Batch Resize Images in OS X With This Automator Script

If you need to resize a ton of images on your Mac, Automator is the way to do it in one fell swoop. 9to5Mac shows off how to quickly make your own Automator service for doing just that.

While Automator might be a little intimidating for new users, it’s pretty easy to get the hang of it. For this one, you’ll just create a new service, use the scale images action, and set it up to scale to whatever size you need. This is handy if you’re bringing in photos from a camera that need to get resized for a web site, or if you’re just looking to cut down on hard drive space. Head over to 9to5Mac for the guide.

How-To: Quickly resize images on OS X using a Service with Automator | 9to5Mac


from Lifehacker http://ift.tt/26E0cHp

Make Homemade Mandarin-Style Orange Slices With Pectinase

Everybody loves the sweet flavor and gem-like appearance of mandarin oranges, and this video will show you how to make your own at home. You can even use this same technique to make fruit gems out of almost any citrus fruit.

In this video from the ChefSteps YouTube channel, Chef Grant Crilly shows you how to turn some orange slices into mouthwatering citrus gems with a little pectinase. Pectinase is an enzyme that breaks down, well, pectin, or the white stuff that’s all over your orange slices once you remove the peel, and it’s easily available at Amazon, or any restaurant supply store.

If you want to remove that white stuff and make some mandarin-style orange slices, dump your peeled orange segments in a bowl of water and add a few drops of pectinase. Let it sit for a few hours at room temperature, or overnight in the fridge, and you’ll be left with great looking, super tasty orange slices you can serve at a party or use as a garnish for fancy cocktails.

http://ift.tt/1NH03g7...

ChefSteps Tips & Tricks: Perfect Citrus Gems | YouTube


from Lifehacker http://ift.tt/1TB2T5t

Friday Squid Blogging: Global Squid Shortage


from Schneier on Security http://ift.tt/1Ww4vzN

Build a Low-Light Streaming Video Baby Monitor With a Raspberry Pi

If you’re looking for a DIY way to keep an eye on your baby, Element 14's put together a guide that shows off how to build your own night vision camera with motion detection using a Raspberry Pi.

The project here uses the Raspberry Pi 3 alongside the NoIR camera adapter. From there, the Raspberry Pi runs a live video stream that can send you a notification any time it detects motion. It might seem a little stressful to use a DIY system for something as important as a baby monitor, but the live stream makes it so you can check in as often as you like to make sure it’s always working. Still, you might want to use it in addition to a more traditional audio monitor. Either way, head over to Element14 for the full guide to make it for yourself.

NoIR V2 Video Streaming Baby Monitor | Element14


from Lifehacker http://ift.tt/1O10oVQ

I'm Writing a Book on Security


from Schneier on Security http://ift.tt/1NGp1ML

Teach Your Kids to Stop Interrupting You with This Technique

Kids are impatient little buggers who don’t realize they’re being rude when they interrupt you when you’re having a conversation. Here’s an easy technique that will teach children a better way to get your attention.

Mom coach Kirsten explains the four steps in the video above.

  1. Teach your child to place his or her hand on you when they want to speak to you while you’re talking to someone else.
  2. Put your hand on top of theirs to acknowledge they want your attention.
  3. Politely excuse yourself from the conversation.
  4. Thank your kid for waiting and give him or her your full attention.

You might need to practice this a few times to establish it as a new good habit, but if you’re tired of always saying “wait a minute” or “I’m talking over here,” it’s definitely worth a try.

Teaching Your Child to Stop Interrupting: M #1 | YouTube via Kids Safety Network


from Lifehacker http://ift.tt/23e4cKe

Facebook told to hand over all data on user, including fake account set up by extortionist

Italy has ordered Facebook to turn over all data on a user to the user, including the information from a fake page set up by an extortionist.
from Naked Security http://ift.tt/1pP1uxG

This rule change just made it easier for the government to hack you, wherever you are

The Supreme Court's changes to Rule 41 could allow judges to authorize the government to access computers anywhere in the world.
from Naked Security http://ift.tt/1rFcYWm

The Psychological Factors That Cause Food Cravings

We all get cravings for specific foods every now and then, and those cravings can be so strong, they almost feel involuntary, like your body is missing some nutrient it can get from a Cinnabon. This isn’t typically how cravings work, though.

As SciShow explains, cravings are a lot more psychological than they are physiological. Host Michael Aranda says that they’re usually tied to different emotional triggers, like stress. He explains:

Eating a butter frosted cupcake or a bag of salty fries releases an opioid typhoon that lights up the brain’s pleasure center and makes us feel awesome...cravings are also tied to your brain’s memory center, which explains why you might also crave a food that isn’t full of fat or sugar. Your brain could be tying that food to a happy memory or a reward, and thinking about the memory associated with that food can make you crave that food.

Marci Pelchat of the Monell Chemical Senses Center told Smithsonian magazine that there are indeed some extreme deficiencies that cause cravings, but generally, cravings aren’t our body’s way of telling us we need something. For more detail, check out the full video.

What Causes Food Cravings? | YouTube


from Lifehacker http://ift.tt/1TjiKTD

US Supreme Court approves expansion of FBI hacking powers

The US Supreme Court has approved on Thursday several changes to the federal rules around search warrants, one of which would allow US federal law enforcement agents to remotely access suspects’ systems when they don’t know the systems’ IP address because it has been concealed, and victims whose computers have already been compromised by attackers. Rule 41 of the new Federal Rules of Criminal Procedure states that “a magistrate judge with authority in any district … More
from Help Net Security http://ift.tt/1rnoAgm

Is that a VPN I see before me? [Chet Chat Podcast 239]

After a short break due to travel committments, the Chet Chat is back...enjoy!
from Naked Security http://ift.tt/1TAdQEh

Tinder Social tells your Facebook friends that you’re on Tinder

The way Tinder Social works today assumes that you want all of your Facebook friends who use Tinder to know that you're also using Tinder.
from Naked Security http://ift.tt/1pOhos9

Screen overlay Android malware is on the rise

As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in the GM Bot malware, first offered for sale in late 2014 in the Russian-speaking cybercrime underground. It’s source code has been leaked on the same markets, apparently by someone who bought the malware, but its original author released a new version in March 2016 – and … More
from Help Net Security http://ift.tt/1UlgGzh

Suspect refuses to decrypt hard drives, is detained indefinitely

A former Philadelphia Police Department sergeant suspected of possessing child pornography has spent seven months in a detention center without being charged of any particular crime, Ars Techica reports. His detention, ordered by a US district court judge on civil contempt grounds, will continue until he agrees to provide the passcodes needed to decrypt the hard drives seized in his home when he was arrested on March 2015, or until the US Court of Appeals … More
from Help Net Security http://ift.tt/1T9s8sL

US House unanimously passes Email Privacy Act

If passed by the Senate, the bill will require a warrant before tech companies are forced to hand over customers' email, no matter how old.
from Naked Security http://ift.tt/24oCmNT

Defend encrypted data from quantum computer threat

If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and privacy? That’s the overarching question posed by a new report from the National Institute of Standards and Technology (NIST), whose cryptography specialists are beginning the long journey toward effective answers. The Report on Post-Quantum Cryptography details the status of research into quantum computers, which would exploit … More
from Help Net Security http://ift.tt/26zGQ6m

Thursday, April 28, 2016

Pro-ISIS hackers: Tactics, methodology and tools

While the threat that emanates from ISIS-inspired cyber attacks is of high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously disparate pro-ISIS hacking collectives, these hacking groups still operate unofficially and remain poorly organized and are likely underfunded, according to Flashpoint. “Given prior attacks that compromised the CENTCOM and Newsweek Twitter accounts, new concerns regarding ISIS’s cyber capabilities have clearly emerged. Until recently, our analysis of the … More
from Help Net Security http://ift.tt/1QEkvJe

1 in 10 people have posed as someone else online

Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data with a friend or partner. Of this group, 87% said that they trust the recipient with this information. This trust can be explained by two key factors – convenience, and a lack of understanding of the potential value of this data – 16% report that … More
from Help Net Security http://ift.tt/1WWmsIt

The challenges of controlling IT complexity

IT teams overwhelmingly feel that today’s IT environments are very complex – and that growing complexity is making it more difficult for them to do their jobs successfully, according to Ipswitch. The research pointed to IT teams feeling that they are at risk of losing control of their company’s IT environment in the face of new technologies, devices and performance requirements. Top findings 66 percent of IT professionals feel that increasing IT complexity makes it … More
from Help Net Security http://ift.tt/1T98hKb

Modify a Kitchen Cabinet So You Can Kick to Open It

If you have one of those kitchen setups where your trash cans are inside a cabinet, you know it’s always gross to have to open up that drawer when your hands are dirty. Instructables user homesteadonomics came up with a solution to open the cabinet with a kick.

The solution here doesn’t require rocket science. It’s essentially a block of wood connected to a spring and bolt that pushes the cabinet open. Kick the block of wood, and the mechanism pushes the cabinet open. You won’t need much to take this project on for yourself, so head over to Instructables for the full guide.

Cabinet Opener - Kick to Open | Instructables


from Lifehacker http://ift.tt/1VWPrw3

Google's OnHub Router Adds Support for IFTTT

Google’s OnHub router is a pricey, but it’s still a handy smart router. It’s getting even smarter with integration with the automation service, If This Then That.

http://ift.tt/1E3vf4m...

Like any other service, the OnHub hooks into IFTTT through channels. The options are a little limited right now. The OnHub recipe options are mostly useful for hooking into connected devices like Wi-Fi lights or cameras, so you can automate things when you connect or disconnect from your router. Still, it’s a handy addition for OnHub users and worth exploring some of the recipes to see what you can come up with.

OnHub Keeps Getting Better - Now Supports IFTTT | OnHub via Android Police


from Lifehacker http://ift.tt/1N3N0oZ

Strike a Match On Other Matches If You Don't Have the Strike Anywhere Kind

If you don’t have strike anywhere matches, and the striking surface on your matchbox has worn out, this last resort trick can help you get a fire going.

This video from youtuber MrGear shows you a clever option if you can’t get your match to light in a pinch. You can try places like your pants zipper or other abrasive surfaces, but they won’t always work. This striking technique, while a bit wasteful overall, will get the job done. Pull five matches from the box and hold four of them together so the striking ends are in a square or box shape. Take the fifth match and stick the striking end in the divot between the striking ends of the other four matches. Now twist the the single match and flick. After a few tries, the match—and the other matches—will light. You might be able to do this with fewer matches to reduce waste (some say it’s possible with only two), but your mileage may vary. Of course, you could also turn your regular matches into the strike anywhere kind if you have the time.

http://ift.tt/1qZAagY...

How to Light a Match Against Another One | YouTube


from Lifehacker http://ift.tt/23b0BN4

Make Your iPhone's Folders Round with a Special Wallpaper Glitch

Ever wanted round folders instead of the squared off ones on your iPhone? Youtube user videosdebarraquito shows off how to do that by using a special wallpaper image.

To do this, you’ll need to download one of these tiny, 3x3 images, then set it as your home screen wallpaper (Settings > Wallpaper > Choose a New Wallpaper > Camera Roll). Once you do, you’ll notice that all your folders on the main page turn into circles. This doesn’t work with multiple pages, but it’s a fun little trick nonetheless.

Round Folders Glitch | YouTube via Cult of Mac


from Lifehacker http://ift.tt/1qYUuPE

How to prevent snoops from stalking you in Waze with “ghost” drivers

A team of researchers has published a paper claiming they can track a Waze driver's exact route using thousands of simulated "ghost" vehicles in the app.
from Naked Security http://ift.tt/1VWFmzh

Gamekeeper turns poacher? The ex-Tor developer who unmasked Tor users for the FBI

Matt Edman has worked on Tor, helping users be anonymous, and he's worked for the FBI exposing anonymous Tor users suspected of child abuse.
from Naked Security http://ift.tt/1NDkzhI

The flaw that left .as websites and owners exposed for at least 16 years

Security researcher Infosec Guy has exposed a serious flaw in the American Somoa domain registry that existing for at least 16 years.
from Naked Security http://ift.tt/1NXb3kf

Learn How to Weave Bacon With This Video

Weaving bacon strips together is the best way to get more bacon flavor out of every bite of your BLT or burger. If you’ve never woven bacon (or a basket) before, this video will show you how to do it.

First, you lay a row of thick-cut bacon strips in the same direction. Fold back every other strip and lay a strip of bacon across horizontally. Flatten out the strips you folded back. Then fold back the opposite strips and lay another strip of bacon across horizontally. Well, just watch the video.

This isn’t a new or novel way to bake a rectangle of bacon, but the video does a good job of showcasing just how it’s done, along with essential tips like making sure you keep the bacon strips close together for a tight weave. Bake for about 15 minutes at 400F and enjoy.

Quick & Simple Bacon Weave | YouTube


from Lifehacker http://ift.tt/1NX8mPQ

Suspect who won’t decrypt hard drives jailed indefinitely

He's got the keys to his own prison, the court says.
from Naked Security http://ift.tt/1SvnV6u

Former Tor developer helped the FBI unmask Tor users

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to unmask visitors to three child pornography websites on the Dark Web, The Daily Dot has found. As you might remember, in Operation Torpedo, the FBI seized three servers run by Aaron McGrath from Nebraska, and inserted the malware onto the several illegal sites that were hosted on them. … More
from Help Net Security http://ift.tt/1SvcVWP

Amazon Unlimited Fraud


from Schneier on Security http://ift.tt/1rkyGOY

Why Fad Diets Don't Work, and How to Spot Them

Fad diets come in many different forms. Some are straight up weird, and some are less crazy than others, but pretty much all of them share a few key characteristics. This video shows you how to spot health industry snake oil from a mile away.

We’ve been fed appetizing solutions to quick and easy weight loss for centuries, with diets like the vinegar diet and history’s first recorded low-carb diet, the Banting diet, tracing back to the Victorian era. Today we still see updated, new-age science fad diets because many of us still fall for them. This video by TED-Ed suggests looking out for these red flags:

  • The diet focuses on intensely cutting back calories or entire food groups (like fat and carbohydrates).
  • You’re allowed to only eat very specific foods with very specific instructions.
  • Most of the foods they recommend you eat are expensive proprietary bars, powders, drinks, and other products.

Another red flag that isn’t mentioned is endorsement by a celebrity or a self-proclaimed “health guru” who makes a living not treating patients, but selling books and going on speaking tours.

Admittedly, fads like the blood-type diet, alkaline diet, lemonade diet, and so on could all work...for a while. In fact, any diet could “work” if you manipulate calorie reduction through strict rules, elaborate rituals (no carbs after 8pm!), and eliminating entire food groups and sources of high-calorie junk. In the end, you’re eating fewer calories, which means you’ll lose weight. Whether that lost weight is water, muscle, fat, or your sanity is another thing though.

http://ift.tt/1rkvSRO...

Still, what works in the short term doesn’t translate to long-term success or even good health—mainly because for most people these diets aren’t sustainable. The video does touch on a fair point that sometimes rapid weight loss may be warranted in very specific medical circumstances. For everyone else, the real methods for the most rewarding and lasting changes to your mind and body are unsexy.

How to spot a fad diet | TED-Ed


from Lifehacker http://ift.tt/1TfXPki

PCI DSS 3.2 is out: What’s new?

The Payment Card Industry Security Standards Council has published the latest version of PCI DSS, the information security standard for organizations that handle customer credit cards. Changes and improvements in PCI DSS 3.2 include: Multi-factor authentication will be required for all administrative access into the cardholder data environment. Previously, use of multi-factor authentication was only a must when it was accessed remotely, by an untrusted user/device. “This will not impact machine authentication where one system … More
from Help Net Security http://ift.tt/1pJEsbA

App Volume Control Lets You Change Your Phone's Volume Per App

Android: Google has improved Android’s handling of volume controls, but it’s still a hassle to change volumes every time you change apps. App Volume Control lets you change volumes based on which app you’re in.

App Volume Control lets you adjust each of the various types of volume in Android, including media volume, your phone’s ringer, alarm volume, notification sounds, or system volume. Tap the app’s entry to enable volume control, then set the levels where you want them. Any app you don’t enable will use whatever the system default is like normal.

App Volume Control | Google Play Store via MakeUseOf


from Lifehacker http://ift.tt/1NWrZYe

Gold-mining firm Goldcorp hacked, its data leaked online

Canadian gold-mining company Goldcorp has suffered a data breach of seemingly catastrophic proportions. On Tuesday, the attackers leaked a lot of sensitive internal data about the company and its employees, and have promised to leak more, including “14 months of company wide emails, emails containing some good old fashion corporate racism, sexism, and greed.” The first batch of stolen data – 14.8 GB in all – has been posted on a public paste site, and … More
from Help Net Security http://ift.tt/24lXfcw

German city embeds traffic lights in sidewalks to protect texters

Smartphone zombies: it's an amusing portmanteau for a serious problem. One 15-year-old girl wearing earbuds was recently killed after being dragged by a tram.
from Naked Security http://ift.tt/1QCordi

Do you have what it takes to be an independent security consultant?

It doesn’t matter if you’re part of a big enterprise or a small company, you’ve probably wondered at least once what it would be like to work for yourself. Dreams of more free time, the possibility of self-organizing and working when it suits you, no unreasonable requests from the boss, or endless stories coming from that boring co-worker are great, but could you find enough work and perform all the tasks? Would your future be … More
from Help Net Security http://ift.tt/1SRX46K

Fake Chrome LastPass extension leads to unwanted installs

A fake LastPass extension has been found lurking on the Chrome Web Store, offering promises of free and easy password management, but instead taking users for a ride involving website redirections, deceptive ads, and potentially unwanted toolbars. Inexperienced users are likely to fall for the scheme and download the fake extension as the publisher has perfectly replicated the page offering the legitimate one: The download numbers say that over 1,800 users were tricked into downloading … More
from Help Net Security http://ift.tt/1qWPF9v

Attackers use open source security tools for targeted cyberespionage

Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customized hacking tools or buying them from third-party suppliers on the criminal underground, they are using tools available on the web for research purposes. Several cyberespionage campaigns utilizing such tools have been spotted recently by experts. This means that even less-professional, less-skilled and less-resourced hacker groups can now pose a threat to users and companies. Moreover, the use of legitimate … More
from Help Net Security http://ift.tt/1WsfrOW

Most users limit personal info on social media due to hacking fears

Only 10 percent of internet-using adults in America used at least one social networking site in 2005. More than a decade later that number has grown exponentially, with 84 percent of U.S. adults claiming to have at least one social media account, according to a survey by University of Phoenix conducted online among 2,088 U.S. adults 18 years or older. As the prominence of social media has grown, so too has the number of criminals … More
from Help Net Security http://ift.tt/1SRCROn

Wednesday, April 27, 2016

The inherent problems of the detection paradigm

An ongoing debate in the modern cybersecurity world is whether to detect or prevent cyberattacks. Although detection technologies are undoubtedly important tools in the defender arsenal, recent years show they have only limited effects when encountering certain types of cyberattacks. Network based intrusion detection systems (NIDS) and host based intrusion detection systems (HIDS) have been defeated time and again. Typically, attackers successfully penetrate through the NIDS systems and gain a persistent foothold within an organization’s … More
from Help Net Security http://ift.tt/1VTWTIV

Cybersecurity insurance: A global perspective

While the majority of global organizations say that it is “vital” their organization is insured against information security breaches, less than half (41%) are fully covered for both security breaches and data loss and just over a third have dedicated cybersecurity insurance. Of the countries polled by NTT Com Security, 49% of the US companies surveyed currently do not have insurance specifically for cyber security attacks. Cybersecurity insurance around the world Research among 1,000 non-IT … More
from Help Net Security http://ift.tt/1SRwBWT

Make a Temperature Indicator for Your Faucet With Thermochromatic Pigment

It can take a while for water running from the faucet to get hot. Yeah, you can wait around with your finger under the water, but it would be a lot easier if you could see when it’s finally hot. This clever DIY temperature indicator does just that.

This video from the Shake the Future YouTube channel shows you how to create a simple temperature indicator for your faucet that doesn’t require any special tools, batteries, or electronics. All you need is some clear nail polish and some thermochromatic pigment that loses its color when it gets heated up. Remove the nozzle from your faucet, paint it red, and let it dry. Then mix the thermochromatic pigment with the clear nail polish, paint it over the red, and let it dry. The nozzle should now look blue in its neutral state. When you attach it back on your faucet and try to run some hot water, the nozzle will turn red when it finally heats up. Now you can do other things in the kitchen while you wait and know exactly when it’s ready. If you don’t have a nozzle on your faucet, you can do the same process by making a dot somewhere on your faucet instead.

http://ift.tt/1PLMZF1...

Battery-less Temperature Indicator for the Faucet | YouTube


from Lifehacker http://ift.tt/1N0CbUN

Ummo for iPhone Analyzes Your Speech to Help Improve Your Public Speaking

iPhone: Public speaking is always a bit terrifying, but one of the best ways to get over that is to prepare as much as possible. Ummo is an app that helps you prepare by analyzing everything you say.

To start, just tap the mic in Ummo and then practice your presentation. Ummo then listens to you and will send a small audio alert when you use filler phrases like “uh, um, like, you know,” and others (you can turn off this alert if you find it annoying). When you’re done, Ummo dishes out a lot of different stats to help you analyze your speech, including your words per minute pace, the overall clarity, how many words you’re using, and where you’re pausing. You can create your own list of filler words too, which is helpful if you know that you have a particular phrase you use that’s not that common.

http://ift.tt/1RNxBIG...

This isn’t going to help much with the anxiety of public speaking when you’re in the moment in front of a ton of people, but it can help you improve you pacing and make you aware of what your filler words are. They’re working on a web demo if you’re interested in testing it out, otherwise the iPhone app comes in at just $1.99.

http://ift.tt/1St1D5m...

Ummo ($1.99) | iTunes App Store


from Lifehacker http://ift.tt/1rAeBEI

Kids as young as 11 are targets of revenge porn

Freedom of Information requests in the UK show that 30% of victims were under the age of 19 last year.
from Naked Security http://ift.tt/1SPZPFA

Dating site that once faked being hacked is breached for real this time

BeautifulPeople.com, which once said it was hit by a virus as a marketing stunt, has had a real data breach affecting 1.1 million users.
from Naked Security http://ift.tt/2436JN2

Facebook made to serve phishing forms to users

Netcraft researchers have recently spotted an extremely convincing Facebook phishing attack. The fraudsters made it look like the fake “Facebook Page Verification” form they’ve asked the victims to fill and submit is legitimate, as the page serving it is on a Facebook subdomain and uses HTTPS: The attack will work whether the user is already logged in or not, and all the links on the page work as they should. This is because, apart from … More
from Help Net Security http://ift.tt/21fd1nE

7 million users affected by Minecraft community Lifeboat data breach

Minecraft community fansite “Lifeboat” has admitted that it suffered a data breach in January, after security researcher Troy Hunt added some of the stolen data to his “Have I Been Pwned?” website. Lifeboat Network runs servers that players of the smartphone version of Minecraft can connect to in order to play in different game modes (CTF, survival games, etc.). In order to do that, they have to open an account. Hunt was given the data … More
from Help Net Security http://ift.tt/1SPcb0S

How one man became the perfect match for 30,000 women on OKCupid

Here's the story of how to turn online dating into a factory whose output consists of churning out soulmates by the tens of thousands.
from Naked Security http://ift.tt/1NzeKBT

Info of Qatar National Bank customers, Al Jazeera staff, others, leaked online

A ZIP file containing information supposedly stolen in a hack of the Qatar National Bank has been published on whistleblower site Cryptome on Tuesday. The contents of the Qatar data dump The data dump has over 1.4 GB and contains nine main folders named “Al Jazeera”, “Al-Qardawi”, “Al-Thani”, “Banks, corporations”, “Defence and etc”, “Gov”, “Mukhabarat”, “Police, Security” and “Spy, Intelligence”. It appears that the folders contain names, phone numbers, bank accounts and passwords, payment card … More
from Help Net Security http://ift.tt/1T42zco

Tuesday, April 26, 2016

DDoS aggression and the evolution of IoT risks

Few organizations globally are being spared DDoS attacks, according to a Neustar survey of over 1,000 IT professionals across six continents. With the bombardment fairly constant throughout 2015, it is no longer a matter of if or when attacks might happen, but how often and how long the attack will last. Faced with this ongoing onslaught, the report demonstrates that increasingly DDoS-defense savvy organizations are now arming themselves accordingly. The research results show that although … More
from Help Net Security http://ift.tt/1VBsrTJ

Cybercriminals increasingly exploiting human nature

Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data Breach Investigations Report. This year’s report points to repeating themes from prior-year findings and storylines that continue to play off of human frailty, including: 89 percent of all attacks involve financial or espionage motivations Most attacks exploit known vulnerabilities that have never been patched despite patches being available for … More
from Help Net Security http://ift.tt/1UgiI3M

How the biometrics market is entering the evolving IoT ecosystem

By 2021, the biometrics market will reach $30 billion and shift its revenue focus, moving away from the governmental sector to emphasize opportunities in the consumer and banking sectors, according to ABI Research. Consumer and banking will see 19% and 12% growth rates, respectively. The need for increased security Digital services are quickly becoming the norm for the everyday user. As more of us leverage online financial services, from purchasing insurance to managing our bank … More
from Help Net Security http://ift.tt/1pE0mNl

Make Sturdier Wood Joints by Using Hot Glue as a Clamp for Wood Glue

Wood glue is designed to hold strong and create long-lasting wood joints, but it takes awhile to dry. Hot glue, on the other hand, hardens almost instantly. The combination of the two makes for a perfect method of building sturdy wood joints.

In this video from the Woodomain YouTube channel, Jeremy Broun reveals some clever ways to use a hot glue gun in your workshop. In fact, you can use hot glue as decent method for clamping two wood joints together while wood glue dries. Add wood glue along the edge of the surface you want to join and leave a dry spot in the center. Dab some hot glue in the dry center, then attach the the two pieces of wood together. The hot glue in the middle will keep the wood clamped together while the wood glue dries to create a nice, sturdy joint.

http://ift.tt/1EZjkoO...

What You Can Do With a Gluegun | YouTube via Make


from Lifehacker http://ift.tt/1WoCjip

This Video Series Explains How to Use Drafts for Text Automation on iOS

We have long been fans of Drafts on iOS. It makes it possible to link together all kinds of text with different programs. Drafts is such a powerful program that it’s a little difficult to wrap your head around what you’d use it for. Thankfully, the developer’s teamed up with MacSparky’s David Sparks for a series of how-to videos.

Put simply, Drafts is a kind of launcher for text. You type whatever you want in Drafts, then you can instantly send it to other programs without launching them. This makes it easy to compose emails, send out tweets, or adds notes to a variety of apps without juggling between them. The first video in this series walks you through the basics of how you can use Drafts. The second video digs into adding text to Dropbox files. More videos will arrive on a weekly basis. If you’ve been intimidated by Drafts, this should make it a lot easier to wrap your mind around how to use it.

Getting to Know Drafts with David Sparks | YouTube


from Lifehacker http://ift.tt/1NQ92pT

Control a Kodi Media Center From an Amazon Echo

Kodi is a fantastic little media center. The Amazon Echo is a surprisingly excellent voice control device. Jam those two things together and you have a pretty great way to control your movies. How-To Geek shows you how to set it up.

The set up process here is pretty complex, requiring you to turn Kodi into a web server, create your own app with Heroku, then dig into Amazon’s Alexa voice server menus. The end result of your hard work is a means to control your Kodi media center with your voice from your Amazon Echo, which is a pretty worthwhile little addition. Head over to How-To Geek for the full guide.

How to Control Your Kodi Media Center with an Amazon Echo | How-To Geek


from Lifehacker http://ift.tt/1T2FOpp

Alarm Systems Design

With more alarm companies offering Do-It-Yourself (DIY) alarm system options, a topic in need of attention is designing the level of protection that is right for your home. The best DIY alarm companies work closely with you, and make recommendations based on the layout of your home and the way you will be using your...

continue reading

The post Alarm Systems Design appeared first on Home Security Blog.


from Home Security Blog http://ift.tt/1SME21E

Spotify denies hack; users subjected to weird music beg to differ

Hundreds of accounts' details popped up on Pastebin, with some users locked out and some seeing unheard songs on recently played lists.
from Naked Security http://ift.tt/26rLOSE

Why cybercriminals attack healthcare more than any other industry

Cybercriminals attacked the healthcare industry more than any other any other sector in 2015, according to a new report published by IBM. Here's why...
from Naked Security http://ift.tt/24hTsNe

Review: The Car Hacker’s Handbook

About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the Hive13 hackerspace and OpenGarages. He has worked for several auto manufacturers, where he provided public research on vehicle security and tools. Inside The Car Hacker’s Handbook Car hacking and the insecurity of modern, computerized, connected cars has been a topic of much interest in the last … More
from Help Net Security http://ift.tt/1pBmyI2

Facebook vulnerability allowed access to personal and payment information

Bitdefender has discovered a significant vulnerability within Facebook which allowed access to any user account through simple social login manipulation. The attacker was able to gain access to personal user information, a contacts list for potential malware distribution and payment information – allowing purchases to be made in the user’s name. Attack vector The attack vector in this case – social logins – are an alternative to traditional authentication. This form of access offers users … More
from Help Net Security http://ift.tt/23YrlpP

Presidential primary election apps may expose sensitive data

Did you know that there are over 1,200 Android apps, both official and unofficial, that help voters keep track of the happenings in the US presidential primary? Better yet, did you know that over 50 percent of them can expose sensitive user data? We’re talking about account details, location, list of installed apps, device info, unique IMSI number, settings, your phone number – collected by the apps and sent to remote servers, often over unsecured … More
from Help Net Security http://ift.tt/1reGv8J

Police seize network behind encrypted BlackBerry PGP devices

Dutch and Canadian police said they have BlackBerrty encryption keys. Now they've got servers with communications of 19,000 users.
from Naked Security http://ift.tt/1XUaD3I

Shopware update fixes RCE bug that affects both shop and target system

Shopware, an open-source e-commerce software chosen by a number of big European companies to power their online shops, has recently pushed out a critical security update. The update fixes a remote code execution bug that could allow attackers to read files on the target system, create new ones with malicious content, and run arbitrary code on the target system. “This is a critical security vulnerability that not only affect the functions of the shop, but … More
from Help Net Security http://ift.tt/232P0zA

The economics of hacking: Change your thinking

If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is increasingly making its way into the philosophy and mindset of the modern cyber-security attacker (or “hacker,” if you prefer). There are numerous recent examples, perhaps none more attention-grabbing that the trend toward ransomware attacks against healthcare providers, including hospitals. A variety of conditions are coming together to … More
from Help Net Security http://ift.tt/1VPtq2S

Monday, April 25, 2016

Who’s next? Shift focus and detect network attackers

Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some significant steps and be able to proclaim: “We won’t get breached again.” Preventative security cannot prevent a network intruder from penetrating a network 100% of the time. The best pen testers even guarantee that they can get into a network within two days. Prevention is still … More
from Help Net Security http://ift.tt/24gVD3K

Worldwide IoT security spending on the rise

Worldwide spending on Internet of Things security will reach $348 million in 2016, a 23.7 percent increase from 2015 spending of $281.5 million, according to Gartner. Furthermore, spending on IoT security is expected to reach $547 million in 2018. “It’s encouraging to see the investment in security spend for IoT increase, it will however not be enough based upon Gartner forecasts. Our reliance on such devices will extend to well beyond consumer IoT, and such … More
from Help Net Security http://ift.tt/1SL43P1

Ransomware in your inbox: the rise of malicious JavaScript attachments

As well as avoiding booby-trapped Word attachments, you need to keep your eye out for suspicious JavaScript in emails, too.
from Naked Security http://ift.tt/2323aAY

Microsoft's Word Flow Keyboard Brings Easier One-Handed Texting to iOS

Microsoft released its popular Windows Phone keyboard, Word Flow, for the iPhone today, which lets you easily type texts with one hand and swipe to spell out words.

Word Flow’s “Arc mode” moves the keyboard to the corner of the screen so you can easily reach all of the keyboards buttons with just your thumb (you can see it in action in the video above). You can tap or swipe to spell things out, and Word Flow will predict what you’re trying to type and auto-correct mistakes. The more you use the keyboard, the more it learns and gets better at predicting text over time. It also looks at your phone contacts so it can try to predict names even faster. You can also customize the keyboard background with an image of your choice or one of the images that comes with the keyboard. You can download the keyboard for free at the link below.

http://ift.tt/1SofKsI...

Word Flow Keyboard | iOS App Store via The Verge


from Lifehacker http://ift.tt/24gdN5O

Clean and Extend the Life of Sandpaper With an Old Tennis Shoe

The sandpaper on belt sanders, orbital sanders, and other powered sanders can get gunked up with sawdust and become less effective unless you clean it. If you have an old tennis shoe around, you can refresh your sandpaper in a jiff.

In this video, from YouTuber izzy swan, you’ll learn a simple trick for cleaning sandpaper of all types. Normally, to clean sandpaper you would use a sanding belt cleaner or “sandpaper saver.” Cleaning the sandpaper on your sanders increases its abrasive life, improves its finish quality, and reduces the likelihood of your sandpaper causing any burns or markings on the things you sand. If you don’t have a sandpaper saver, however, or don’t feel like paying for one, you can just use the bottom of an old tennis shoe. Apply the shoe’s rubber sole to the sandpaper while the sand is running and it will clean out all the gunk to make it almost brand new again.

http://ift.tt/1YQGeU9...

How to clean sandpaper using an old shoe! | YouTube


from Lifehacker http://ift.tt/1So9l0x

Graffiti by Drone


from Schneier on Security http://ift.tt/1SFmFNa

Man arrested after tweeting bomb threat to Donald Trump

The "professional dumbass" allegedly tweeted "Is someone going to bomb the Trump rally or am I going to have to?"
from Naked Security http://ift.tt/1SIMPSa

Exploit kit targets Android devices, delivers ransomware

Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less unusual: mobile ransomware delivered via exploit kit. The ransomware in question calls itself Cyber.Police (the researchers have dubbed it Dogspectus), and does not encrypt users’ files, just blocks the infected Android device. It purports to be part of an action by the (nonexistent) “American national security agency” against unspecified illegal actions ostensibly … More
from Help Net Security http://ift.tt/26oraTx

Bangladesh Bank hackers compromised SWIFT software with bespoke malware

Bit by bit, indications about how the attackers who targeted Bangladesh’s central bank managed to take off with some $80 milllion (of the nearly $1 billion they aimed for) via fraudulent transfers are coming to light. First it was established that second-hand, cheap networking equipment that collects next to no network data, and the lack of a firewall between the bank’s SWIFT facility and the rest of the network, helped the attackers pull off the … More
from Help Net Security http://ift.tt/1MSLJRw

Open365 Is An Open Source Alternative to Microsoft Office 365

Windows/Mac/Linux/Android: One of Microsoft’s Office 365 program chief advantages over open source alternatives is the ability to sync documents via the cloud so you can edit them everywhere. Open365 has stepped up to finally match this feature set.

Open365 works a lot like Office 365 does. The suite builds on LibreOffice Online to let you open your documents in the browser, or use any of the client apps for Windows, Mac, Linux, and Android to open them. Open365 also gives you 20GB of cloud-based storage to store your files on that will be synced across your devices.

Currently, the service is in beta, however the developers also plan to release tools to allow you to host your own servers. This helps it stand out from services like Office 365 and Google Docs by giving you a comparable feature set without sacrificing control of your data.

Open365 via Ghacks


from Lifehacker http://ift.tt/1rucpi8

Make Three Full Meals from One Roast Chicken

We’re no strangers to cooking one chicken and eating it over multiple meals, but this video from our friends at Epicurious takes things up a notch. You’ll see how to make three meals: a chicken salad sandwich, a roast chicken dinner, and a seriously upgraded chicken soup.

The first is the first in Epicurious’ Mega Bites series, which is—if you can’t tell—video game themed. Whether you love that or hate it (and we love it) the recipes and instructions are still good, and you can do everything here without using a real recipe. Eyeballing is enough, as long as you taste as you go. The chicken salad sandwich is easy enough, and uses some of the chicken breast from your roast chicken (or rotisserie chicken, if you want to grab one from the grocery store—that’ll make all three meals even cheaper, frankly), and the roast chicken dinner uses the legs as the primary protein on the plate.

The chicken soup is amazing though, and definitely not something you’ll probably just be able to whip together unless you have stock, jalapenos, squash, cabbage, bok choy, and lime lying around your kitchen. You can sub in for some other crunchy greens you might actually have though, and the best part of the recipe is that it actually uses that chicken carcass to extract as much flavor into your stock (and soon to be chicken soup base) as possible, a sentiment I can completely get behind.

How to Turn 1 Rotisserie Chicken into 3 Dinners | Epicurious (YouTube)


from Lifehacker http://ift.tt/1Uc1CE4

Info on 93 million Mexican voters found on an Amazon cloud server

Sensitive personal information of over 93 million Mexican voters has been found, unprotected and accessible to anyone who knew where to look. Last Friday, researcher Chris Vickery shared details of of this discovery to the wider public, and the facts are as follows: The data was stored in a publicly accessible MongoDB database, that required no password or authentication to be accessed The database was hosted on an Amazon cloud server, outside of Mexico (in … More
from Help Net Security http://ift.tt/1QwIF8p

BlackBerry's Global Encryption Key


from Schneier on Security http://ift.tt/1StSaHv

Opera adds a (sort of) VPN to its browser

In an effort to improve security, Opera has baked a free VPN (Virtual Private Network) into the latest version of its browser.
from Naked Security http://ift.tt/1rc4O7e

Skull echoes can be a password to protect facehugger computers

Whatever's echoing around in there is all uniquely you and could be used to authenticate users of eyewear computers.
from Naked Security http://ift.tt/1SZh9Sl

Monday review – the hot 20 stories of the week

How Hacking Team got hacked, another dark web marketplace vanishes, and 29% of Androids can't be patched. Get all this and everything else we wrote about in the last seven days in our Monday review!
from Naked Security http://ift.tt/1SmBS6S

Critical flaws in HP Data Protector open servers to remote attacks

Hewlett Packard has released critical security updates for its HP Data Protector software, which fix vulnerabilities that could allow remote code execution or unauthorized disclosure of information. HP Data Protector software is automated backup and recovery software for single-server to enterprise environments, and can be set up on Windows, Unix, and Linux operating systems. There are six vulnerabilities in all, with CVE-2016-2004 through CVE-2016-2007 all being considered critical. No more details about them have been … More
from Help Net Security http://ift.tt/1WlgLTO

Top 10 web hacking techniques of 2015

Now in its tenth year, the Top 10 List of Web Hacking Techniques takes a step back from the implications of an attack to understand how they happen. The list is chosen by the security research community, coordinated by WhiteHat Security. After receiving 39 submissions detailing hacking techniques discovered in 2015, the following hacks were voted into the top 10 spaces: FREAK (Factoring Attack on RSA-Export Keys) LogJam Web Timing Attacks Made Practical Evading All* … More
from Help Net Security http://ift.tt/1XRacY5

Attackers opt for discreet methods to spy inside the network

For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs of targeted attacks including internal reconnaissance, lateral movement or data exfiltration. Of the 120 participating organizations, 117 detected at least one of these behaviors during each month of the study. Despite that nearly 98 percent of organizations detected at least one behavior per month during the three-month … More
from Help Net Security http://ift.tt/1Stp0bD

Sunday, April 24, 2016

Most organizations still lack visibility into database assets

Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman Research and DB Networks. This level of visibility is necessary to rapidly identify a data breach. Furthermore, 47 percent of those surveyed do not have an assigned team or even an individual to oversee the security of their databases. “This study reveals there’s a clear shift beginning to occur in information security … More
from Help Net Security http://ift.tt/1NKkB1Q

Compromised credentials still to blame for many data breaches

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and malicious insiders all rated as top threats. These attacks often occur because of a lack of scalable identity access management systems, failure to use multifactor authentication, insufficient password use and a lack of ongoing automated rotation of cryptographic keys, passwords and certificates. It’s not surprising that insufficient identity, credential … More
from Help Net Security http://ift.tt/1VwPTRW

Week in review: Opera’s VPN is just a proxy, GDPR compliance, hacking traffic sensors

Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he exploited a zero-day vulnerability in a embedded device deployed inside the company’s network in order to gain a foothold in the network. (He declined to give more details about the vulnerabilities, as they are still not patched.) Over 3 million servers running outdated JBoss software open … More
from Help Net Security http://ift.tt/1XR2JYM

Build a Twitter-Based Home Automation System with a Raspberry Pi

There are all sorts of variations on Raspberry Pi-powered home automation systems, but ARM Tutorials shows off a pretty simple project that uses Twitter as the backbone.

http://ift.tt/218DCTm...

The Pi is hard wired into a home automation board that controls a fan, light, AC, and the temperature. It’s then controlled over Twitter direct messages so it’s super easy to check the status or flip the toggle on any of the connected devices. The Twitter link is a pretty handy way to get around some of the programming requirements that would otherwise be required here, so it’s worth taking a look at how it’s done here if you’re making your own home automation controller. Head over to ARM Tutorials for the guide.

Pi Buddy - Twitter based automation | ARM Tutorials


from Lifehacker http://ift.tt/1NHX0z4

The Benefits of Scaring Yourself for Fun

Whether it’s a roller coaster, haunted house, or horror movie, people love to scare themselves for entertainment. It might seem odd, but it turns out making yourself feel fear actually comes with some decent perks.

In this video from the TED-Ed YouTube channel, Margee Kerr, a sociologist who studies fear, explains what happens to your brain when you scare yourself for fun. Fear, as it turns out, is actually pretty good for you when you can control the dose. Here’s a few reasons why:

  • Fear feels pretty good: Your brain’s fight or flight response system puts you in an energized, pain-free state of total mental presence. Because you know you’re not in danger, you can enjoy the “high” of being scared. It’s similar to being really happy, excited, or even sexually aroused.
  • Fear can boost your self-esteem: Getting through something you think is scary does the same thing to your brain as when you finish any other type of challenge, like running a race or finishing a long book. You did it, you survived, and you feel accomplished.
  • Fear brings people together: We make sense of what other people are experiencing in high emotional states by recreating the experience ourselves. If you’re friend is scared and screaming, you’ll want to match their mental state and scream too, and that can create bonding experiences.

So there you have it. Not only is being scared in a controlled environment a lot of fun, it’s actually good for you and your relationships.

Why is being scared so fun? | YouTube


from Lifehacker http://ift.tt/1SzP6Mt

Friday Squid Blogging: My Little Cephalopod


from Schneier on Security http://ift.tt/215wYx7

The Best Way To Quickly Cover a Shop Table

Depending on the type of project you’re working on, the easiest way to prepare for a quick cleanup in a workshop is by covering your work table with a giant sheet of paper. Over on Tested they walk you through a variety of tips for doing so.

First up, don’t overcomplicate this. Find a thick roll of paper as wide as your table, grab some masking tape, then tape the corners down. Once the corners are down, tape the rest in a straight line. If you’re working with anything that might soak through the paper, place a garbage bag over the table first, then cover it with paper. It’s one of those stupid simple solutions that’s easy to forget about if you’re not in the shop too often.

Shop Tips: Covering Your Work Tables | YouTube


from Lifehacker http://ift.tt/1NG1FkS

Encryption Backdoor Cartoons


from Schneier on Security http://ift.tt/1SoXegp

Curt Schilling fired by ESPN over offensive Facebook post

Curt Schilling was fired by ESPN on Wednesday over a Facebook post mocking transgender people and the controversy over gender identity and public restrooms.
from Naked Security http://ift.tt/1No2unA

More than 1 million Facebook users use it in secret

Over a million people accessed Facebook through the Tor network this month, the company says.
from Naked Security http://ift.tt/2483noA

The Facebook hacker who caught a Facebook hacker

Facebook was the victim of both hacks, but is surprisingly relaxed about it.
from Naked Security http://ift.tt/26jDkg8

PGP-encrypted comms network allegedly used by criminals shuts down

The Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they have arrested a 36-year-old man from Nijmegen on suspicion of money laundering. After much speculation, the name of the company that created the system and offered it as a service has been confirmed as Ennetcom. If you visit the company’s website, the following announcement is shown: … More
from Help Net Security http://ift.tt/26jhJVd

A password for your eyewear computer: The sound of your skull

Could the unique frequency response your skull makes when hit with an ultrasonic signal be a good way for authenticating yourself to an eyewear computer (e.g. Google Glass, or a VR headset)? A group of researchers from the University of Stuttgart, the University of Saarland and the Max Planck Institute for Informatics in Germany thinks so. Granted, their testing has been done only on 10 participants, but the method identified users with 97% accuracy and … More
from Help Net Security http://ift.tt/1MMxYnq

Anonymous launches OnionIRC a school for hacktivists on the dark web

Members of the hacker collective Anonymous have just launched a hidden service on the dark web for sharing technical skills in hacking and the use of anonymity software.
from Naked Security http://ift.tt/1r3LUPV

Are you happy? Sad? Angry? Terrified? Microsoft knows

Our cloud-based face detection service flagged your mood. We don't quite know what it is, but something's bothering you.
from Naked Security http://ift.tt/1WgS9eJ

Identity protection: The critical intersection of biometrics and commerce

In light of some high-profile data breaches in recent years, businesses are constantly seeking possible forms of authentication to replace passwords. While such breaches might suggest passwords aren’t as efficient as they used to be, they can also be inconvenient for consumers, who need to remember their passwords across a variety of online accounts — including email, e-commerce, online banking, social media, and more. One of the latest forms of identity protection that might take … More
from Help Net Security http://ift.tt/1r3plLr

Opera browsers VPN is just a proxy heres how it works

Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great doesn’t it? Michal Špaček, a web developer and security engineer based in Prague, researched the way Opera’s VPN works and discovered there’s more marketing than security behind Opera’s claims. “What Opera offers is not a VPN as such. It’s just a proxy for the browser. You still need a full VPN if … More
from Help Net Security http://ift.tt/1SfEtiN

Thursday, April 21, 2016

TeslaCrypt: New versions and delivery methods no decryption tool

TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 and 4.1 but, unfortunately, there is currently no way to decrypt the encrypted files except by paying the ransom and receiving the key. One of the latest changes to the malware is that it no longer uses an extension for encrypted files, making it more difficult for victims … More
from Help Net Security http://ift.tt/1qFWjRp

The future of ICS security depends on OT-centric security solutions

New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that demand will focus on network level security in the short term but eventually shift to place the significance on embedded security and lifecycle management. “Digital information, by its nature, can be backed up and restored, relocated and copied. Most IT security methodologies and technologies rely on this aspect of virtual assets. Operational technology … More
from Help Net Security http://ift.tt/1VKAXiJ

Increase in credit card leaks with high profile apps and sites

A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. Wandera has discovered a 17% increase (Q1 2016 vs Q4 2015) in apps and mobile websites leaking credit card data since announcing the discovery of the CardCrypt security flaw in December 2015. CardCrypt affected 16 global companies’ mobile websites and apps who were shown to be … More
from Help Net Security http://ift.tt/1WJnffE

IT channel security practices will balance products processes and skills

A comprehensive security offering is quickly moving from simple product installation to an ongoing process. IT channel companies that highlight processes and education along with the products they stock will be well positioned to seize new opportunities in the increasingly complex world of enterprise security, according to CompTIA. “Cybersecurity has been a concern and a priority for businesses for some time, but new technology models and a greater reliance on technology are driving changes on … More
from Help Net Security http://ift.tt/1Nnp7IT

Anomali lands $30 million in series C funding

Anomali, the provider of ThreatStream threat intelligence and Anomali Enterprise platforms, has raised $30 million in series C funding. The round, led by Institutional Venture Partners, includes significant investments from General Catalyst Partners, GV, and Paladin Capital Group. The round raises Anomali’s total funding to more than $56 million since launching in 2013. The company rebranded itself in February 2016, changing its name from ThreatStream to Anomali and adding new products to support the rapidly … More
from Help Net Security http://ift.tt/1VFJbcx

The Perks of Lifting With Free Weights Instead of Machines

You walk into the gym for a weight lifting session and you’re immediately given a choice: do you grab the free weights or hop on one of the machines? Here’s an explanation for when you should use both.

This video from the PictureFit YouTube channel explains the major differences between pumping up with free weights and machines. Most of the time, free weights (barbells, dumbbells, kettlebells, etc.) are going to be your best option for a few reasons:

  • The instability of free weights helps build stabilizing muscles. This improves your balance, athleticism, and coordination. Machines remove the instability from the equation.
  • Free weights let you move the bars in a natural bar path, or in a way that comes natural to you. This lets your lifting replicate real-life movements. Machines can restrict this type of motion.
  • You can do just about any type of lift with free weights. Not so with machines designed to do a few particular lifts.

Still, there are plenty of scenarios where lifting machines are a much better option:

  • The stability of lifting machines makes them a great option for those going through rehab after an injury.
  • Lifting machines have a much lower learning curve, making them perfect for lifting beginners and the elderly.
  • You can isolate specific muscle groups a lot easier with a machine.

Overall, free weights are better for building general strength and working the muscles you use naturally. If you can manage it, learn how to properly lift with free weights. That said, lifting machines aren’t useless. If you’re working your way up to free weights, or need the extra stability, machines are the better choice.

http://ift.tt/1NntCAT...

Free Weights vs. Machines | YouTube


from Lifehacker http://ift.tt/1TlN8zh

Teamviewer for Android Adds Wake-on-LAN SD Card Support and More

Teamviewer’s Android Remote Contol app now lets you wake up a sleeping computer, an important feature for connecting to a remote PC.

The computer will need to support and have Wake-on-LAN enabled, of course, but otherwise, this is a welcome feature to the remote control app. Other updates include remote control in full screen (no navigation bar in the view), SD cards support, speedier mouse navigation, and connections not requiring a password. Update the app or download it from the Play store to start waking computers from afar with your phone or tablet.

TeamView for Remote Control | Google Play


from Lifehacker http://ift.tt/1TlsmQa

Judge tosses evidence obtained by FBI malware planted on dark website

Although civil libertarians have praised the judge's ruling, it doesn't inhibit the FBI's authority to plant malware on a defendant's computer.
from Naked Security http://ift.tt/1qFc7E8

Opera Introduces a Free VPN Built Right Into Its Web Browser

Windows/Mac/Linux: Opera users just got a free, unlimited VPN you can use to encrypt your data or get around location-based restrictions on content. It’s currently in the dev version of Opera, but turning it on is as easy as flipping a switch.

http://ift.tt/1Ui0RL6...

The latest versions of Opera are built on Chromium, so you can expect a similar browsing experience, but today’s big change is the introduction of that free VPN service. Once you’ve updated, all you need to do to enable it is toggle it in the toolbar. Once enabled, you can set your location to exit servers in the United States, Germany, or Canada, and use it as much as you like. More specifically, from Opera’s blog:

To activate it, Mac users just need to click the Opera menu, select “Preferences” and toggle the feature VPN on, while Windows and Linux users need to go to the “Privacy and Security” section in “Settings” and enable VPN there. A button will appear in the browser address field, from which the user can see and change location (more locations will appear later), check whether their IP is exposed and review statistics for their data used.

Once enabled, all of your browsing data (and without getting into the distinction between a true VPN and a proxy—or the web browser tools call themselveds VPNs) is encrypted and sent through Opera’s VPN concentrators. This gives you most of the benefits of a good VPN.

http://ift.tt/1QJ3C5o...

Of course, Opera’s VPN dservice only encrypts and protects traffic inside the browser. That means you don’t get encrypted data in all of your apps, across your entire system. You also don’t get the sheer number of exit servers and protocols that most other VPN providers offer you (Opera currently offers three, and hopefully there’ll be more soon.) Similarly, we also don’t know Opera’s stance on data privacy and logging, which are important to be transparant about if you want to be a trustworthy VPN provider.

http://ift.tt/1KwQPiL...

Opera’s new VPN is great for people who want to make sure their data is private on coffee shop, hotel, airport, or library Wi-Fi, who just don’t like the idea of sidejacking attacks stealing their credentials, or who want to stream a movie, YouTube video, or audio track that’s not available in their country. It’s more of a replacement for browser-based tools than a fully featured, system-wide VPN, and certainly no match for some of the best full-service VPNs you can choose from. Even so, it’s a step in the right direction, and we can’t argue with free and unlimited use.

If you’d like to give it a try, you’ll need the dev version of Opera to do so, which you can grab here. If you’d like to read more about it (and Opera’s recently introduced ad-blocker), hit the link below.

Free VPN Integrated in Opera for Better Online Privacy | Opera Blog via The Verge


from Lifehacker http://ift.tt/22QtJcd

Sony PSN to get two-factor authentication RSN.

Sony PSN gets 2FA RSN but not exactly PDQ...
from Naked Security http://ift.tt/210LC8Q

Shop at Thrift Stores Near Design Schools for Barely-Used Unique Finds

Thrift stores are great, but if you want to find unique items, shop at stores that are near design, fashion, and art schools. The students there are likely to sell or donate their hardly-used wares at those stores closest to class.

http://ift.tt/1Q2alXr...

If you live in a major city, there are probably a good number of design or art schools nearby. Search online using terms like “design school”, “fashion institute”, and “art academy” to find specific schools and then look for stores in the same area.

Of course, people tend to sell clothes after the season is over, so you may not find spring clothing in the spring, or winter clothing when it’s getting cold, but you will still have better selection at good prices for next year when the weather changes.

Thrifting Tips for Accessories with Kaileemckenzie | Refinery20 (YouTube)


from Lifehacker http://ift.tt/1SxQQZK