRfC3O...

Cocktail Chemistry - Smoked Cocktail | YouTube


Contact the author at patrick.allan@lifehacker.com.


from Lifehacker http://ift.tt/1Q9oMY6

Link Multiple Raspberry Pi's Together for a Souped Up DIY Cluster Computer

The Raspberry Pi’s great, but it’s certainly not that powerful. One way to boost that power is to create a cluster computer. Instructables user gigafide shows you how.

Clustering together a bunch of Raspberry Pi’s isn’t exactly a cheap option, but it can still be useful if you just need a bit of a boost for some Raspberry Pi’s you already have sitting around. You’ll need at least two Raspberry Pi’s for this, but you can use as many as you want. After getting the basics set up on each Pi, you’ll link them together with a couple of commands and end up with a more powerful cluster computer. It’s not exactly going to blow a modern computer out of the water with its performance, but it might provide the extra boost you need to finish off a project of your own.

How to Make a Raspberry Pi SuperComputer | Instructables


Contact the author at thorin@lifehacker.com.


from Lifehacker http://ift.tt/1LjiLcr

How to Clean Your Kitchen With Common Household Items

Cleaning the kitchen can feel like a Sisyphean battle against a greasy stovetop. No matter how often you clean, there’s still more surfaces that need to be wiped down. But you can make effective cleaning solutions from common household items and skip the store-bought products

For example, you can mix hydrogen peroxide and baking soda to make a paste that will effectively clean grease stains. And you can clean a wooden cutting board by wiping it down with vinegar, covering it with salt, and scrubbing it with a lemon. A little ingenuity and elbow grease and you’ll be on your way to a clean kitchen.


Contact the author at andy@lifehacker.com.


from Lifehacker http://ift.tt/1Lj62GA

Find Out How Much You’ve Spent on Amazon Since Opening Your Account

You can buy just about anything on Amazon, which means most of us spend a lot of money on the site. if you’ve ever wondered how much you’ve spent since opening your account, this video from Business Insider will show you how to find out.

Amazon lets you review your spending over time, and the option goes all the way back to the first year you opened your account. While you can’t see the totals straight from your account, you can download a report and, with a little spreadsheet magic, see your grand total over the years. Business Insider walks you through the process in the above video.

It’s mostly just fun to see, but it also sheds some light on how much spending adds up over time. In general, the tool is an easy way to get reports on your purchases, which can be useful if you need to track expenses. Give it a try for yourself by checking out the above video.

Here’s how to see how much you’ve spent on Amazon in your lifetime | Business Insider


Contact the author at kristin.wong@lifehacker.com.


from Lifehacker http://ift.tt/2100jHV

Get into RSA 2016 free, meet our experts, hear great talks!

In San Francisco? Visit us at RSA 206 for free...
from Naked Security http://ift.tt/1XPJ7Vf

Crypto ransomware hits German hospitals

At least three hospitals in the German state of North Rhine-Westphalia have been hit with crypto ransomware. One is Lukas Krankenhaus (Lukas Hospital) in Neuss, the second one is Klinikum Arnsberg, an academic teaching hospital that’s part of the Westphalian Wilhelms-University in Münster, and the third one is still unnamed. According to DW, it’s still unclear if they have been hit with the same ransomware, but they didn’t get any targeted ransom demand apart from … More
from Help Net Security http://ift.tt/1pc2ufx

Apple will unbrick iPhones bricked by “1970” bug

Telling your iPhone it's 1970 can lock it up when you reboot, even after a firmware fix. Apple can now bring it back to life...
from Naked Security http://ift.tt/1XPAvOv

Apple responds in iPhone unlocking case: US seeks “dangerous” powers

Apple says the US government's request for a backdoor to the iPhone is a dangerous overreach of its constitutional powers.
from Naked Security http://ift.tt/1QKlpdF

Hospitals vulnerable to cyber attacks on just about everything

After two years of simulating attacks on monitors, health records, surgeries and more, researchers concluded that patients are pretty much sitting ducks.
from Naked Security http://ift.tt/1TIdf5L

Apple says DoJ’s request for iPhone unlocking is unconstitutional

Apple has filed a motion to vacate the earlier court order that would force them to help the FBI access the contents of the iPhone of the San Bernardino gunman by creating a new OS that would bypass existing security measures. The motion The motion is long and thorough, and in it the company has trotted out every argument against the court order it could think of. This was likely done with the expectation of, … More
from Help Net Security http://ift.tt/1S5yGwB

Computers can tell if you’re bored

Imagine a future where your micro-twitchiness spurs an AI app to kick up the jam before your forehead hits the keyboard.
from Naked Security http://ift.tt/21wdzWS

Start getting ready for Europe’s new data protection regulation today

You are in charge of your organization’s security. Depending on how large and well resourced your business IT function is, your card might read IT director, CIO, CTO, or CISO. In all events, if yours is a EU-based company or a non-EU one that deals with personal data of EU citizens, the General Data Protection Regulation (GDPR) brings a new legal obligation that your organization has to comply with: when a personal data breach has … More
from Help Net Security http://ift.tt/21lLaWF

Is zero-effort computer security a dream?

Researchers from the University of Alabama at Birmingham and Aalto University have found vulnerabilities in a recently proposed user-verification security system for computers. This new security system, developed by Dartmouth College researchers, was created in response to a need for easy-to-use authentication systems. “In our technologically based society, we need a password to do just about everything — from banking to communicating,” said Nitesh Saxena, Ph.D., the director of the Security and Privacy In Emerging … More
from Help Net Security http://ift.tt/1TbbNco

Can poorly designed embedded devices kill?

The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and security-aware embedded systems design around the world. The survey incorporates complete responses from more than 2,400 qualified engineers, 46 percent from North America, 33 percent from Europe, and 11 percent from Asia. Such a large, worldwide response makes this independent survey a comprehensive look at the state of … More
from Help Net Security http://ift.tt/21lEUOI

Thursday, February 25, 2016

Porn Clicker Android malware hits Google Play hard

In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google Play. The “Porn Clicker,” as ESET researchers have dubbed the threat, does not steal user information or download additional malware – it simply clicks on ads generated by the attackers’ servers and shown on pornographic websites. The user is none the wiser, as the malicious app does so … More
from Help Net Security http://ift.tt/1UnLzm4

Cyber microscope enables advanced security anomaly detection

Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that increases the speed and resolution of detection by more than 100 times. These processors are designed around an understanding of how the sensory cortex of the brain processes streams of data in parallel. The device consists of a PCIe-compatible interface card, driver and PCRE compiler integrated into Suricata or … More
from Help Net Security http://ift.tt/1R5Xi3q

Phantom: Security automation and orchestration platform

The Phantom platform can integrate existing security technologies and provide a layer of “connective tissue” between otherwise disparate systems. Phantom was recently recognized as a finalist in the RSA Conference Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of new technologies that have the potential to transform the information security industry. “Phantom is a force-multiplier for our security team,” said Jay Leek, CISO at Blackstone. “We saw it first … More
from Help Net Security http://ift.tt/1Oz7pf8

DB Networks partners with Cyphort and Security On-Demand

Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network perimeter to deep in the database, and their Layer 7 Database Sensor has been chosen to power Security On-Demand’s Database Threat Protection service. Cyphort Cyphort’s Advanced Threat Defense platform will leverage event information from DB Networks’ Layer 7 Database Sensor to help increase fidelity on verdicts of malicious content. … More
from Help Net Security http://ift.tt/1VIyouD

Ping Identity enhances its Federated Access Management technology

Ping Identity updated its Federated Access Management technology. Designed to displace legacy Identity and Access Management infrastructures, this latest release includes enhancements to single sign-on, multi-factor authentication and access security technologies. As enterprises race to digitize every business function, concerns about security are holding them back. As a result, secure access has become the linchpin of digital transformation for the global enterprise. Ping Identity resolves this by providing an infrastructure for securing access among all … More
from Help Net Security http://ift.tt/1TaUMz9

A Little Bit of Self-Delusion Can Actually Be Good for a Relationship

While it’s generally good to love your partner for who they really are, lying to yourself about their qualities isn’t actually that bad. In fact, a little bit of self-delusion may actually make you both happier in the long run.

In this video from the New York Magazine YouTube channel, The Science of Us explains how idealizing your significant other a little bit can be good for the longevity of your relationship. According to one three-year long study, couples that believe their partners have certain “perfect” qualities end up being happier in the long run, even if those qualities aren’t actually present in their partners. “Positive illusions,” a form of self-deception that makes you feel better, toward a significant other even creates a self-fulfilling prophecy of sorts. If you always think highly of your sweetheart, they’ll probably want to live up to your expectations. Your delusions might rub off on your partner and they’ll start behaving how you want them to behave.

Of course, there’s definitely a line that you shouldn’t cross. You don’t ever want to lie to yourself about an abusive or unhealthy relationship, so make sure your delusions aren’t trying to hide some truly terrible stuff. You can read more about the related study here.

http://ift.tt/1TAacKj...

Lie About Your Lover: “The Science of Us,” Episode 21 | YouTube


Contact the author at patrick.allan@lifehacker.com.


from Lifehacker http://ift.tt/1pa9VEf

Make Damaged Rope Usable Again With a Sheepshank Knot

A damaged rope can be totally useless for doing most tasks safely, especially if the damaged section is somewhere in the middle. This simple knot can bypass the damaged section and make the rope fairly safe to use again.

This video lesson from Bryan Black at ITS Tactical explains how tie the leg bone-looking sheepshank knot. Find the damaged section of rope, then make a loop with the damaged section at the top of the loop. Make two more loops in the rope with one on either side so the damaged loop is in the middle. Then pull the middle damaged loop through the loops on either side until it’s tight. Once it’s tied, the knot will take the weight off of the damaged section of rope so it doesn’t get damaged further and snap. Black notes, however, that you should never use damaged rope if it will be bearing somebody’s weight, and that this technique should only be used when absolutely necessary. If you’re able to easily replace your rope, just do that instead.

http://ift.tt/1RwFIro...

Shorten or Bypass a Damaged Section of Rope with the Sheepshank | ITS Tactical


Contact the author at patrick.allan@lifehacker.com.


from Lifehacker http://ift.tt/1WMl091

What Actually Happens When You Block Someone on Your iPhone

The iPhone has a built-in blocking feature, but have you ever wondered what exactly happens on the other end when you block someone? MacRumors decided to figure it out.

First off, when a blocked number tries to send you a text message, it won’t go through, and they will likely never see the “delivered” note. On your end, you’ll see nothing at all. As far as phone calls are concerned, a blocked call goes directly to voice mail. On your end, you’ll get a special “blocked messages” folder in your voice mail inbox if they leave a message, but you won’t get a notification they called.

What happens when you block someone on your iPhone? | YouTube


Contact the author at thorin@lifehacker.com.


from Lifehacker http://ift.tt/1Lgrufs

Google offers free DDoS protection to independent news sites

Google (i.e. Alphabet) has created a free DDoS protection service to help independent news sites, sites focused on human rights and on election monitoring withstand DDoS attacks, which have become a very modern form of censorship. Called Project Shield, the service was launched in 2013, and has been in the testing phase until this Wednesday. Now, administrators of any of the aforementioned types of sites, and independently of the side of a political dialogue they … More
from Help Net Security http://ift.tt/1Q46Y0I

Nissan LEAF cloud security fail leaves drivers exposed

Guess how strong the "password" is that protects the data that your Nissan LEAF electric car uploads to the cloud...
from Naked Security http://ift.tt/1Q3JSY3

Why Facebook is using satellites to map every building in 20 countries

Facebook wants to bring the whole world online. To do that, it needs to know where everyone lives.
from Naked Security http://ift.tt/1TAIkqV

FBI subpoenaed Carnegie Mellon University for Tor-using suspect’s IP address

A court order in the case of U.S. vs Brian Farrell, a man charged with conspiracy to distribute illegal drugs while he was allegedly an administrator of the Silk Road 2.0 website, has provided official confirmation that the FBI identified him thanks to the IP address provided by the Software Engineering Institute of Carnegie Mellon University, who did some research on the Tor network. The court’s opinion “The record demonstrates that the defendant’s IP address … More
from Help Net Security http://ift.tt/1T96mL6

Breach of millions of kids’ images and messages sparks disclosure spat at uKnowKids

Millions of messages and images of 1,700 kids were exposed by a site that – ironically! – helps parents babysit their offsprings’ mobile chats and social media doings.
from Naked Security http://ift.tt/1KN8gya

Celebrity nude photo hacker pleads guilty

Nope, not one of the Fappening creeps, just another guy who stole about 448 logins and pickpocketed 161 nude or partially nude images.
from Naked Security http://ift.tt/1SWGwcR

Not all data breaches are created equal

1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global database that tracks data breaches globally and measures their severity based on multiple dimensions, including the type of data and the number of records compromised, the source of the breach, and whether or not the data was encrypted. By assigning a severity score to each breach, the Breach Level … More
from Help Net Security http://ift.tt/1oCmUxR

Insecure APIs allow anyone to mess with Nissan LEAF electric car

A vulnerability in the mobile app used to interact with Nissan LEAF, a popular electric car, can be exploited by remote, unauthenticated attackers to switch the car’s AC and heating system on and off, but also to extract details about the owner’s journeys, security researcher Troy Hunt has demonstrated. The weakness rests in the fact that the app interacts with the car via APIs that require no authentication to be accessed, and can therefore be … More
from Help Net Security http://ift.tt/1LetVz9

A third of IT managers admit to hacking

A high percentage of IT personnel admitted to not following the same security protocols they are expected to enforce, according to Absolute Software. Of those surveyed, 33% of respondents admitted to successfully hacking their own or another organization and 45% admitted to knowingly circumventing their own security policies. The report found that security remains at the top of the IT spending list, with 87% of respondents expecting increased investment in security this year. Despite prioritizing … More
from Help Net Security http://ift.tt/1XOcTtL

Internet of Evil Things: The growing risks of connected devices

As risk and concern around connected Internet of Things (IoT) devices continues to grow, resources and visibility into such connected devices have stagnated despite the introduction of countless new entry points for malicious actors across the enterprise, according to Pwnie Express. The survey of more than 400 global IT security professionals examines the growing phenomenon referred to as the Internet of Evil Things (IoET). As awareness of vulnerable devices grows in 2016, infosec professionals are … More
from Help Net Security http://ift.tt/1LH9lm3

Wednesday, February 24, 2016

8 in 10 IT pros believe believe their data is safer in the cloud

Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud than on premises. In addition, 6 in 10 believe the same when facing a malicious attack, according to Evolve IP. The survey of more than 1,080 individuals, which provides current cloud adoption trends and future cloud deployment insights, also revealed that 91 percent of all organizations now have at least one … More
from Help Net Security http://ift.tt/1WKqCjS

Correlate real-time data from mobile devices across the enterprise

OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the enterprise and delivers automated fine-grained policy controls that secure against malware, rogue employees and privacy eroding applications. “The increasing speed and sophistication of mobile security threats can easily overwhelm even the best enterprise cybersecurity teams and put sensitive and critical data at risk,” said Bill Anderson, Chief Product Officer of OptioLabs. “OptioInsight puts enterprise cybersecurity … More
from Help Net Security http://ift.tt/1T8lUyG

Utilize any data source to see attacks on the inside

Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data source and supports the customization of its behavioral analytics modules, providing organizations with visibility into attacks and risky behaviors inside their environments. Organizations can now derive security insights from data sources by combining Niara’s built-in behavioral analytics with custom modules unique to their particular environment. As a result, organizations benefit … More
from Help Net Security http://ift.tt/1QFSW8W

Siemplify brings military intelligence capabilities to enterprise security operations

Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity methodologies used by military intelligence organizations. The Siemplify Threat Analysis Platform automatically correlates security alerts, identifies and prioritizes incidents, and graphically depicts the complete threat chain. The platform acts as a central hub linking an organization’s existing security, threat intelligence and risk management tools, including Splunk and popular SIEMs. According to a … More
from Help Net Security http://ift.tt/1QewiyV

Vera secures $17 million in series B financing

Vera, a top 10 finalist for the Innovation Sandbox competition at RSA Conference 2016, has closed $17 million in Series B financing, led by Sutter Hill Ventures, with participation from existing investors Battery Ventures, Clear Venture Partners, and Amplify Partners. As part of the financing, Stefan Dyckerhoff, Managing Director at Sutter Hill Ventures will join the Vera board of directors. To date, the company has raised over $31M in total funding. The injection of new … More
from Help Net Security http://ift.tt/1WJZ0LR

Replace the Sugar in Your Coffee with a Chocolate Square for a Decadent Sweet Treat

A good cup of coffee can be a necessary start to the day, or a rewarding treat, depending on how you make it, and if you’re aiming for a dessert coffee or fancy flavored drink, don’t buy a mix—just toss in a chocolate square. Go with a flavored one if you’re feeling really fancy.

http://ift.tt/1Q1Tum5...

Put the chocolate square, whether it’s plain chocolate, dark chocolate, or a decadent filled chocolate square (like salted caramel, shown in the Food Network video here) in the bottom of your mug. Then fill your mug with hot coffee. Give the chocolate a minute to melt, then mix it into the coffee with a few strong stirs.

That’s all there is to it. Your drink will be just as sweet as if you added sugar and it’ll have delicious chocolate undertones. Check out a demonstration in the video above (skip to 1:30).

Tips to Upgrade Your Coffee | Food Network


from Lifehacker http://ift.tt/1VFps9o

The Best Way to Pack a Pair of Dress Shoes In Your Luggage

When you fly out for a business trip or wedding, you’ll need a nice pair of dress shoes. Here’s how to pack them without scratching or crushing the leather.

You could just wear them on the plane, but they’re not exactly the most comfortable thing to have around your feet on a five-hour flight. If you want to pack them in your suitcase or carry on, this video from the Travel + Leisure YouTube channel demonstrates how you should pack your dress shoes so they stay nice and pretty. Roll up your socks, underwear, and maybe some t-shirts and stuff them in the shoes. This saves space and supports the shoes so they don’t get smashed by the rest of your stuff. Stick them in your luggage before anything else (because you want to pack heaviest to lightest), then pack softer things around them so nothing can scratch that shiny, smooth exterior.

http://ift.tt/1Ldq9Ge...

How to Pack Men’s Dress Shoes | YouTube


Contact the author at patrick.allan@lifehacker.com.


from Lifehacker http://ift.tt/24q0xwp

Play YouTube Audio In the Background on iOS With the Earbud's Play Button

If you want to listen to YouTube audio on your phone while multitasking with other apps or after you’ve locked your screen, ditch the YouTube app and give your earbud’s play button a press.

Usually when you go to the home screen or switch apps on iOS, YouTube’s audio will stop streaming automatically. In this video from Tech Insider, Matthew Stuart shows you a simple way to listen to a song or lecture on YouTube in the background while multitasking or even locking your iPhone or iPad. Here’s how:

  1. Open the YouTube video in Safari, not the YouTube app and start playing it.
  2. Press the home button to return to your home screen. The video and audio will stop.
  3. Now press the play button on your earbuds. The audio will start playing again in the background and you can use other apps or lock the screen without interrupting the it.

The only caveats are that you have to listen with your earbuds, and the audio will stop once the video is over. We’ve explained how to do something similar before with the double-tap method, but this method is a lot easier if you don’t mind listening with headphones.

http://ift.tt/21hbhOC...

YouTube playing on iPhone background | YouTube


from Lifehacker http://ift.tt/21hbjWP

Lock Exposure and Focus for Better Photos on Your iPhone (and Other Tips)

Smartphone’s are easily the most popular cameras around, but even though they’ve improved a lot over the years, taking a solid photo with a smartphone is still a little different than a traditional camera. MacRumors put together a video filled with iPhone tips, but they’re all applicable to any smartphone camera. One of the lesser known tips is to learn how to lock exposure and focus.

If you’ve never used the focus or exposure adjustments before, they’re pretty easy. Tap anywhere on a photo to change the focus to that object. Tap and then move your finger up or down to change the exposure. Once everything’s set up how you like it, tap and hold your finger on the screen to lock both settings in place. This allows you to take a little more time working on the composition of an image to get it right. The video walks through a handful of other tips too, including skipping the digital zoom in favor of moving closer to a subject, never using the flash, and making full use of HDR.

Tips for Taking Better Photos With Your iPhone | MacRumors


from Lifehacker http://ift.tt/21h5Fnw

Pour Liquids Out of Large Containers with the Spout Higher Up

Large containers tend to have spouts on one side and it’s a pretty natural reaction to attempt to pour that liquid just like you would with a small container, with the spout closer to the ground. As Tested points out, that’s a recipe for a mess.

With big, one gallon cans or even five gallon containers, you want to pour them out with the side of the spout higher up. This makes the liquid pour out nice and smoothly. If you work with large containers a lot, this is pretty obvious, but since most of us don’t, it’s a handy tip to remember next time we’re trying to dump out that one gallon can of acetone.

Shop Tips: How to Pour from Large Containers | YouTube


from Lifehacker http://ift.tt/1QdHRWU

Microsoft's Hub Keyboard Quickly Copies Info from Other Apps, No App Switching Required

Android: It’s kind of a pain to switch from the app you’re in just to grab some info in another app to paste in. Microsoft’s new Android keyboard, called Hub keyboard, ends this inconvenience and also includes a translation tool.

The icons in the top of the keyboard give you quick access to your contacts, OneDrive files, and clipboard, so you can tap and search for the information you need without leaving your current app. Perfect if you need to text someone a friend’s phone number or there’s information in a report you want to easily copy into an email.

The translate button lets you convert your text to another language, and the cliipboard icon gives you a list of your previously copied texts to choose from.

Microsoft’s experimental Garage group is on a roll lately with new apps for Android and iOS. This one seems worth a try if you hate switching between apps.

Hub Keyboard app from Microsoft Garage makes it easy to multitask from one mobile screen | Microsoft via The Verge


from Lifehacker http://ift.tt/1QdwYEx

Google Docs Now Lets You Edit and Format Text with Your Voice

Google Docs added voice typing last year, but now you can also edit and format docs without your keyboard.

As the video above shows, all you have to do is speak and your words will appear on the page. Format the document with commands like “apply heading one” and “insert bullet list” or use commands like “copy” and “insert table” to further manipulate your doc. Previously, you had to use your cursor to correct mistakes while voice typing, but now you can tell Google Docs to jump to and select specific text and then replace it with your other words.

Voice typing in Google Docs: type, edit and format (no keyboard needed!) | YouTube


from Lifehacker http://ift.tt/21roTDu

Eavesdropping by the Foscam Security Camera


from Schneier on Security http://ift.tt/1Q0HvVZ

Mousejacking: What you need to know

Got a wireless mouse or keyboards that uses a USB dongle? Seems that many of them can be fed fake clicks and keystrokes from a distance...
from Naked Security http://ift.tt/1T6UA3X

Facebook Is Rolling Out New "Angry," "Love," and Other Reactions Beyond "Like"

You know how you’ve wanted a “Dislike” button on Facebook for forever? Good news! You’re not getting it. But you are getting something like it. Starting today Facebook is rolling out Reactions, which include Love, Haha, Wow, Sad, and Angry. Have fun. Read more here.


from Lifehacker http://ift.tt/1S19aZr

Americans want to be safer online – but not if they have to do anything

In the wake of non-stop news about online security mishaps, Americans are fully leveraging today's powerful technologies to stay safe… not.
from Naked Security http://ift.tt/24oXxjI

FTC forces Asus to improve router security

The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s settlement with Taiwan-based hardware maker ASUSTeK Computer is one step towards that goal. The complaint was raised after well-meaning hackers exploited a weakness on Asus routers and left note on victims’ drives notifying them of the matter. Later, a researcher discovered an exploit campaign that abused vulnerabilities to change vulnerable … More
from Help Net Security http://ift.tt/1LbGo6F

German police given go-ahead to use home-brewed spying Trojan

The infamous "federal Trojan" is back, supposedly neutered so it can't access files, steal passwords, or set up video or audio surveillance via a target's device.
from Naked Security http://ift.tt/24oVTyz

Bill Gates takes issue with reports that he’s backing FBI over Apple

But he's also taken issue with Apple's assertions that the feds are after an encryption backdoor and that it would set a wider precedent.
from Naked Security http://ift.tt/1RmQmkY

Hacking hospitals: Cyber attacks can result in physical harm

Independent Security Evaluators (ISE) published a study that demonstrates security flaws to be pervasive within the healthcare industry. The research found that adversaries could deploy cyber attacks that result in physical harm to patients. 100% of the hospitals investigated all had very serious security issues, suggesting broader implications across the entire industry. The following diagram shows how an attack that disrupts the accurate delivery of medicine can directly affect a patient’s health. In this case, … More
from Help Net Security http://ift.tt/1QcbUhQ

NSA spied on world leaders, UN, EU officials

A set of highly classified documents recently published by WikiLeaks show how the NSA spied on a number of high ranking officials of the UN, UNHCR, WTO, NATO, the EU and Japan. The documents report on conversations and meeting that happened in the period between 2007 and the end of 2011. WikiLeaks says that the NSA bugged a private climate change strategy meeting between UN Secretary General Ban Ki-Moon and German Chancellor Angela Merkel, stole … More
from Help Net Security http://ift.tt/1oGISQO

Drupal 6 hits the end of the line

If you have a Drupal 6 website then you won't be receiving any more official security advisories or patches; from today your site is vulnerable to any new security issues discovered in Drupal 6 core or its modules, forever.
from Naked Security http://ift.tt/1Qc0DxX

Did the Dark Web just get a whole lot bigger?

It looks at though the number of Dark Web sites just surged by 50% in a few days. The question is, "Why?"
from Naked Security http://ift.tt/1LbujP1

Review: ICLOAK Pro

Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against anyone and everyone – from regular Joes web surfing from their home to employees in a power plant. Privacy was and is always an important issue. Ten years ago we worried about companies snooping on their employees and now in the post-Snowden era, we know that the core pillars of online … More
from Help Net Security http://ift.tt/1TysQUk

Mastercard’s Selfie ID: Playing Russian Roulette with consumer identities?

At this week’s Mobile World Congress in Barcelona, MasterCard announced it will accept selfie photographs and fingerprints as an alternative to passwords when verifying IDs for online payments. By the summer, consumers will be able to purchase online without a PIN code, password or confirmation code. Instead, they’ll choose to download an application to their PC, tablet or smartphone and opt to take a ‘selfie’ picture which is mapped against a stored image on file … More
from Help Net Security http://ift.tt/1oApKDm

MouseJack: Remote exploitation via radio frequencies

Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio frequencies. Using an attack which researchers have named MouseJack, malicious actors are able to take over a computer through a flaw in wireless dongles. Once paired, the MouseJack operator can insert keystrokes or malicious code with the full privileges of the PC owner and infiltrate networks to access sensitive … More
from Help Net Security http://ift.tt/1R0uDwv

Tuesday, February 23, 2016

Japanese critical infrastructure under targeted attack

Cylance revealed a multi-year, multi-attack campaign against the Japanese critical infrastructure. Their research uncovers how a well-organized and well-funded threat group, likely associated with a nation/state, has used a variety of attack vectors and techniques to infiltrate and gather sensitive information from companies in electric utilities, oil and gas, finance, transportation and construction. “Since 2010, a threat group with considerable resources has been using various exploits to attack commercial interests around the globe, with a … More
from Help Net Security http://ift.tt/1PYyH2J

Working towards a common set of IoT standards

Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will be to help unify IoT standards so that companies and developers can create IoT solutions and devices that work seamlessly together. The OCF will work towards unlocking the massive opportunity of the future global IoT segment, accelerate industry innovation and help all developers and companies create … More
from Help Net Security http://ift.tt/1Rmk89B

Keep a Spatula in the Dishwasher, Put the Dish Drainer in the Sink, and More Easy Cleanup Tips

This video, from Nonnahs Driskill and Get Organized Already!, is packed with tips to save kitchen counter space and make sure dirty dishes get into the dishwasher (and the clean ones back out.) Anyone with a small kitchen—or who lives with another person—can find something here to try.

A few of the suggestions really stood out, like the idea of keeping a utility spatula in the dishwasher that you and your roomies can use to scrape dirty food from dishes right into the sink, trash, or compost bin. Then you can put the dish—and the spatula—right back in the dishwasher without wasting water pre-washing. Another useful tip is to put your dish drainer into one side of your double sink, if you have a double sink. It’ll free up a ton of counter space you can use, and you can always move it back out if you need the sink space.

http://ift.tt/1Qamrds...

Some of the other tips are basic but also important, like making sure to establish a routine of loading and unloading the dishwasher. Have someone load and run the dishwasher every night before bed, if it’s too much for your roomies to load right after using a dish. Similarly, Nonnahs suggests unloading the dishwasher every morning while you wait for your coffee to brew. Hit play on the video above to see each tip in action (it’s only about two minutes) or watch it at YouTube below.

Dishwasher Tips | Get Organized Already!


from Lifehacker http://ift.tt/1PX7Eos

Can You Do All Your Cooking in a Microwave Oven?

The humble microwave is like an Atomic Age dream that actually came true: In the kitchen of the future, you’ll make fully cooked meals in minutes! And the versatile device can do more than just heat your leftovers. Today we’re testing some cooking tips that can put your microwave to use beyond reheating last night’s pizza.

We tried making our own popcorn without a prepackaged bag, made potato chips from scratch, gave the ol’ brownie-in-a-mug a try, and attempted to make crispy bacon. All in a common microwave oven.


from Lifehacker http://ift.tt/1QBJH9F

The Ads vs. Ad Blockers Arms Race


from Schneier on Security http://ift.tt/1Q9yk3p

Attacker View exposes hidden cyber attack paths

Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s perspective. Armed with a detailed map of how attackers view and traverse a network, IT security professionals can now visualize attack paths and adapt their security strategy to mitigate attacker’s lateral movement. Attacker View differs from mapping software and network architecture by showing the attack vectors found on each machine, and illustrates … More
from Help Net Security http://ift.tt/1KHpayf

Turn Leftover Rice Into Crispy, Tasty Rice Waffles

Leftover fried rice can be pretty tasty on its own, but if you want to turn it into a totally different kind of snack, try waffling it.

A waffle iron is useful for concocting all kinds of creative snacks, and these leftover rice waffles are a delicious example. This suggestion comes via the Kitchn, where they explain:

The results are extra crispy and crunchy on the outside, but warm and chewy on the inside. If you don’t happen to have leftover rice on hand, you can of course cook up a fresh pot to waffle, but the rice “waffles” tend to stay together better and are easier to remove from the iron when you are working with day-old rice, as it has dried out a bit and is cold.

You can try this with leftover fried rice, as shown in the video, but regular rice works, too. And if you don’t have a waffle maker, you could always try these leftover rice cakes, which are simple enough to make.

http://ift.tt/1RYVdLl...

Check out the full video above, then head to the Kitchn for a few more recipes at the link below.

Quick Bites - Waffle Fried Rice | ToTT Store via The Kitchn


from Lifehacker http://ift.tt/1L8ZY3F

The Government's Automated Passport Control Program Wants to Get You Through Customs Faster

Standing in a long customs line is an annoying way to end a vacation, but if you have a U.S. or Canadian passport and you’re coming home, you can get through faster by using the Automated Passport Control program.

Beyond those with a U.S. or Canadian passport, if you’re from one of the Visa Waiver Program countries, you can also use the Automated Passport Control (APC) program. You must be approved for Electronic System for Travel Authorizations (ESTA) and have visited the U.S. before after 2008. You and any family members traveling with you can all use one kiosk together.

You’ll answer the same questions that are in the Customs Declaration Form, scan your passport and fingerprints (if you qualify), confirm your flight number, and take a photo. The machine will print you a receipt, which you’ll show (along with your passport) to an officer at the check-out point. For a full walk-through of how the APC works, check out the video above from the Orlando Airport Authority.

You run the same risk as any automated machine: the person in front of you not knowing how to use it. But as someone who has stood in their fair share of very slowly moving customs lines, the risk in this case is pretty low since the customs line isn’t likely to be much faster.

You can find the APC kiosks at most major airports including LAX, IAD, SFO, JFK, BOS, and ORD. There are even a few international ones on the list like Dublin, Toronto, and Abu Dhabi. See if your airport is on the list at the link below.

Automated Passport Control


from Lifehacker http://ift.tt/1p0FnVb

Why It's Important to Show Yourself Some Compassion

A bad habit that many of us share is that we trash talk a lot...to ourselves. Recognizing our mistakes can be healthy and productive, but constantly thinking nothing we do is ever good enough—well, not so much. Here’s a powerful reminder that we could all use more self-love.

Self-compassion, or generally being a little nicer to ourselves, is something a lot of us lack. This charmingly animated video from The School of Life shares some real truths about achievement, and about falling short, to help you stop being so hard on yourself.

The video helps you recognize that messing up is normal and human, not because you suck, or you’re somehow less than you should be. Despite all the attention on what “success” looks like, smaller, undetectable everyday failures are the norm. Yes, even luck plays a part in getting the opportunities that lead to good things. And the most important thing to remember? You are not only your achievements.

Self Compassion | The School of Life


Stephanie Lee is a nomadic writer with a Sriracha problem. Visit her blog at http://fitngeeky.tv/ for her lighter takes on fitness and shenanigans. You can also follow her on Twitter and Facebook.


from Lifehacker http://ift.tt/1WGcGHV

Give Your Home A Brain With This Discounted Samsung SmartThings Starter Pack

Samsung’s SmartThings ecosystem is one of the easiest and most powerful ways to give your home a brain, and you can get started today with a solid Amazon Gold Box deal.

http://ift.tt/1T438IJ...

$120 gets you a SmartThings hub, and a WeMo-style smart outlet to get you started. Out of the box, this will let you use your phone (including an iPhone) to control any lamp or appliance that plugs into the wall, but you’ll get a lot more out of the system when you start attaching multipurpose sensors, arrival detectors, water leak sensors, and security cameras. [SmartThings Hub and Outlet Bundle, $120]

http://ift.tt/1WGcmIW...

http://ift.tt/1fJjqpm...

http://ift.tt/1c2r5VL...

http://ift.tt/1c2r5VL...

http://ift.tt/1c2r5VL...


Commerce Content is independent of Editorial and Advertising, and if you buy something through our posts, we may get a small share of the sale. Click here to learn more, and don’t forget to sign up for our email newsletter. We want your feedback.


from Lifehacker http://ift.tt/1RYKxwq

Sensitive child profiles, private messages exposed online

Security researcher Chris Vickery has discovered another database containing sensitive user data exposed online (i.e. accessible via Internet). Leveraging Shodan, he unearthed a database compiled and used by US-based uKnowKids, a company that helps parents monitor what their kids do online and on the mobile phone. “In violation of the Children’s Online Privacy Protection Act (COPPA), uKnowKids.com gave public access to over 6.8 million private text messages, nearly 2 million images (many depicting children), and … More
from Help Net Security http://ift.tt/1L8JecL

Would you use an ATM that didn’t need a card…*or* a PIN?

Imagine an ATM that didn't need a card or a PIN...how safe would it be?
from Naked Security http://ift.tt/1oEMiDP

Resetting terrorist’s Apple ID password wasn’t a screwup, says FBI

The FBI first blamed county employees for resetting the password and foreclosing the option of fresher backups. Now, it says it was in on it.
from Naked Security http://ift.tt/24n5mXo

Practical TEMPEST Attack


from Schneier on Security http://ift.tt/1QzQ8dq

Twitter password recovery bug potentially exposed data of 10,000 users

Twitter says your passwords are safe and the bug's fixed, but you ARE using 2FA and a strong password, right?!
from Naked Security http://ift.tt/20Sw4T2

German police allowed to use its own “federal Trojan”

The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In fact, it could end up being used as early as this week. The police will have to get a court order to use the spyware, and prove that the suspect is involved in a crime threatening citizens’ “life, limb or liberty”. The malware has been developed in-house, and has been available … More
from Help Net Security http://ift.tt/1Q8fSrJ

Texting-while-walking mishaps lead to relocation of giant sculpture

A sculpture installed on the grounds of Salisbury Cathedral had to be moved last week because people kept walking into it in the dark, and while looking at their mobile devices.
from Naked Security http://ift.tt/20SpQCz

Source code of “game changer” Android banking malware leaked online

If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking Trojan has been leaked on an underground board in December 2015. “The exposure of GM Bot’s code is comparable to the source code leaks of PC Trojans that include Zeus, SpyEye, Carberp and others. While GM Bot may not be as prolific as the major … More
from Help Net Security http://ift.tt/1TwrZ6u

Mobile banking Trojan bypasses Google Play security

The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, according to Kaspersky Lab. During the third quarter of 2015, Kaspersky Lab experts detected an unusual increase in the number of mobile banking attacks in Australia. The suspicious activity was discovered to be the result of a single banking Trojan: Acecard. Acecard mobile banking Trojan family The Acecard … More
from Help Net Security http://ift.tt/1VB7rsw

Perceptions and buying practices of infosec decision makers

CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In fact, network breaches are rising, confidence is falling, the number of BYOD deployments is shrinking, and IT organizations are fed up with today’s inadequate endpoint defenses. “In 2014, only four in 10 survey participants believed that a successful cyberattack targeting their organization was likely to occur in the coming … More
from Help Net Security http://ift.tt/1WFBCiH

Monday, February 22, 2016

Most businesses are considering or implementing IoT

The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be worth as much as $11.1 trillion, roughly 11% of the global economy by 2025. Yet, a single cyberattack could inflict millions of dollars in damage. The annual estimated average financial loss, per cybersecurity incident in 2014 was $2.7 million. That’s 34% higher than a … More
from Help Net Security http://ift.tt/1Qv4jtY

Ecommerce fraud surges 163%

The worst fears of online retailers has been confirmed with data just released today: in 2015, the number of attacks by fraudsters was up 163 percent – growing two and a half times in a mere three-quartered period. This data is part of the newly released Global Fraud Attack Index, a collaboration between PYMNTS and Forter. This quarterly Index benchmarks the rate of fraud attempts on U.S. merchant websites by looking at the types of … More
from Help Net Security http://ift.tt/1TC74Ag

Use the Pointy End of a Plastic Fork as a Clever Chip Clip

There are all kinds of clever ways to keep your chips from going stale, but this trick with a plastic fork is sure to make your picnics and barbecues a little easier.

http://ift.tt/1Uj0PRo...

This video from the CrazyRussianHacker YouTube channel shows you a clever use for a plastic fork. Roll up your chip bag, then take the pointy end of the fork and slide it over the bag’s last fold. Make sure the two outside prongs are one side of the chip bag and the inside prongs are on the other so it keeps the bag pinched shut. Next time you’re out having a picnic or barbecue, just save a few plastic forks so can use them to keep your chips from getting stale. You can even break off the handle of the fork and keep using them for as long as you like.

5 Fork Life Hacks | YouTube


from Lifehacker http://ift.tt/1PTxWrz

Security Vulnerability in gilbc DNS


from Schneier on Security http://ift.tt/1QxSSIa

What the ISO Settings On Your Camera Mean, and the Best Way to Tweak Them

If you’re shooting with all of your camera’s settings on automatic, you’re missing out. Your ISO setting—among others—can drastically improve your shots when used properly. This video guide from TechQuickie explains what you need to know.

In short, tweaking your ISO settings comes in handy when the lighting in your environment is less than ideal, like night shots or situations where the lighting just isn’t great at all. As an example, suppose you’re taking a family photo, and you have everything dialed in just right, but half of the people in the background of the shot are out of focus. You can bring the f-stop down to increase your depth of field, but now everything is too dark. Increase your ISO, and you keep focus but also bring more light in to the sensor. Similarly, it’s useful when you need to get good light in to your camera’s sensor, but also need to shoot with high shutter speed, like at a game or another fast-moving event.

http://ift.tt/1OqH0QE...

Of course, boosting those settings without knowing what you’re doing can actually make your photos worse, so take some time to familiarize yourself with how your photos change when you tweak your camera’s ISO settings. If you need a quick reference, this graphic explains how ISO, shutter speed, and aperture are related.

Camera ISO As Fast As Possible | TechQuickie


from Lifehacker http://ift.tt/1OqGYYU

Kodi 16 Brings Long-Press Support to TV Remotes, an Improved Add-On Manager, and More

Kodi, one of our two favorite home theater apps, has been updated to version 16, adding a few new useful features. This includes the very-handy long-press on TV remotes.

http://ift.tt/1QtBfD3...

As the developers explain, Kodi can run on Android TV, but the remotes that come with Android TV units rarely have a context menu button. To get around this, the newest version will allow you to long-press the OK/Enter button on your remote to pull up more menu options in the Kodi app. Quite handy!

The new version also includes updates to the add-on manager, which now shows you all available versions of an installed plug-in, and the built-in music player also scans for added tracks more smoothly, assuming they’re tagged properly.

Kodi 16 also includes an event logger. In this list, you can see every change you’ve made to Kodi. When add-ons are updated, or new media is added to your library, it will show up here. You can use it to find out when and why an updated add-on broke, or manually fix some library information that didn’t import correctly. You can check out the full list of changes and download the new versions at the post below.

Kodi 16.0 – Jarvis – Mark XVI | Kodi.tv


from Lifehacker http://ift.tt/1QtAkTg

Apple to US govt: Withdraw demand for iPhone unlocking, we all need to talk first

The battle between Apple and the US Justice Department continues, as the company still refuses to help the feds access the contents of a PIN-locked iPhone used by gunman Syed Farook in the way described in the court order. To Apple’s CEO Tim Cook, that would be tantamount of setting up a backdoor into the devices. Apple still hasn’t filed legal arguments against the order – by the magistrate’s decision, it has until Friday to … More
from Help Net Security http://ift.tt/1RWYtXH

Grill Your Avocados First for Rich, Delicious Guacamole

When it comes to guacamole, there’s no reason to reinvent the wheel (or add peas) but grilling your ingredients can bring out extra flavor in already great ingredients.

There are three great guac ideas in the above video, but the one that really caught my eye has you char jalapenos, red onion, and avocado halves before mashing it all together with some lime juice for a smoky, deeply flavorful dip. If you want to take it to an even more flavorful place, you can throw in some cumin seeds. I don’t think you need ‘em, though.

Guac This Way | Tasting Table


from Lifehacker http://ift.tt/1L5K1LB

Decrypting an iPhone for the FBI


from Schneier on Security http://ift.tt/1SMOdCz

World’s biggest Linux distro infected with malware

Fortunately the hack involved redirecting the download page, rather than pwning the official Linux Mint repository.
from Naked Security http://ift.tt/1KDvFC4

Pirated App Store client for iOS found on Apple’s App Store

An app called 开心日常英语 (“Happy Daily English”), which has been offered for download via Apple’s official App Store, has been revealed to be a fully functional third party App Store client for iOS, offering users in mainland China a way to install modified versions of iOS apps on non-jailbroken devices. Its discovery shows that there are new techniques that can be used to fool Apple reviewers into allowing potentially malicious apps into the App Store, … More
from Help Net Security http://ift.tt/1OpIhr7

IRS reports 400% increase in phishing & malware in the past 12 months

Just a month into US tax-filing season, and the year's 1,389 incidents have already topped the 2014 yearly total.
from Naked Security http://ift.tt/1KDsMBm

Going to Mobile World Congress? Get an exclusive freebie!

Psst... Going to Mobile World Congress? We have a special prize giveaway just for Naked Security readers!
from Naked Security http://ift.tt/1SMCIek

Lost at sea! Alleged Anonymous hacker found adrift near Cuba

Rescued by a Disney cruise ship, he now faces a charge of conspiracy in relation to the #opJustina attack against a Boston hospital.
from Naked Security http://ift.tt/1KDpzle

Monday review – the hot 23 stories of the week

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
from Naked Security http://ift.tt/1T15GYc

Linux Mint hack: Backdoored ISOs, stolen forums database

The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little while. The breach was announced by project leader Clement Lefebvre on Sunday, February 21, via a blog post. “Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it,” he shared. “As far as … More
from Help Net Security http://ift.tt/1Qw78kM

Volvo to launch a car without a physical key

Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars without keys from 2017. The new Volvo app enables the digital key on the customer’s mobile phone to do everything a physical key currently does, such as locking or unlocking the doors and starting the engine. Volvo is developing the application in-house, and customers … More
from Help Net Security http://ift.tt/1RhCZme

Deep and Dark Web: Complexity and escalating cybercriminal activity

Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. In the report, researchers highlight prolific trends that pose the greatest risk to organizations and their critical assets. Malicious actors regularly congregate in the Deep and Dark Web to plan, execute, and profit from a range of illicit activity – from hacking, financial fraud, and intellectual property theft to terrorism … More
from Help Net Security http://ift.tt/1QUswdC

Sunday, February 21, 2016

Coalition aims to educate policymakers on cybersecurity

A group of vendors launched the Coalition for Cybersecurity Policy and Law, a new organization that will focus on education and collaboration with policymakers on the increasingly complicated legislative and regulatory policies related to cybersecurity. Founding members of the Coalition include Arbor Networks, Cisco, Intel, Microsoft, Oracle, Rapid7, and Symantec. “The members of this Coalition are dedicated to building our nation’s public and private cybersecurity infrastructure, and their insight and engagement must play a vital … More
from Help Net Security http://ift.tt/1owUaXf

PacketFence: Free and open source network access control

PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, centralized wired and wireless management, BYOD management options, 802.1X support, and layer-2 isolation of problematic devices. New features in version 5.7 DNS-based enforcement – A new enforcement method for routed networks – allowing to easily deploy PacketFence in combination with a firewall appliance using SSO. SAML authentication – Captive portal authentication … More
from Help Net Security http://ift.tt/1mS7DYx

Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of Help Net Security. This is the 10th version of the site since we launched back in 1998, and it presents an ambitious and comprehensive overhaul that was months in the making. 3-in-1 Android malware acts as ransomware, banking Trojan and infostealer Why stop at asking ransom … More
from Help Net Security http://ift.tt/24m3M89

Five Easy Ways to Crisp Up Your Sous-Vide Steak's Crust

Cooking your steak sous-vide style will give you the most tender steak you’ve ever had. That tenderness, however, means less crispy, flavorful bits on the outside. Here are five simple ways to crisp up your sous-vide steaks crust before serving.

http://ift.tt/1I3wRe6...

Just because your cooking steak sous-vide style doesn’t mean you can’t have all the crispy flavor you get from cooking steak on a grill or frying pan. This video from the ChefSteps YouTube channel explains five quick methods for getting the best of both worlds:

  1. Pan sear it at high heat for two to three minutes on each side.
  2. Broil the steak on one side for three to four minutes at 500° F.
  3. Coat your steak with flour, then pan sear it on high heat for about two minutes per side.
  4. Toss it on a high-heat grill for about one minute per side.
  5. Deep fry it for two minutes in oil that’s been heated to 400° F.

No matter which one you choose, you get a super tender steak with a flavorful, crispy exterior. You may never want to cook your steak any other way again.

Five Ways to Get a Crispy Crust on Your Sous Vide Steak | YouTube


from Lifehacker http://ift.tt/1owrnC6

Built a Tiny, Portable Speaker and LED Lamp Inside a Tic Tac Box

If you’re interested in making a weird, but possibly useful little multipurpose device, Instructables user diyfuntech shows off a way to build a speaker/flashlight inside a Tic Tac box.

When you finish this project, you’ll have a super bright LED lamp and a tiny little speaker that accepts an auxiliary input. You’ll still need a power supply or battery to power the whole thing, but it’s probably handy to keep around for power outages. If nothing else, it looks fun to build. Head over to Instructables for the full guide.

TicTac Portable Speaker | Instructables


from Lifehacker http://ift.tt/1T0nWko

This DIY Workshop Cart Is Made from an Old Airline Beverage Cart

Adam Savage, of Mythbusters fame, got a hold of a spare airline beverage cart, and what did he do with it? He turned it into a space-saving storage cart for some of his most oft-used supplies, of course. In this case it was an assortment of glues, but if you want to try it, you can keep whatever you like inside.

The video above shows you how Adam built his portable glue transporter. He wanted a place to store and use his hot glue guns and other adhesives without them all dripping on his work surfaces, so the cart was the perfect solution, without being too large or unwieldy when it came time to move it around his workspace. When he doesn’t need it, the cart slides between two other objects along the wall, or off to the side until it’s needed.

http://ift.tt/1RReGim...

Of course, airline food service carts are designed to stay put even if they’re jostled around, and they’re small enough to fit just about anywhere, considering where they have to go in the aisle of an aircraft. They’re actually not that difficult to find online either, although they range from the “cheap for a garage workshop” to “ridiculously expensive,” so shop carefully. The real takeaway here is even if you don’t need a space for all your assorted adhesives, an airline food cart could make a great and storage-efficient addition to your small-space DIY workshop.

Adam Savage’s Custom Glue and Paint Carts | Tested (YouTube)


from Lifehacker http://ift.tt/1UglG7F

Break in a Pair of Shoes in Minutes With a Hair Dryer

Whether you’re stuck in the store choosing between a slightly snug 9.5 and a too-big 10, or you’re wearing your brand new shoes out for the first time and want to make sure they’re comfortable, a hair dryer and some thick socks are all you need to make sure your new kicks are ready for a night on the town.

This is a variation on a very old trick from back in the day, but it still works like a charm. Just put on a pair of thick socks over the socks you want to wear with the shoes (like, thick, winter socks), and shove your feet into those shoes. They should be tight, that’s okay. Then get a hair dryer, and—assuming your shoes are a natural material, not plastic or anything that’ll melt—run the dryer over the tight parts of your shoe until they feel a bit better. Maybe it’s over the bridge of your foot, or the toebox is a little tight. Either way, run the dryer until you have the flexibility you want. Turn the dryer off, walk around in the shoes a bit and wear them until they completely cool, and you should be good to go. Take the heavy socks off, and see how well they feel, and repeat as necessary.

http://ift.tt/1KAJXU5...

Aaron Marino of IAmAlphaM goes through the whole process in the video above (skip to 3:00 for the actual demo, but the setup is good.) He also explains there’s more to a pair of shoes that are slightly snug than “well you should have gotten the right size.” Maybe you’re in between sizes, or, as we’ve learned, your feet swell over the course of the day, so a pair you want to wear tonight may have felt better when you bought them earlier a few days ago. Either way, all isn’t lost, and with a little work you’ll be comfortable in your new shoes.

Shoe Comfort Hack | How to Instantly Break In Shoes | IAmAlphaM


from Lifehacker http://ift.tt/1Qs85V4