Thursday, March 31, 2016

Why SMBs need threat intelligence

Most of the innovative work being done in information security comes from to small to medium sized companies. At the same time, there’s a lack of security solutions for other companies of the same size operating in other spaces. With limited personnel and financial resources, smaller businesses can find it challenging to obtain and manage cyber security solutions. In this podcast recorded at RSA Conference 2016, Mark Seward, VP of Product Marketing at Anomali, says … More
from Help Net Security http://ift.tt/1oq3ifV

SMEs under attack, security readiness still low

When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have not as often been the targets of hackers, privately held companies don’t face the same pressures for security as do their public-company counterparts, and that they simply may have pushed off the issue, according to Joakim Thorén, Versasec’s CEO. As larger companies become increasingly sophisticated around security, … More
from Help Net Security http://ift.tt/1TmNhEl

Before robots can take over they need better security against hackers

Robots are becoming ever-smarter and more capable, but researchers and engineers driving robotics and AI aren't thinking about security.
from Naked Security http://ift.tt/1M4ifzR

How Barbie-doll maker Mattel clawed back $3m from cyberthieves

Crooks spirited the money away to China with the "CEO email" scam. A little luck and an exec on the ground in China helped them get it back.
from Naked Security http://ift.tt/1MXlPXf

Get Mustard Stains Out of White Clothes With Dish Soap and Sunlight

Mustard goes great on a hot dog, but not so much on your white shirt. Here’s a super simple method for removing mustard and other yellow stains from your white clothes.

This video from the Consumer Reports YouTube channel shares several tips for keeping your whites as pristine as possible. If you get a mustard stain on your nice white shirt or some other item of clothing, use some dish soap and warm water to work as much of the stain out as you can. Then take the clothing item and lay it out in the sunlight to let it bleach. After a while the spot should be gone and your white clothes will be back to looking brand new.

http://ift.tt/1q72JcN...

Spring Cleaning Tip #3: Keep White Clothes White | YouTube


from Lifehacker http://ift.tt/1M4dk1U

PSA: It's World Backup Day, Now's a Good Time to Check Your Backups

Happy World Backup Day! Probably not your favorite made up holiday, but still an important one. How’s your backup system?

The video above reminds us why backing up our files is so important. It’s also really easy to do using CrashPlan, Windows’ built-in tools, or another backup utility or service. You need more than one backup, too.

Remember also that your backups are only as good as your ability to restore your data from them, so today’s a fine day to test your backups as well.

World Backup Day


from Lifehacker http://ift.tt/1q5X5Yi

FBI already called in to unlock another murder case iPhone

Nothing breeds success like success.
from Naked Security http://ift.tt/1ooxd8i

Samas ransomware enters hospitals through vulnerable servers

There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or linking to the malware, the latest incidents show a new modus operandi when it comes to malware delivery: compromising servers by leveraging vulnerabilities and spreading the ransomware to Windows machines from there. Latest (public) victim An example of this attack is that which hit US-based not-for-profit healthcare organization … More
from Help Net Security http://ift.tt/22RFd4s

Why You Should Stop Using Hydrogen Peroxide

In elementary school, the common practice for scraped knees was to clean the wound using hydrogen peroxide. Many of us might still do this, but this video from SciShow makes a darn good case for why we should just skip it altogether.

We’ve written about this before, but SciShow delves a bit deeper into the interesting science behind how rubbing alcohol and hydrogen peroxide work and why the stinging sensation we all love-hate can actually be a bad thing. Clearly, the stinging means something is happening. We put up with it, though, because for the few seconds we may be suffering the bacteria must be getting it fifty times worse.

http://ift.tt/1V9VwDR...

While that’s true, it turns out the antiseptic is also killing our own healthy cells, which could slow the healing process. So, rather than using an antiseptic, SciShow suggests that you just stick to cold water and perhaps some soap to clean your wounds.

Should You Use Hydrogen Peroxide to Clean Your Wounds? | SciShow


from Lifehacker http://ift.tt/1SoYijN

SideStepper vulnerability can be used to install malicious apps on iOS

Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive data. SideStepper allows an attacker to get around security enhancements in iOS 9 which are supposed to protect users from installing malicious enterprise apps. These enhancements require the user to take several steps in device settings to trust an enterprise developer certificate, thereby making it harder to install a … More
from Help Net Security http://ift.tt/1SoZNhY

US Federal Court: “you didn’t show up for jury duty” scammers slicker than ever

They're posing as courts or US Marshals, with call centers, call-back protocols, specific names and designated court hearing times.
from Naked Security http://ift.tt/1UEBnaI

Apple promises iOS fix “soon” for crashes in Safari and other apps

The crashes appear to be caused by a bug in the way iOS handles Universal Links, introduced in iOS 9.
from Naked Security http://ift.tt/1WZB47F

Beware: the password testing tool that saved and shared your passwords

So you think you've got a strong password and you want to test it. What could possibly go wrong?
from Naked Security http://ift.tt/1UWfJOz

ISIS Encryption Opsec


from Schneier on Security http://ift.tt/234kA1K

Hackers breaching law firms for insider trading info

Two of the most prestigious law firms in the US who are best known for their financial services and corporate practices have had their computer networks compromised by hackers. According to the WSJ, the FBI is investigation breaches at Cravath Swaine & Moore LLP, and Weil Gotshal & Manges LLP, trying to ascertain whether the attackers managed to access information that could help them with their insider trading efforts. Warnings are sent out Apparently, other … More
from Help Net Security http://ift.tt/1MVsp0m

Consumers living in smart homes are willing to sell personal data

A majority of respondents worldwide might be willing to share their personal data collected from their smart home with companies in exchange for money, and 70 percent agree companies should give coupons and discounts to customers in return for data about device usage, according to Intel Security. The survey also found that 77 percent of respondents believe smart homes will be as common in 2025 as smartphones are today, but 66 percent are also very … More
from Help Net Security http://ift.tt/1M2mJqs

Linux security isn’t enough to stop data breaches

There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating system. Human error and insider threats are some of the top causes for data loss, which can and do still occur even in a “secure” environment. Add to this the most recently discovered Linux vulnerabilities, and it becomes clear that organizations need to take a … More
from Help Net Security http://ift.tt/1M2jv6D

NIST security standard to protect credit cards, health information

For many years, when you swiped your credit card, your number would be stored on the card reader, making encryption difficult to implement. Now, after nearly a decade of collaboration with industry, a new computer security standard published by the National Institute of Standards and Technology (NIST) not only will support sound methods that vendors have introduced to protect your card number, but the method could help keep your personal health information secure as well. … More
from Help Net Security http://ift.tt/1M2gaV1

Craft a DIY Food Slicer Out of a Plastic Syringe

If you like diced up hot dogs in your mac and cheese or want to quickly cut some veggie strips for snacking, you can make a quick-slicing tool out of a plastic syringe.

In this video from the Shake the Future YouTube channel, you’ll learn how to take a cheap syringe and turn it into a super useful kitchen tool. Cut the nozzle tip off the syringe and sand it smooth, then drill some evenly-spaced holes around the same end. Weave some wire through the holes to create a wiry mesh at the end of the syringe’s tube. Now stick a hot dog, a piece of cheese, or some vegetables and push the plunger. With a little force you’ll have instantly sliced food.

http://ift.tt/1qk91FH...

3 Things You Can Make Syringes | YouTube


from Lifehacker http://ift.tt/1V6HIdo

Fantastical 2 for Mac Now Fully Supports Exchange, Adds In Printing and New Week Start Views

Mac: Fantastical 2 is a powerful (but pricey) calendar app for Mac, and today it’s getting a lot better for business users with complete support for Exchange servers. Alongside that, it comes with a handful of new features for everyone else.

The big news here is the support for Exchange. Since most big businesses use Exchange, that kept a lot of people away from Fantastical since all you could do previously was look at your calendar. Exchange users can now do everything you’d expect to do, including responding to event invites, look up availability of your colleagues, and find contact info. The same goes for Google Apps integration as well. For the rest of us, the update adds in some other solid new features, including the ability to print calendars, get notifications for shared iCloud calendars, the option to choose which day or week the month view starts on, multiple item selection, and more. As always, if you’re not sure about dumping the $50 on Fantastical, you can check out a 21 day trial from the developer’s site.

Fantastical ($50) | Mac App Store


from Lifehacker http://ift.tt/1MTvle4

Why “Studies Show” Is Often Misleading

This video explains why we’re always hearing about promising treatments—for cancer, say—despite very few of those breakthroughs ever showing up in the clinic. The reason isn’t a Big Pharma conspiracy or incompetent doctors. It’s because lab findings rarely survive real-world tests.

In the video, Jonathan Jarry of the Body of Evidence podcast uses marbles as a stand-in for studies with positive results. Plenty of drugs work in vitro, which means “in glass.” That means lab work with cells and chemicals, for example in test tubes. But only a few of the treatments that work in the lab can also work safely in animals. And only a few of those make it through the three rounds of clinical trials that test whether drugs are safe and effective in real patients with real diseases.

Some findings are so exciting that they make news even when they’re from in vitro studies, or mouse studies, setting us up for disappointment when the magic pill never materializes. And some people eager to sell supplements or talk up superfoods will cite sketchy, early studies on their product to convince you to take it right now. Jarry puts it more bluntly, saying “quacks bypass due process to sell you duds.”

Gauntlet | The Body of Evidence


from Lifehacker http://ift.tt/1ZLniau

Organize Cables with a Zip Tie Weave

Weave zip ties around a group of cables to keep them organized and neat.

In the video above, ChrisFix shows how to make spark plug looks out of zip ties. When woven together like this, the zip ties bundle the wires together—while also keeping them distinct and separate.

You could do this with thick cables such as adapter plugs, too.

Spark Plug Wire Looms out of Zip Ties | YouTube via Make


from Lifehacker http://ift.tt/1RqWtq5

Free Up a Ton of Storage Space on Your iPhone By Trying to Download a Movie

Storage space on the iPhone and iPad fills up way too quickly. Here’s an odd, yet effective trick to reclaim several gigabytes of storage space in a few minutes.

The video above by iTwe4kz shows the trick in action: Try to rent a large movie (e.g., Lord of the Rings: Two Towers) from iTunes. You’ll be told you don’t have enough storage space. Click the Settings button in that message and, magically, your device will have more available storage. Rinse and repeat.

When I tried it, I had 912MB of space available on my iPad, but after the first try I now have 2.5GB free.

We’re not sure why this works, but Redditor eavesdroppingyou, who shared this tip on the iPhone subreddit last month, guesses it probably erases useless data from different apps to try to download the movie.

Get some storage back by trying to download a movie | Reddit


from Lifehacker http://ift.tt/2327RMY

Student bypasses Valve’s review process, publishes game on Steam

Sometimes the only way to get an organization to listen to you when it comes to existing vulnerabilities in their products is to exploit them yourself and make the proof of the exploitation visible. That’s what Ruby Nealon, a 16-year-old computer science student at University of Salford did: in order to prove that he discovered a couple of review bypass bugs affecting Valve’s Steam platform, he leveraged them to get some Steam Trading Cards approved, … More
from Help Net Security http://ift.tt/1RylLPE

1,400+ vulnerabilities found in automated medical supply system

Security researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies – that are still being used in the healthcare and public health sectors in the US and around the world. The vulnerabilities can be exploited remotely by attackers with low skills, and exploits that target these vulnerabilities are publicly available, ICS-CERT has warned in an advisory. The worst part of it is that the affected versions … More
from Help Net Security http://ift.tt/1LZL940

Dark Web’s got a bad rap: 7 in 10 want it shut down

About 70% of people think the dark web is such a bad place that it needs to be "shut down."
from Naked Security http://ift.tt/1q1kxWE

Commonly used IoT devices vulnerable to privacy theft

A technical investigation by Bitdefender has discovered that four commonly used Internet of Things (IoT) consumer devices are vulnerable to attack. The analysis reveals that current authentication mechanisms of many Internet-connected devices can easily be bypassed to expose smart households and their inhabitants to privacy theft. Researchers choose devices that were both popular and affordable in order to understand the security stance of each device. The team analysed the way each device connects to the … More
from Help Net Security http://ift.tt/1q1gHNj

How to get your talk accepted at Black Hat

There’s a wealth of technical information security conferences all over the globe, but Black Hat USA is the only one that gathers so many of the world’s top researchers under the same roof at the same time. In fact, last year more than 11,000 people showed up in Las Vegas to network and attend 110 research-based briefings presented by more than 190 researchers. Media exposure The media exposure is immense, with both specialized industry publications … More
from Help Net Security http://ift.tt/1RHUUmE

Teens would sell their personal data instead of working

Teens are aware of what their personal data is worth: about as much as a large pizza, according to a new study.
from Naked Security http://ift.tt/1Rqg5ul

How is Apple doing in its fight for #nobackdoors?

The court of public opinion doesn't seem to have decided who to support yet. How would you argue the case for or against?
from Naked Security http://ift.tt/1UU2xtF

Carders use custom built POS malware to hit US retailers

Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye researchers, crooks are dead set on stealing as much payment card information as possible before US retailers switch to chip-enabled cards, meaning they are trying to leverage all available POS malware on the market. Custom built POS malware As the researcher Nart Villeneuve explained, there is free POS malware (usually … More
from Help Net Security http://ift.tt/1RHElae

Creator of spoofed police Facebook page may be charged with felony

Funny or a public menace? The fake posts included an ad that offered sex offenders an opportunity to become "honorary" members of the force.
from Naked Security http://ift.tt/1MAyvZ7

Tuesday, March 29, 2016

Container security for enterprise computing

The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not have the level of visibility and control that they are accustomed to. At the same time, for DevOps to succeed, security and operations controls must be as agile and move as quickly as the assets to be protected. In this podcast recorded at RSA Conference 2016, John Morello, CTO … More
from Help Net Security http://ift.tt/1SlQdMC

Add IRM, data security and encryption to any app

Vera launched its new IRM-as-a-Service (IRMaaS) product, allowing developers to use Vera’s data security platform to build encryption, tracking, policy enforcement, and access control into custom business applications. By using Vera’s SDK and RESTful APIs, enterprises can directly protect and manage access to any data generated by custom-built business applications. Once protected, security teams can use Vera to gain visibility into how that data is used, anywhere it travels. Vera’s SDK and APIs are designed … More
from Help Net Security http://ift.tt/1olev1e

Why It's Okay to Pull the Handbrake Without Pushing the Button

Turns out, despite the noise, it’s perfectly fine to yank up on your handbrake without pushing the button. Here’s why.

At some point you’ve probably been one of these two people: the person that loudly yanks the handbrake up without pushing the button (to your passenger’s horror), or the horrified passenger wondering why you hate your car so much. In this video from the Engineering Explained YouTube Channel, Jason Fenske explains how your handbrake works and why the button is really only for releasing the brake.

Basically, it’s a simple ratchet system. As you pull up on the handbrake, a latch moves over several teeth (the noise you hear) until you stop and it gets caught and can’t go down without the button being pressed. As Fenske explains, it’s designed to work that way and it’s the same way a socket wrench works—just on a larger, much louder scale. So, if you don’t mind the noise, pull the handbrake without pushing the button as much as you like. Just don’t ever try to force the handbrake down without pushing the button.

http://ift.tt/1UToMjc...

Always Push the Handbrake Button? Myth Busted | YouTube


from Lifehacker http://ift.tt/1MR9CDi

Adam Savage's DIY Puppy Car Seat Can Be Secured in Place and Protects Your Upholstery

Adam Savage, of Mythbusters fame and now at Tested, needed a car seat for his dogs that could go right in the back of his brand new car—one that would protect the leather interior, but still be thick and sturdy enough not to move around when they get boisterous. He made this, and it works like a charm.

Ultimately Adam wanted a seat that wouldn’t move around in the car or get pushed out of the way or onto the floor when the dogs moved around, so he came up with this thick, custom plush pad that covers the whole seat, is secured with dowels in the space between the seat and the seat back, and covers the whole seat so the dogs can lay down and walk around without ripping up the leather interior. Plus, it’s relatively easy to make, as long as you gather the supplies (muslin, canvas, polyfill, and a few other assorted items available at your local craft store) and have access to a sewing machine.

It’s not a perfect system of course—ideally Adam’s solution would have protected the seat back as well, and as a number of commenters at Tested have pointed out, it would have been great if the system could have been “buckled in” using the seat belts in the back so it really wouldn’t move. Still, it’s a great solution, and one you can duplicate at home. Hit play above to see it in action, or check it out at Tested below.

Adam Savage’s One Day Builds: Puppy Car Seat | Tested


from Lifehacker http://ift.tt/1RxzXZd

Can You Soft Boil an Egg in a Cup of Hot Coffee?

I can’t start the day until I’ve had my java but I rarely have time to make breakfast. Perhaps there’s a way to kill two early birds with one stone. Today we’re trying to make both at the same time—in the same cup.

In this quick video we’re seeing if freshly made coffee is really hot enough to cook an egg, a supposed time-saving tip. If nothing else, it’s a decent way to dye an egg a festive brown color.


from Lifehacker http://ift.tt/1UTePSZ

Wrap a Camera Strap So It's Secure with No Extra Strap Getting in the Way

Wrapping a camera strap into a camera seems simple enough, but oftentimes you’ll end up with a bit of extra strap dangling around or it won’t feel too secure. On YouTube, ShotKit shows off his method for securing it cleanly.

ShotKit starts off by pulling off the buckles and reversing them. Then, he loops the strap end into the camera from the outside in, through the keeper, then through the inside of the buckle. The video above shows off how exactly this works. This should keep the strap looking good with no “flappy bits” dangling around.

The best way to fit a camera strap | YouTube via DIY Photography


from Lifehacker http://ift.tt/21RTkkA

Learn How to Memorize Information With This Video From a World Memory Champion

Can you memorize 20 random words in a couple of minutes? Yes, you can, after watching World Memory Championship winner Alex Mullen take you through a sample memory palace.

Alex is a 24-year-old medical student and the first American to win the title. Although we’ve talked about the memory palace technique a few times before (it’s what I used when training for the US Memory Championship), Alex does a great job in the video above of demonstrating how to “attach” words to specific objects and locations.

If you’re already a pro at using the memory palace, check out more tutorials at Alex’s website below, which include lessons on converting information to mental images and examples like learning Chinese or the branches of the trigeminal nerve with memory techniques. Good stuff!

Mullen Memory


from Lifehacker http://ift.tt/1Skl5gt

Wireless Home Security – Professional Monitoring is Better

Home security systems have really evolved – although it’s taken us decades to reach this point. That’s great news for homeowners. But some say that the pendulum can swing too far in the direction of change, and I actually believe that to be the case. Today I’ll explain why. Milestones in Home Security Technology Development...

continue reading

The post Wireless Home Security – Professional Monitoring is Better appeared first on Home Security Blog.


from Home Security Blog http://ift.tt/1LX46UT

New alerts for Gmail users targeted by state-sponsored attackers

Since 2012, Google has been warning Gmail users when they have been targeted by state-sponsored attackers, but now the alert will be even more visible (and therefore less likely to be overlooked or ignored): The new full-page warning says that Google can’t say how they know that the user’s account is being targeted by government-backed hackers, and urges the user to enable two-factor authentication and set up a Security Key on his or her account. … More
from Help Net Security http://ift.tt/1MPUtlN

Petya ransomware encrypts files, disks, locks users out of computers

A new type of ransomware does not only encrypt the victims’ files, but also their disk’s Master File Table (MFT), and it replaces the boot drive’s existing Master Boot Record (MBR) with a malicious loader. It makes the entire computer unusable until the ransom is paid or until the victims decide to cut their losses, repair the MBR themselves, and reinstall Windows. The ransomware is called Petya, and is currently being delivered via spear-phishing campaigns … More
from Help Net Security http://ift.tt/1qdV786

FBI cracks *that* iPhone

FBI didn't need Apple's backdoor... this time. Showdown avoided... for now.
from Naked Security http://ift.tt/1ZIhs9K

Printers all over the US “hacked” to spew anti-Semitic fliers

Andrew “Weev” Auernheimer, one of the two men who were prosecuted and convicted for harvesting e-mails and authentication IDs of 114,000 early-adopters of Apple’s iPad from AT&T’s servers, is back to his old tricks: using publicly accessible assets for furthering his own goals. As described in an extensive blog post, he discovered a great number of printers accessible (without authentication) through port 9100 open to the Internet, and fed them a simple Bash script that … More
from Help Net Security http://ift.tt/1RoR038

It may soon be a crime to walk and text in New Jersey

Penalties for violating the proposed ban: fines of up to $50, 15 days imprisonment, or both... the same penalties handed out to jaywalkers.
from Naked Security http://ift.tt/1oj2Obq

6 charged with manufacturing lottery luck

Retailers allegedly hit the machines with so many requests that they'd show if a ticket had won before presenting the [Cancel] button.
from Naked Security http://ift.tt/1LWrQZt

US govt has unlocked San Bernardino gunman’s iPhone

The US Department of Justice has found a way to get into the iPhone 5C owned by Syed Farook, one of the San Bernardino shooters. With a short status report filed with the Central California District Court on Monday, they noted that “the government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple Inc. mandated by Court’s Order Compelling Apple Inc. to Assist Agents in … More
from Help Net Security http://ift.tt/1pH6NiV

Don’t get stuck with dead end User Behavior Analytics

As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no matter its product, wants to be in the UBA space. Even after weeding out the pretenders, the number of UBA players is daunting. But savvy customers now talk about the dangers of getting locked into “first-generation UBA” and are looking for a more mature, stable next-gen solution. Why are … More
from Help Net Security http://ift.tt/1RoEvV3

Creating secure devices for the Internet of Things

The Internet of Things (IoT) and subsequent explosion of connected devices have created a world of opportunities we might never have anticipated. But have these new capabilities and associated connectivity come at the expense of security? We often hear how insecure embedded devices around us are and with sensors communicating from the most seemingly benign of devices – watches, thermostats, kettles and even garden equipment – what are the key challenges for organisations in making … More
from Help Net Security http://ift.tt/1MOZFq9

Security and privacy issues in QQ Browser put millions of users at risk

Citizen Lab researchers identified security and privacy issues in QQ Browser, a mobile browser produced by China-based Tencent, which may put millions of users of the application at risk of serious compromise. Researchers identified problems in both the Android and Windows versions of the application. The Android version of the browser transmits personally identifiable data, including a user’s search terms, the URLs of visited websites, nearby WiFi access points, and the user’s IMSI and IMEI … More
from Help Net Security http://ift.tt/1RoExfE

Monday, March 28, 2016

Web application security with Acunetix

Securing the web applications of today’s businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as 75% of cyber attacks done at web application level or via the web. Most corporations have secured their data at the network level, but have overlooked the crucial step of checking whether their web applications are vulnerable to attack. In this podcast recorded at RSA Conference 2016, … More
from Help Net Security http://ift.tt/1USgOXG

Economics of connections will fuel digital business

Business and IT leaders must structure their business and technology investments in a way that will capitalize on the new economic realities of a digital economy, according to Gartner. “In the flash of a digital business moment, a customer may become a partner or even competitor,” said Betsy Burton, VP and distinguished analyst at Gartner. “Digital business requires an organizational architecture that seamlessly accommodates economic agents in different roles depending on context, and can cope … More
from Help Net Security http://ift.tt/1MxCwNW

Wash Dark Clothes on a Short Cycle to Keep Colors from Fading

Dark clothing can fade quickly, but you can keep it at bay by washing them on a short cycle, always washing them inside out, and hanging them to dry—among some other tips in this video from Consumer Reports.

http://ift.tt/1ezJaDn...

When combined with other methods to preserve their color, like washing your clothes in cold water or turning them inside out, a short wash cycle keeps your dark clothing from fading, and you may have never thought to do it. And don’t worry—a short cycle won’t mean your clothes leave the washer dirty either, especially if you’re washing them after normal wear. Check the settings on your washer to see which cycle is the shortest. For more tips for preserving your dark clothes, check out the video above.

Spring Cleaning Tip #2: Keep Black Clothes Black | Consumer Reports (YouTube)


from Lifehacker http://ift.tt/22IFYNg

See Past the Annoying Flaws of Others With a Shift In Perspective

We all have friends or family with flaws that annoy us. Maybe they’re constantly late, or they talk too much, or they handle bad news poorly. Here’s a different way to look at the shortcomings of your friends and family when you’re frustrated.

As this video from the School of Life YouTube Channel explains, the faults of friends and family can come to dominate your view of them over time and leave you wondering why they’re the way they are. Why can’t they explain things more efficiently? Why can’t they be on time? Why can’t they handle bad news better? This mindset is a slippery slope, but you can change it. The weakness of strength theory suggests that people’s flaws are merely the downside of their merits or positive traits. The flaws your focusing on are the shadow attributes of other things you probably like about them. Your friend might ramble on about things, but it’s because they’re passionate and energetic. Your family member might always be late, but it’s because they lose track of time while working hard. So the next time someone’s flaws are annoying you, try to think about the positive trait that might be casting that shadow.

http://ift.tt/1HFc4ME...

The Weakness of Strength | YouTube


from Lifehacker http://ift.tt/1pVOOWS

US indicts 7 Iranians for cyber attacks against Wall Street, NY dam

NASDAQ, the New York Stock Exchange and more were bombarded with DDoS attacks between 2011 and 2013, and a dam's SCADA control system was breached.
from Naked Security http://ift.tt/1ShzvOA

A 1976 Congressional Report on Surveillance


from Schneier on Security http://ift.tt/1ShrOb9

Chinese national pleads guilty to stealing US military secrets

Su Bin, a businessman active in aerospace and aviation, admitted to directing hackers back home on where to target and what to steal.
from Naked Security http://ift.tt/1PB2N8K

Power on the Internet


from Schneier on Security http://ift.tt/1SqueXB

Is that an 0-day in your car? [Chet Chat Podcast 237]

Listen to the latest episode of our award-winning weekly security podcast.
from Naked Security http://ift.tt/1XXIs3L

Monday review – the hot 19 stories of the week

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.
from Naked Security http://ift.tt/22GSLQr

Dust Delicate and Hard-to-Reach Spots In Your Home With Cotton Gloves

Some areas are too hard to clean with a typical duster. For small nooks and crannies, or delicate objects that can’t withstand the weight of a duster, a pair of cotton gloves will do the trick.

This video from the Consumer Reports YouTube channel shows you how dusting blinds and other small spaces can be done quickly with your own fingers. Get yourself a pair of cotton gloves (you can get five pairs for $8 on Amazon), and get dusting. Run fingers along the top and bottom of each blind to get them cleaner than ever, or get into those small grooves in your cabinetry and make your kitchen look brand new. This method makes it easier to clean and dust your indoor plants as well so they can get some more of that sweet, sweet sunlight. The cotton will catch most of the dust and you can toss them in the wash when you’re done.

http://ift.tt/1Ul0TBk...

Spring Cleaning Tip #4: White Glove Magic | YouTube


from Lifehacker http://ift.tt/1XVi3n4

Tear Tape at An Angle to Leave An Easy Access Tab For Next Time

Every time you tear off a piece of tape from the roll, you’re left with the perpetual conundrum of peeling it off the next time. Instead, fold the tape to the side and tear it to leave a tab for easy access later.

This tip comes from filmmaking tips site The Black and Blue. When you have to mark locations for actors all day, you don’t want to have to fiddle with tape constantly. The technique, as shown in the video above, makes it quick and easy to tear off multiple pieces of tape in a row and it always leaves a tab for you to grab onto the next time you need a piece. While you do lose a very tiny bit of tape in the process each time, you can weigh that against the time (and likely extra tape) you save by not having to fiddle with picking at the end of the roll with your fingernails.

How To Rip and Tab Paper Tape for Marking Tutorial | The Black and Blue via Reddit


from Lifehacker http://ift.tt/1SdzaMT

Turn an IKEA Lamp into a Remote-Controlled Death Star Lamp

Instructables user AudriusA1 shows us how to create this unique ceiling lamp that sort of looks like the Death Star from Star Wars.

The $70 IKEA PS 2014 lamp already sports that unusual cutout design, but to open and close the shade, you have to pull the lamp’s strings. (The lamp’s designer, David Wahl, says he was inspired by science fiction movies and video games, by the way.)

In the hacked version above, engineer AudriusA1 replaced the string with a DC motor and added an Arduino micro-controller to operate it. You can control the lamp’s movement precisely with the remote control, save 3 position settings, and have the lamp remember the last position when you switch it on. A fun and also practical use of your Arduino skills.

For the full parts list, instructions, and Arduino code, head to the link below.

Remote Controlled IKEA Death Star Lamp | Instructables


from Lifehacker http://ift.tt/1UjYlU4

Friday, March 25, 2016

Beware typosquatting – these are not the websites you’re looking for

Be careful when you type in a URL: your fingers could betray you.
from Naked Security http://ift.tt/1ZBKW9f

Create Perfectly Clear Cocktail Ice With Directional Freezing

Crystal clear ice may not make your cocktail taste any better, but it definitely makes it look more elegant and sophisticated. Using a process called directional freezing, you can make a huge batch of perfectly clear ice without any expensive equipment.

In this video from the Cocktail Chemistry YouTube channel, you’ll learn how you can use it to create glass-like ice that can be shaped for multiple styles of cocktail. All you need is a small cooler with the lid removed, and a serrated knife and mallet for carving the ice. Fill the cooler with water (tap water is just fine), then stick it in the freezer for about 24 hours. It should be crystal clear ice by that time. Then plop the clear ice block on a cutting board and get carving. You can make small ice cubes for general use, large cubes for whiskey, and long cubes for cocktails in tall glasses.

As the video explains, the cloudiness you see in most ice is formed toward the end of the freezing process. Directional freezing in an insulated cooler forces the water to freeze top to bottom, which keeps the water in the cooler from freezing all the way through. In fact, you don’t want the water to freeze all the way through because that’s when the impurities begin to form. Using filtered or boiling water will help with cloudiness to some extent, but this method will guarantee maximum clarity.

http://ift.tt/1pN9YGH...

Cocktail Chemistry - Clear Ice | YouTube


from Lifehacker http://ift.tt/1SbRkyu

Friday Squid Blogging: President Squid


from Schneier on Security http://ift.tt/1LNxywC

Build a Nintendo DS-Sized Portable Raspberry Pi

We’ve shown off how to build a handheld Linux machine using a Raspberry Pi before, but a lot’s happened since Node put together that original guide. So much so, that he’s created an updated version with lots of cool new features.

http://ift.tt/1URj7ZU...

This time around, the handheld Linux machine uses the beefed up Raspberry Pi 2, an Adafruit touchscreen, a wireless keyboard, and then the case is made by jamming together two hard drive cases. All in all, it’s about $120 worth of parts, but the end result is a handheld touchscreen device that can still output to a bigger screen if you want. It’s a little more accessible to make this time around too, and the end result is a heck of a lot more powerful than the previous version that relied on a Raspberry Pi Model A. You can find the full how-to video over on YouTube or head over to the text version on Node.

How to Create a Handheld Linux Terminal (V2) | Node


from Lifehacker http://ift.tt/1Ui6U1s

How to Fold a Shirt for Any Occasion

Folding a shirt isn’t exactly rocket science, but there are a few ways you can do it and not all methods are created equal. Here are some fast ways to keep your shirts wrinkle-free, organized, and efficiently packed away. Your laundry origami will never be the same.

The five second t-shirt fold takes some practice, but it’s definitely the fastest way to get those shirts flat and sorted.


from Lifehacker http://ift.tt/1WOTOqp

Prepare For Impact Shows You How to Survive a Plane Crash or Other Airborne Emergency

iOS/Android: If you’re afraid of flying, you might want to skip this one. On the other hand, Prepare For Impact is a useful gaming app for doing something about that fear, as it shows you exactly what to do in various airplane-related emergencies.

The app, a 3D game, simulates different emergency situations, from a cabin fire to crashing in the water. To play, you guide your character through the emergency, using the instructions you’re given. The goal is to make it out of the emergency unharmed as quickly as possible.

Prepare for Impact was developed by Italy’s University of Udine’s HCI Lab, and it’s a little terrifying, yet informative and useful. You can check it out at the links below.

Prepare for Impact | Apple Store
Prepare for Impact | Google Play


from Lifehacker http://ift.tt/1pBPSOR

Monitor and Play With Your Pets From Anywhere With This Discounted Petcube

If you’ve come home after work to one too many destroyed pillows or overturned trashcans, this ingenious little gadget can help you keep an eye on your pets from anywhere.

Petcube is a Wi-Fi camera, intercom system, and laser toy all wrapped into one sleek package, and Amazon is selling it today for $150, or $50 off its usual price. The video above does a better job of explaining this thing than I ever could, and if you own a pet and spend a lot of time away from home, it certainly seems like it could be a great investment. [Petcube, $149]

http://ift.tt/1WNSNie...


Commerce Content is independent of Editorial and Advertising, and if you buy something through our posts, we may get a small share of the sale. Click here to learn more, and don’t forget to sign up for our email newsletter. We want your feedback.


from Lifehacker http://ift.tt/1pBt4P8

Interesting Lottery Terminal Hack


from Schneier on Security http://ift.tt/1PuU0W4

Banks failing with password management, but why?

A recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found that 35 percent of the test group appear to have a significant weakness in their password policies used by their customers to access their accounts and manage their money. The list of banks mentioned are highly known and possess assets in the billions of dollars, meaning they … More
from Help Net Security http://ift.tt/1Ufvhgj

Facebook testing new features to prevent user harassment

Facebook is testing three new features that should help prevent or at least minimize harassment of users on its platform. The first will alert users if someone tries to impersonate them on the social network by using the same name and profile photo they are using. The alerts go out automatically, and users will be able to review the matter and say whether they believe the profile in question is impersonating them or not. Then, … More
from Help Net Security http://ift.tt/1RADFAs

Advanced Persistent Bot activity on the rise

Bad bots are used by fraudsters and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, data theft, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime. In their annual report that identifies statistically significant data on global bot traffic, Distil Networks identified an influx of Advanced Persistent Bots (APBs). These can mimic human behavior, load JavaScript and external assets, tamper with cookies, perform browser … More
from Help Net Security http://ift.tt/1RADEMT

Hide Your Valuables Inside a Hollowed Out Decorative Candle

Decorative candles—the kind you don’t usually light—look and smell nice, but it would be great to get some use out of them. Here’s how you can hollow one out and stash some valuables inside.

This video, from youtuber MrGear, shows you how to hollow out the bottom of a candle and make a secret compartment. Use a power drill with a hole cutting bit and drill into the bottom of a large, decorative candle (pull off the sticker and hold onto it for later). Then carefully carve out the rest of the hole with a knife. You could also use a wood spade or paddle bit if you want to do it all in one go. Keep all of the wax you drill and cut out, reshape it into a disk by melting it all in a jar lid, and shape the disk so it fits into the hole at the bottom of the hollowed out candle. Now stick your cash or valuables inside the candle, place the lid over the whole, and melt it shut with a lighter or mini-torch.

Once you put the sticker back on, the candle looks good as new. No one will ever suspect there’s anything inside. Of course, once the stuff is in there, it’s not going to come out very easily. This trick is probably best for hiding some emergency cash or something you don’t need to get to regularly.

http://ift.tt/22J86MK...

How to Make a Secret Candle Compartment | YouTube


from Lifehacker http://ift.tt/22yMs1g

Build a Solid VR-Ready PC For Less Than $1,000

We’ve seen a few different builds for VR-ready gaming rigs, but if you’re curious what some pros are planning on using, Tested partnered with Loyd Case to put together their VR testing PC for about $1,000.

http://ift.tt/1Z6oVxB...

$1,000 isn’t exactly the cheapest way to do things, but considering Tested is planning on using this as their in-house VR testing system, it’s nice to see what they pick to round out their PC after a ton of hardware tests. Their hope is to put together a PC that’s affordable and uses some pre-existing hardware you might already have, but includes powerful components where necessary. Here’s what they picked:

  • BitFenix Prodigy Mini-ITX Case ($50)
  • Corsair CX500 Power Supply ($80)
  • Samsung 850 EVO 500GB SSD ($150)
  • Intel Core i5-4690k CPU ($210)
  • Crucial Ballistix Sport 16GB DDR3 1600 RAM ($62)
  • ASrock H97M-ITX/AC Motherboard ($90)
  • ASUS Strix GeForce GTX 970 GPU ($300)

The total for all those components is around $940 and it assumes you already have a keyboard, mouse, and all those other basics. Of course, this is just one particular build and there are hundreds of other ways to do things, especially if you don’t care about VR.

http://ift.tt/1NHGN01...

How to Build a $1000 Virtual Reality Gaming PC | YouTube


from Lifehacker http://ift.tt/1o9vymQ

Make Your Own Girl Scouts Thin Mint Cookies at Home

As a mom of a Girl Scout, I hope you will buy your Thin Mints from the Girl Scouts. However, cookie season is coming to a close. Make those minty chocolate cookies last all year round with this copycat version.

You’ll need an egg, peppermint oil, vanilla extract, flour, sugar, cocoa powder, salt, and butter. The video above from Chowhound and the text recipe also include instructions for making the chocolate coating that makes Thin Mints distinctive.

And, yes, you can buy Keebler Grasshoppers instead, but then you’ll miss out on the homemade cookie-baking smell wafting throughout your home.

Thin Mint Girl Scout Cookie Recipe | YouTube


from Lifehacker http://ift.tt/1RovWZo

FBI vs. Apple: Who Is Helping the FBI?


from Schneier on Security http://ift.tt/1RjOMlm

Privacy Lets You Create "Virtual" Credit Card Numbers, Deactivate One Instantly If It's Stolen

Every other day there’s a hack. Credit card information is stolen, leaving you stuck calling your bank for a new one, or waiting to see if yours is misused, but Privacy is a new tool that lets you create virtual, disposable numbers, then deactivate them instantly if one is stolen.

You know how you in Gmail you can create email addresses like “myname+service@gmail.com” and then, if you get spam to it, you know who sold your email address to a list somewhere? Privacy is pretty much the same thing, except for your credit card or bank account. You still have the fraud and liability protection that your bank or credit card company offers, and your transactions happen like normal.

http://ift.tt/1XQfSRB...

Privacy just gives you the ability to create virtual “accounts” that are authorized to charge a given amount to your credit card or bank account. You can set that account to be single use or multi-use, and if the amount is used up, then the transaction doesn’t go through to your main account. If one of your virtual accounts gets hit with an account you don’t recognize, you’ll be able to open the account from the Privacy Chrome or Firefox extension and shut it down immediately. The Chrome extension lets you manage your account quickly, auto-fill shopping sites with your virtual account numbers, or quickly create or shut down numbers.

Privacy is completely free, and makes money by acting as a credit card processor (you can read more here), so that’s why they don’t have to charge you for the service. From a security perspective, you can read all about how Privacy keeps your data safe here, as well as how the service secures its connection with your bank. Hit the link below to learn more, see how it works, and sign up if you’re interested.

Privacy


from Lifehacker http://ift.tt/22y7gWA

7 Iranians indicted for cyber attacks on US banks and a dam

The US Justice Department unsealed on Thursday an indictment charging seven Iranian computer specialists for conducting a coordinated campaign of distributed denial of service attacks against 46 major companies, primarily in the US financial sector, from late 2011 through mid-2013. The individuals – Ahmad Fathi; Hamid Firoozi; Amin Shokohi; Sadegh Ahmadzadegan, a/k/a Nitr0jen26; Omid Ghaffarinia, a/k/a PLuS; Sina Keissar; and Nader Saedi, a/k/a Turk Server – were employed by two Iran-based computer companies, ITSecTeam and … More
from Help Net Security http://ift.tt/1q47vaD

Why We Get Hangovers When We Drink Alcohol

We all want to know the secrets to getting over hangovers, but have you ever wondered how you go from “Woo!” to “WOOOO!” to “Ugh...” in the first place? This video by Brit Lab explains the types of drinks that give the worst hangovers, why we get them, and if there’s something we can do other than make (short-lived) promises to never touch alcohol again.

Most of us know the basics: the more alcohol we drink, the more likely the next morning could be quite dreadful. Obviously, tolerance levels will vary. More specifically, Brit Lab explains hangovers happen because first, alcohol makes us pee more and become dehydrated. Then, its breakdown in the body releases nasty things like acetaldehyde and cytokines, which can be responsible for our general feelings of nausea and headaches. Plus, since the liver is busy processing the alcohol, it can’t produce as much blood sugar during your slumber. As a result, you wake up feeling tired, irritable, and generally feeling like death.

http://ift.tt/1IE6Caj...

If you’ve overdone it, well, the internet has brewed up various cures (some work but most are ineffective), and everyone’s got their own remedies. If I can stomach it, I personally would enjoy a nice breakfast. Otherwise, just leave the blinds closed and talk to me in two days.

Why do we get hangovers? | Brit Lab


from Lifehacker http://ift.tt/1RB55fK

MyPermissions Gives You Total Control Over Which Apps Can Access Your Data

Android/iOS: The apps on your smartphone each have tons of permissions, some of which are necessary, others not so much—MyPermissions helps you manage them all, and cut off the ones that like to snoop where they don’t belong.

http://ift.tt/1SWqdYV...

MyPermissions has been around for a bit, but their latest update includes active scanning for apps and app updates that change their permissions levels, or start using permissions they never used before—especially useful if you have auto-updates turned on at Google Play.

Open the app up, and it’ll scan your installed applications and report back which ones that use things like your location, access your inbox and contacts, have access to your camera or photos, and so on. You can tap any category to see more about each app and category, organized by “risk,” high to low. When you see that a silly time-wasting game has access to your photos, you have the option to either add the app to your trust list, uninstall it, or see what other permissions it has access to. Best of all, MyPermissions quantifies the permissions an app has access to in terms of real impact to you, so you don’t worry about what something could mean. You’ll know.

All in all, it’s a great way to find out what access all of your apps have at a glance, and choose which apps get the okay to access your data and which ones don’t. Hit the link below to check them out.

MyPermissions (Free) | Google Play
MyPermissions (Free) | iTunes App Store


from Lifehacker http://ift.tt/22HH2xF

Facebook’s testing a feature that alerts you if someone’s impersonating you

It's planning to alert you when the pod people have glommed onto your profile photo and name.
from Naked Security http://ift.tt/1XPzJjT

Cryptography Is Harder Than It Looks


from Schneier on Security http://ift.tt/1RiUy6S

FBI adds two Syrian Electronic Army hackers to Cyber Most Wanted list

"The Pro" and "The Shadow" may have been stealthy spearphishers, but they left a clear digital trail on Facebook and Gmail.
from Naked Security http://ift.tt/1XPyfGn

OS X zero day bug allows hackers to bypass system integrity protection

An OS X zero day vulnerability could allow attackers to bypass System Integrity Protection, Apple’s newest protection feature, and to escalate their privileges, simplifying the path to total system compromise in both OS X and iOS systems. According to researcher Pedro Vilaça, who discovered the flaw in late 2015, roughly at the same time as researcher Ian Beer of Google Project Zero, the vulnerability (CVE-2016-1757) is a non-memory corruption bug that exists in all versions … More
from Help Net Security http://ift.tt/1o8muyC

8 tips for preventing ransomware

If you haven't been hit been ransomware yet, you're either very lucky, or you've taken some proactive steps to protect your computers and files. We present 8 tips you should use to stay protected.
from Naked Security http://ift.tt/1UO7qD7