Monday, November 30, 2020

Why microlearning is the key to cybersecurity education

Cyber attacks are on the rise during this year of uncertainty and chaos. Increased working from home, online shopping, and use of social platforms to stay connected and sane during this year have provided criminals with many attack avenues to exploit.

microlearning cybersecurity

To mitigate the threat to their networks, systems and assets, many organizations perform some type of annual cybersecurity awareness education, as well as phishing simulations. Unfortunately, attackers are quick to adapt to changes while employees’ behavior changes slowly. Without a dramatic shift in how we educate employees about cybersecurity, all industries are going to see a rise in breaches and costs.

Changing the way people learn about cybersecurity

The average employee still doesn’t think about cybersecurity on a regular basis, because they haven’t been taught to “trust but verify,” but to “trust and be efficient.” But times are changing, and employees must be reminded on a daily basis and be aware that they (and the organization) are constantly under attack.

In the 1950s, there was a real push to increase industrial workplace safety. Worker safety and the number of days on a job site without an incident were made top of mind for all employees. How did they manage to force this shift? Through consistent messaging, with diverse ways of communicating, and by using daily reminders to ingrain the idea of security within the organization and change how it functioned.

Hermann Ebbinghaus, a German psychologist whose pioneering research on memory led to the discovery of forgetting and learning curves, explained that without regular reminders that keep learning in mind, we just forget even what’s important. One of the main goals of training must be to increase retention and overcome people’s natural tendency to forget information they don’t see as critical.

Paul Frankland, a neuroscientist and a senior fellow in CIFAR‘s Child & Brain Development program, and Blake Richards, a neurobiologist and an associate fellow in CIFAR’s Learning in Machines & Brains program, proposed that the real goal of memory is to optimize decision-making. “It’s important that the brain forgets irrelevant details and instead focuses on the stuff that’s going to help make decisions in the real world,” they said.

Right now, cybersecurity education is lost and forgotten in most employees’ brains. It has not become important enough to help them make better decisions in real-world situations.

A different kind of training is needed to become truly “cyber secure” – a training that keeps the idea of cybersecurity top of mind and part of the critical information retained in the brain.

Microlearning and gamification

Most organizations are used to relatively “static” training. For example: fire safety is fairly simple – everyone knows where the closest exit is and how to escape the building. Worker safety training is also very stagnant: wear a yellow safety vest and a hard hat, make sure to have steel toed shoes on a job site, etc.

The core messages for most trainings don’t evolve and change. That’s not the case with cybersecurity education and training: attacks are ever-changing, they differ based on the targeted demographic, current affairs, and the environment we are living in.

Cybersecurity education must be closely tied to the value and mission of an organization. It must also be adaptable and evolve with the changing times. Microlearning and gamification are new ways to help encourage and promote consistent cybersecurity learning. This is especially important because of the changing demographics: there are currently more millennials in the workforce than baby boomers, but the training methods have not altered dramatically in the last 30 years. Today’s employee is younger, more tech-savvy and socially connected. Modern training needs to acknowledge and utilize that.

Microlearning is the concept of learning or reviewing small chunks of information more frequently and repeating information in different formats. These variations, repetitions, and continued reminders help the user grasp and retain ideas for the long-term, instead of just memorizing them for a test and then forgetting them.

According to Eddinghaus, four weeks after a one-time training only 20 percent of the information originally learned is retained by the learner. Microlearning can change those numbers and increase retention to 80 or 90 percent.

Gamification amplifies specific game-playing elements within the training to include competition, points accumulation, leaderboards, badges, and battles. Gamification blends with microlearning by turning bite-sized chunks of learning into neurochemical triggers, releasing dopamine, endorphins, oxytocin, and serotonin. These chemicals help reduce stress and anxiety (sometimes associated with learning new material), increase „feel good sensations“ and feelings of connection.

Gamification increases the motivation to learn as well as knowledge recall by stimulating an area of the brain called the hippocampus. From a business perspective, 83% of employees who “receive gamified training feel motivated, while 61% of those who “receive non-gamified training feel bored and unproductive.”

Other reports indicate that companies who use gamification in their training have 60% higher engagement and find it enhances motivation by 50%. Combining microlearning with gamification helps create better training outcomes with more engaged, involved employees who remember and use the skills learned within the training.

Conclusion

The bad guys don’t stop learning and trying new things, meaning the good guys must, too.

Cybersecurity is increasingly central to the existence of an organization, but it’s fairly new, rapidly evolving, and often a source of fear and uncertainty in people. No one wants to admit their ignorance and yet, even cyber experts have a hard time keeping up with the constant changes in the industry. A highly supported microlearning program can help keep employees current and empower them with key decision-making knowledge.


from Help Net Security https://ift.tt/39yeHFU

Foiling RaaS attacks via active threat hunting

In this Help Net Security podcast, Jon DiMaggio, Chief Security Strategist at Analyst1, talks about the characteristic of attacks launched by Ransomware-as-a-Service (RaaS) gangs and how organizations can prevent them from succeeding.

RaaS attacks

To make things interesting, Jon’s nine-year-old son is hosting the interview. Below is a transcript for your convenience.

Damien: Hi, I’m Damien DiMaggio, and today I am interviewing Jon DiMaggio, Chief Security Strategist at Analyst1.

Jon: Hi Damien. Thanks for talking with me today.

Today we are talking to Jon about Ransomware-as-a-Service and some of the bad guys behind it. Jon, can you tell us what Ransomware-as-a-Service is?

Jon: Sure, Damien, that’s a great question. So, one of the biggest issues organizations have today is ransomware attacks. Traditionally enterprise ransomware attackers will find a way to initially breach an environment. They’ll “live” in that environment anywhere from days to weeks. We’ve seen as short as three days and as long as two weeks, where the attacker will spend time in the environment using legitimate tools that are already present (“living off the land”), using dual use tools and enumerating and gaining privileges during that time.

Then they use those privileges to turn off and disable security services. This allows the adversary to stage the environment so that when they do execute the ransom payload, it’ll have the most success in encrypting and removing access to customer data. Ransomware-as-a-Service takes this one step further.

Basically, what they do is they sell access to their attacks. So they advertise on dark net forums and marketplaces. And what they do is, you can buy into the service and you can take part in the profit sharing when you help to expose a victim’s environment and they actually pay money.

So, the biggest differentiator here is you have a higher volume of attacks, you have more people involved, you have greater volumes of attacks and shorter timeframes, therefore you bring in a greater amount of profit and by sharing this profit, it’s very appealing and lucrative to cyber criminals.

Interesting. How do these groups differ from traditional ransomware bad guys?

Jon: Well, you know, it’s in the tactics that they use, Damien. One of the tactics that really stands out, and they’re not the only attackers to do it, but they are one of the first to do it, is actually making a copy and stealing the victim’s data prior to the ransomware payload execution.

The benefit that the attacker gets from this is they can now leverage this for additional income. What they do is they threaten the victim to post sensitive information or customer data publicly. And this is just another element of a way to further extort the victim and to increase the amount of money that they can ask for. And now you have these victims that have to worry about not only having all their data taken from them, but actual public exposure.

It’s becoming a really big problem, but those sorts of tactics – as well as using social media to taunt the victim and hosting their own infrastructure to store and post data – all of those things are elements that prior to seeing it used with Ransomware-as-a Service, were not widely seen in traditional enterprise ransomware attacks.

What do they do with the data once they have it?

Jon: The first thing that they do is they go through, and they find some element of it that’s sensitive. Now that could be sensitive email communications, or it could be some sort of secret “sauce” to something that the victim organization provides or does, or it could be sensitive customer information that you wouldn’t want exposed. And they’ll take a small piece of that to dangle in front of the victim to let them know that they’re serious, and they will post it publicly.

They’ll use Twitter to “socialize” the fact that they have this data, they’ll post to text hosting sites, such as Pastebin, or they’ll take screenshots of emails or documents and post to image hosting sites like 4Chan. It’s almost like a propaganda-driven campaign where they’ll really try to put out the message and spread the word that they have access to this organization’s critical information and customer data in order to entice the victim to pay. They want to make sure customers know, they specifically will reach out to customers of some of these organizations in order to increase the pressure and have the victim pay.

So, everything’s about gaining as much money and profit with Ransomware-as-a-Service groups, and they’ve just found different ways to implement and exploit victims outside and beyond traditional ransomware encryption techniques.

Should the victims pay the ransom? And if they do, does the bad guy hold up their end of the deal?

Jon: That’s a good question also. It’s really difficult… You can’t judge a victim by whether or not they pay or not. We always tell people you shouldn’t pay a ransom. If no one paid ransom, you wouldn’t keep having attackers continue these types of attacks. It takes them time, days to weeks, as I mentioned, that they have to spend doing this work in order to get a payout. So if they spent all that time and no one paid for these guys to make additional money, so…

You can’t trust that paying them is going to keep you protected. Organizations are in a bad spot when this happens, and they’ll have to make those decisions on whether it’s worth paying. But traditionally, it’s always best to not get compromised in the first place, which obviously doesn’t help an organization once that’s already happened. But just understand, just because you pay the ransom doesn’t mean that you’re going to get your data back or that it’s not going to be posted publicly later on down the road.

What can companies do to protect themselves from these types of attacks?

Jon: The best time to stop the attack is before the ransomware payload is executed. So, during that time period, those days to weeks where the adversary is staging the environment, that provides an opportunity to detect them. So, when the adversary is using legitimate administrative tools in order to further gain a foothold, that’s the time for defenders to identify it.

So, looking at administrative tool use, looking at who’s using it, looking at the times that they’re using it, looking at what they’re doing with it, all of those are things where there’s an opportunity to prevent that from happening. And we have seen defenders that actually do this well, and they do identify that there is an attack taking place, and they have successfully stopped these ransomware attackers.

But it’s all about the mindset of having very active threat hunting take place, and just not relying on tools and applications to flash red and tell you that something nefarious is going on in your organization. It’s a very proactive approach, and it’s not just looking at the bad stuff, but also looking at the good stuff that organizations need to do, the legitimate tool use.

Damien: Thanks, Jon, it’s been very informative, great job.

Jon: Thank you, Damien.


from Help Net Security https://ift.tt/2JteOYz

Retail CISOs and the areas they must focus on

In this interview, Matt Cooke, cybersecurity strategist, EMEA at Proofpoint, discusses the cybersecurity challenges for retail organizations and the main areas CISOs need to focus on.

retail CISOs

Generally, are retailers paying enough attention to security hygiene?

Our research has shown that the vast majority of retailers in the UK and Europe-wide simply aren’t doing enough to protect their customers from fraudulent and malicious emails – only 11% of UK retailers have implemented the recommended and strictest level of DMARC protection, which protects them from cybercriminals spoofing their identity and decreases the risk of email fraud for customers.

Despite this low and worrying statistic, it’s promising to see that a small majority of UK retailers have at least started their DMARC journey – with 53% publishing a DMARC record in general. When we look at the top European-wide online retailers, 60% of them have published a DMARC record.

If we compare this to the largest organisations in the world (the Global 2000), only 51% of these brands have published a DMARC record. This illustrates the retail industry is slightly ahead of the curve – therefore certainly is paying attention to security hygiene – but there’s still a long way to go.

Unfortunately, starting your DMARC journey isn’t quite enough – without having the ‘reject’ policy in place cyber criminals can still pretend to be you and trick your customers.

What areas should a CISO of a retail organization be particularly worried about?

Business Email Compromise (BEC) and Email Account Compromise Attacks (EAC), are on the rise, targeting organisations in all industries globally. Dubbed cyber-security’s priciest problem, social engineering driven cyber threats such as BEC and EAC are purpose-built to impersonate someone users trust and trick them into sending money or sensitive information.

These email-based threats are a growing problem. Recent Proofpoint research has shown that since March 2020, over 7,000 CEOs or other executives have been impersonated. Overall, more money is lost to this type of attack than any other cybercriminal activity. In fact, according to the FBI, these attacks have cost organisations worldwide more than $26 billion between June 2016 and July 2019.

The retail industry has a very complex supply chain. When targeting an organisation in this sector, cyber criminals don’t only see success from tricking consumers/customers, they can also target suppliers, with attacks such as BEC, impersonating a trusted person from within the business.

We have seen cases within the retail sector where cyber criminals are compromising suppliers’ email accounts in order to hijack seemingly legitimate conversations with someone within the retail business. The aim here is to trick the retailer into paying an outstanding invoice into the wrong account – the cybercriminals’ account, as opposed to the actual supplier.

In addition, due to the pandemic, global workforces have been thrusted into remote working – and those in the retail sector are not exempt. As physical stores have closed worldwide, customer service and interaction has shifted to digital communication more so than ever. Those employees that were used to talking directly to customers, are now using online platforms and have new cloud accounts – expanding the attack surface for cybercriminals.

The retail industry – along with all other industries – need to ensure employees are adequately trained around identifying the risks that might be delivered by these different communication channels and how to securely handle customer data.

Domain spoofing and phishing continue to rise, what’s the impact for retail organizations?

Threat actors are constantly tailoring their tactics, yet email remains the cybercriminals’ attack vector of choice, both at scale and in targeted attacks, simply because it works.

Cybercriminals use phishing because it’s easy, cheap and effective. Email addresses are easy to obtain, and emails are virtually free to send. With little effort and little cost, attackers can quickly gain access to valuable data. As seen in recent breaches, emails sent from official addresses that use the domains of known international companies, seem trustworthy both to the receiver and spam-filters, increasing the number of potential victims. However, this has a detrimental effect on both the brands’ finances and reputation.

Organisations have a duty to deploy authentication protocols, such as DMARC to protect employees, customers, and partners from cybercriminals looking to impersonate their trusted brand and damage their reputation.

Opportunistic cyber criminals will tailor their emails to adapt to whatever is topical or newsworthy at that moment in time. For example, Black Friday-themed phishing emails often take advantage of recipients’ desire to cash in on increasingly attractive deals, creating tempting clickbait for users.

These messages may use stolen branding and tantalising subject lines to convince users to click through, at which point they are often delivered to pages filled with advertising, potential phishing sites, malicious content, or offers for counterfeit goods. As with most things, if offers appear too good to be true or cannot be verified as legitimate email marketing from known brands, recipients should avoid following links.

Do you expect technologies like AI and ML to help retailers eliminate most security risks in the near future?

Today, AI is a vital line of defence against a wide range of threats, including people-centric attacks such as phishing. Every phishing email leaves behind it a trail of data. This data can be collected and analysed by machine learning algorithms to calculate the risk of potentially harmful emails by checking for known malicious hallmarks.

While AI and ML certainly help organisations to reduce risks, they are not going to eliminate security risks on their own. Organisations need to build the right technologies and plug the right gaps from a security perspective, using AI and ML as just part of this overall solution.

Organisations should not outsource their risk management entirely to an AI engine, because AI doesn’t know your business.

There is no doubt that artificial intelligence is now a hugely important line of cyber defence. But it cannot and should not replace all previous techniques. Instead, we must add it to an increasingly sophisticated toolkit, designed to protect against rapidly evolving threats.


from Help Net Security https://ift.tt/2Vj6vRt

Malware may trick biologists into generating dangerous toxins in their labs

An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion University of the Negev researchers.

cyber-biological attack

Malware could replace physical contact

According to a paper, it is currently believed that a criminal needs to have physical contact with a dangerous substance to produce and deliver it. However, malware could easily replace a short sub-string of the DNA on a bioengineer’s computer so that they unintentionally create a toxin producing sequence.

“To regulate both intentional and unintentional generation of dangerous substances, most synthetic gene providers screen DNA orders which is currently the most effective line of defense against such attacks,” says Rami Puzis, head of the BGU Complex Networks Analysis Lab, a member of the Department of Software and Information Systems Engineering and Cyber@BGU. California was the first state in 2020 to introduce gene purchase regulation legislation.

“However, outside the state, bioterrorists can buy dangerous DNA, from companies that do not screen the orders,” Puzis says. “Unfortunately, the screening guidelines have not been adapted to reflect recent developments in synthetic biology and cyberwarfare.”

A weakness in the U.S. Department of Health and Human Services (HHS) guidance for DNA providers allows screening protocols to be circumvented using a generic obfuscation procedure which makes it difficult for the screening software to detect the toxin producing DNA.

“Using this technique, our experiments revealed that that 16 out of 50 obfuscated DNA samples were not detected when screened according to the ‘best-match’ HHS guidelines,” Puzis says.

The synthetic DNA supply chain needs hardening

The researchers also found that accessibility and automation of the synthetic gene engineering workflow, combined with insufficient cybersecurity controls, allow malware to interfere with biological processes within the victim’s lab, closing the loop with the possibility of an exploit written into a DNA molecule.

The DNA injection attack demonstrates a significant new threat of malicious code altering biological processes. Although simpler attacks that may harm biological experiments exist, we’ve chosen to demonstrate a scenario that makes use of multiple weaknesses at three levels of the bioengineering workflow: software, biosecurity screening, and biological protocols. This scenario highlights the opportunities for applying cybersecurity know-how in new contexts such as biosecurity and gene coding.

“This attack scenario underscores the need to harden the synthetic DNA supply chain with protections against cyber-biological threats,” Puzis says.

“To address these threats, we propose an improved screening algorithm that takes into account in vivo gene editing. We hope this paper sets the stage for robust, adversary resilient DNA sequence screening and cybersecurity-hardened synthetic gene production services when biosecurity screening will be enforced by local regulations worldwide.


from Help Net Security https://ift.tt/3qhPKEM

Worldwide SD-WAN market to reach $43 billion by 2030

Due to the rising adoption of IoT and the growing utilization of big data, the valuation of the global SD-WAN market is predicted to increase from $1.4 billion to $43 billion from 2019 to 2030. Further, the market will demonstrate a CAGR of 38.6% between 2020 and 2030, according to ResearchAndMarkets.

worldwide SD-WAN market

Big data and IoT help businesses in monitoring the utilization of their products by consumers and gaining valuable insights from the analysis of this information, offering a customized customer experience, and tracking their various operations. Additionally, the adoption of these technologies allows the real-time monitoring of company assets.

As the big data and IoT technologies bring them a host of numerous challenges such as data handling and management, security concerns, data privacy, demand for advanced technical expertise and knowledge, and high implementation costs, the rising integration of these technologies is massively boosting the progress of the SD-WAN market.

SD-WAN effectively resolves these issues with the help of risk minimization, centralized management and control, and zero-touch provisioning.

In addition to this, SD-WAN solutions simplify device and network security management, provide deep visibility into network performance, which allows the IT professionals to easily detect network problems and security threats, and integrate application filters, firewalls, and UTM functionality.

The pandemic severely affecting the progress of the SD-WAN market

The current COVID-19 crisis is severely affecting the progress of the SD-WAN market. This is because businesses operating in various sectors have had to either scale down or shut down their operations because of the lockdown initiated in several countries for controlling the spread of the virus.

Because of this reason, companies are incurring huge financial losses and are therefore, reducing their IT spending, including their expenditure on SD-WAN solutions. Moreover, as most of the employees are working remotely (from home), the requirement for advanced networking solutions is very low.

Between the solution and service categories, under the offering segment of the SD-WAN market, the former is expected to register higher revenue growth in the market in the coming years.

This is ascribed to the rapidly rising popularity of multi-cloud ecosystems, rising compliance requirements, increasing procurement of connected and IoT devices, and the growing requirement for secured network infrastructure and application optimization. These factors are fueling the adoption of SD-WAN solutions in the BFSI (banking, financial services, and insurance), healthcare, and IT & telecom sectors.

Under the deployment segment, the on-premises category recorded the highest growth in the SD-WAN market in the last few years, mainly because the SD-WAN solutions come with various security concerns.

Additionally, the on-premises deployment method helps in the management of large volumes of unstructured data. Moreover, the usage of physical devices is usually preferred for the effective management of network in the corporate sector.

The bright future of the network operations visibility category

In the future years, the network operations visibility category, based on use case, would exhibit the fastest growth in the SD-WAN market. This is credited to the rising requirement for real-time insights for resolving the issues arising in SD-WAN and making its operation hassle-free.

Historically, under the industry segment of the SD-WAN market, the IT & telecom classification had the highest share, mainly because of its rapid expansion and digitization and the high requirement for a better customer experience in this industry. In addition to this, the rising usage of mobile phones in offices, development and penetration of 5G, increasing adoption of IoT, and mushrooming utilization of big data are boosting the demand for SD-WAN solutions in the industry.

Globally, the North American SD-WAN market is currently the most prosperous one, on account of the presence of several well-established SD-WAN solution providing firms, favorable government policies for 5G adoption, quick integration of various advanced technologies, and the increasing need for simple and hassle-free networking operations in the region.

In the near future, the market will demonstrate the highest CAGR in the Asia-Pacific region. This is because of the rising investments being made in the IT sector, increasing implementation of supportive government policies for 5G, rapid digital transformation in enterprises, expanding operations of market players, and the ballooning popularity of cloud computing and connected devices in the region.


from Help Net Security https://ift.tt/39tLNqp

The CISO’s guide to rapid vendor due diligence

Vendors are at the heart of many companies’ processes and activities, and their numbers are increasing. But the process of onboarding vendors has become complicated because of concerns about cybersecurity.

CISO's guide vendor due diligence

In 2019, nearly half of companies experienced a significant data breach through a third party. To prevent such incidents, security professionals demand that vendors demonstrate and maintain a strong cyber posture.

Rapid vendor due diligence can be challenging. This guide explains how it can be done, including:

  • Determining criticality of vendors
  • Analyzing the vendor attack surface
  • Creating customized questionnaires

from Help Net Security https://ift.tt/3mtFOFY

Computer Services and Featurespace partner to launch anti-money laundering solution

To empower its customers in the fight against financial crime, Computer Services has partnered with Featurespace to launch a holistic anti-money laundering (AML) solution: WatchDOG AML.

WatchDOG AML protects against financial crime by identifying suspicious activity in real-time with an enterprise transaction monitoring system.

Using customizable machine learning models that utilize Featurespace’s award-winning Adaptive Behavioral Analytics, WatchDOG AML reduces false positives while predicting and adapting to new threats through anomaly detection. This allows banks and payments providers to detect more suspicious activity as it happens, while also reducing the number of genuine transactions declined.

“As criminals relentlessly target financial systems, organizations require cutting-edge technology for fraud detection and risk management,” said Kurt Guenther, CSI’s group president of Business Solutions.

“By partnering with Featurespace, we’re providing our customers with a powerful AML solution that leverages the latest in machine learning to fight illicit activity and ensure compliance.”

WatchDOG AML supplies a comprehensive view of risk by analyzing human behavior to detect suspicious activity while maximizing efficiency with automatically prioritized alerts.

“The ability to understand genuine customer behavior allows banks and credit unions to more accurately detect anomalies and additional suspicious activity so that only the most worthwhile alerts are passed along for review, while also reducing false positives and bringing more financial crime to light,” said Dave Excell, founder and president of Featurespace.

“By using our Adaptive Behavioral Analytics, CSI’s WatchDOG AML helps financial institutions drive down risk by monitoring transactions, and also helps the industry take another step forward in the fight against this global problem.”


from Help Net Security https://ift.tt/2VkIZUj

Dynatrace and SAP expand partnership to help retailers drive better business outcomes

Dynatrace announced its expanded partnership with SAP will help prepare the world’s leading retailers for a successful Cyber Monday and beyond.

This multi-year agreement positions Dynatrace as a strategic observability partner for SAP Commerce Cloud. This means Dynatrace’s digital experience monitoring capabilities, including real user monitoring and synthetic monitoring, and precise answers from its AI-engine, Davis, are now available for SAP Commerce Cloud, digital experience monitoring, which customers can subscribe to via the online SAP Store.

The solution enables retailers to maximize customer satisfaction and online conversions by optimizing every step in their user journey, from the first click on a mobile app or website, to code-level insights detailing the performance of underlying cloud services.

“As a part of our digital transformation efforts, we needed to migrate our e-commerce to a more advanced platform. This required digital experience monitoring to understand precisely which improvements to prioritize and ensure everything performs as expected,” said Christoferson Chua, B2B E-Commerce Lead Developer, at ASICS.

“The combined power of Dynatrace digital experience monitoring and SAP Commerce Cloud helps us understand and pinpoint bottlenecks across our e-commerce integrations, enabling our teams to proactively drive innovation and optimizations to achieve a fast and responsive storefront. Ultimately, this allows us to strengthen our relationships with customers and partners, as well as our brand value.”

According to recent research by Deloitte, 2020 e-commerce holiday sales are expected to surge by 25% to 35% compared to 2019, reflecting consumers’ preference for online shopping in the wake of the pandemic.

As retailers look to elevate their digital strategies, and competition intensifies, continuous optimization of digital user experience has become essential to the bottom line.

By embedding Dynatrace’s AI-powered observability and digital experience monitoring capabilities into SAP Commerce Cloud, customers gain a deeper understanding of applications and microservices running in their environment, including third-party services.

Dynatrace can identify anomalies, such as mobile app crashes, errors, or performance issues, prioritize them by business impact, and supply precise root-cause determination. This enables digital teams to understand how application performance and new features influence business KPIs, including conversions and revenue, so they can continuously optimize user experience across mobile, web, and other edge-device channels.

“Imagine you’re a retailer, and during Cyber Monday your mobile app or website crashes. What would you do?” asked Michael Allen, VP of Global Partners at Dynatrace.

“Extending Dynatrace’s AI and digital experience management capabilities to SAP Commerce Cloud helps retailers know exactly what’s happening in their environments, across mobile, web, and other edge-channels.

“They can see where the highest-impact issues are, and how the performance of their digital services impacts business outcomes. This helps ensure, even during the most critical moments and heavy-traffic days, digital experiences work perfectly.”

“As an analyst-recognized, market-leading commerce solution, SAP Commerce Cloud is focused on delivering the best possible commerce experiences and outcomes for our customers so they can do the same for their customers,” said Riad Hijal, Global Head and VP, Commerce Strategy and Solution Management at SAP.

“Reliable observability capabilities are a foundational element of a highly available commerce solution. By incorporating Dynatrace’s observability and digital experience monitoring capabilities within SAP Commerce Cloud, customers will be further empowered to monitor the full, end-to-end landscape, from infrastructure and application performance to digital journeys on commerce storefronts.”


from Help Net Security https://ift.tt/3mpoeCT

Plug Into the Best Cyber Monday 2020 Tech Deals

Holiday 2020Holiday 2020Whether you're celebrating with your loved ones in person or from a distance, The Inventory staff is dedicated to spreading holiday cheer with the top gifts to ring in the season—and maybe a few good deals to snatch up for yourself. It's okay, your secret's safe with us.

Take a glance at anyone’s holiday wish list, and there’s probably a gadget or two somewhere on there. While it’s nice to know exactly what your loved ones want, the prices can get hefty pretty quickly. Days like Cyber Monday can help. but finding the best deals in the flood of bargains isn’t easy. Spare yourself the trouble and check out the best tech deals to hop on this Cyber Monday.

Whether you’re trying to mend your commitment to showing up late, or just want a way to get a few more data points into the Health app, the Apple Watch can be a handy tool in making your life just a little bit better. It’s pricey, though, and it’s worth sitting it out until a good deal shows up. If you don’t need the latest and greatest, Apple’s Series 5 Watch is up to $150 off at Best Buy right now. The 40mm is down from $400 to $300, and the 44mm model is down to $330.

G/O Media may get a commission

If you’ve been holding out on getting a smart speaker for fear of having a funky looking tube sitting on your shelf, now’s a good time to make the jump. Amazon’s latest Echo speaker ditches the tubular look of its predecessors for an orb shape not unlike the HomePod Mini. That, plus some improved speakers, make it a pretty solid upgrade at the discounted price of $70.

If the Apple-exclusive AirPods are off the table, and you’d rather not get a cheap AirPods knockoff on Amazon, the Jabra Elite 75t earbuds are a great alternative. Their sound quality is among the best in the category, and they’ve got enough battery life to keep your tunes playing all day thanks to the included charging case. Right now, you can get a pair for $130 on Amazon.

Photo: Victoria Song/Gizmodo

If you need a smartwatch that works with Android, Samsung’s Galaxy Watch 3 is down to $330 today at Best Buy. It’s stylish, packed with health tracking features, and the battery lasts around two days. It also has a nifty dial around the display that makes it easy to switch between screens.

If you’ve found yourself having to manage fumbling through all your cooking utensils as well as your recipe-equipped phone, it might be time to find a better way to peek at your recipes. While it does plenty more, the Google Nest Hub is a great way to prop your recipes up on a big screen in the kitchen without having to get your phone or tablet dirty. Plus, you can chat with it and it’ll play some tunes while you get your chef on.

A computer without any storage space won’t do anybody much good, but that’s no reason to go out and buy a whole new rig. A portable SSD is a great way to expand your computer’s storage without having to pay a hefty upgrade fee when you’re configuring your new computer, and you can carry it with you wherever you go. Samsung’s SSD’s are fast, reliable, and small enough to fit in the tiniest pockets of your favorite bag.

Kindle Oasis | $175 | Amazon

For anyone who’s got too many books and not enough shelf, the Kindle Oasis packs a hefty amount of storage to hold all your favorite page-turners. It has a larger screen than the Paperwhite, has an added groove on the back for better grip, and has a light that auto-adjusts; there’s even a way to change the warmness of the light. Sure, it’s pricey, but it’ll give you loved ones the best reading experience you can get, and that’s pretty neat.

Photo: Andrew Liszewski/Gizmodo

For many, working from home this year has been a tricky adjustment. Among the many frustrations and inconveniences are the many noises your housemates will make as you try to focus on your work. Asking to keep the noise down might work, but it can also cause some tension, and it’s never any fun. Spare yourself the trouble with the Sony WH-1000XM4 noise-canceling headphones. Typically they’d cost you $350, but they’re down to about $280 today. I’ve been testing them for the past couple days, and the noise-cancellation is a joy when your neighbors have a symphony of dogs on standby.

If you’ve been waiting for the right moment to snag a new MacBook, now’s your chance. The latest models, which features Apple’s M1 ARM chips, bring impressive gains in both battery life and performance without hiking up the price. The base model, which comes with a 256GB SSD and 8GB of memory packs plenty of power for day-to-day tasks, it’s $100 off right now at Adorama, bringing it down to $900.



from Lifehacker https://ift.tt/2VfBfmt

The Onion Store Is Having a 15% off Sale and These Deals Better Make Me Laugh

Holiday 2020Holiday 2020Whether you're celebrating with your loved ones in person or from a distance, The Inventory staff is dedicated to spreading holiday cheer with the top gifts to ring in the season—and maybe a few good deals to snatch up for yourself. It's okay, your secret's safe with us.

15% off The Onion Store Merch | The Onion Store | Promo Code CYBERWEEK

Those hilarious satirists at The Onion are at it again! Get this: the jokesters are doing a Cyber Monday sale where all merch on The Onion Store is 15% off with the code CYBERWEEK. Hilarious! Genius! This must be some sort of elaborate satire on the weird culture behind holiday sales, right? Like, I’m going to pop into The Onion Store and it’s just going to be a bunch of junk they found lying around their office, cleverly goofing on the fact that we’ll buy just about anything during Cyber Monday if someone says it’s on sale. That would be classic Onion!

Oh, uh, this is just good old, normal Onion merch. I mean, don’t get me wrong, that’s cool too! It’s actually probably more practical to get an Onion face mask than someone’s used coffee cup from March. There’s definitely some funny stuff here too, like this mug that just says “I Wish I Were Dead.” But it’s ha ha funny, not ha ha funny, you know what I mean? Honestly, that’s fine. We just came out of an endless presidential election cycle and I imagine everyone at The Onion is too tired to make an elaborate sale joke right now. I can respect that.

[Editor’s Note: You can also save on wares from Gizmodo, io9, Kotaku, Lifehacker, Jalopnik, Jezebel, and the rest of our sites by clicking Shop on the upper-righthand side of their homepages and using the promo code CYBERDEALS at checkout. This note isn’t funny, but I worked through the holidays so cut me some slack.]

G/O Media may get a commission



from Lifehacker https://ift.tt/3fQtpZX

Internet Society and IETF agreement ensures the continuity of critical work in creating open standards

The Internet Society and the Internet Engineering Task Force (IETF) announced a new long term strategic agreement that will ensure the continuity of the IETF’s critical work in creating open standards that make the Internet work better.

The IETF has been at the center of technical innovation for the global Internet for nearly 35 years. Open standards allow devices, services, and applications to work together across the tens of thousands interconnected networks that make up the Internet and everything it enables such as the Web and email.

The Internet Society provided the organisational home for the IETF until 2018 when the IETF Administration LLC was formed to support its ongoing operations.

Under the new six-year agreement, the Internet Society will provide financial support in two areas: IETF’s work through the LLC, and a new donor match program in support of upcoming fundraising efforts for the IETF Endowment, which is designed to provide long term funding for the IETF’s mission.

“We look forward to continuing our support of the IETF in its important work of creating and improving open standards, a fundamental building block of an open Internet,” said Gonzalo Camarillo, Chair of the Internet Society Board of Trustees.

“The COVID-19 pandemic has underscored just how critical the Internet is to our daily lives and the benefits it brings to us all comes down to the technology that underpins it,” he added.

Under the new agreement, the Internet Society will provide continued financial support for a portion of the IETF’s annual operating expenses, averaging $7 million USD over the course of six years. It also establishes a new donor match program to support the IETF LLC’s upcoming fundraising efforts for the IETF Endowment.

“We are pleased to come to a strategic agreement with the Internet Society on operating support and an incredible new matching program for the IETF Endowment.

“The Internet Society continues to demonstrate its meaningful support for the IETF’s open Internet standards process, which is greatly appreciated and without which the IETF could not succeed,” said Jason Livingood, IETF Administration LLC Board Chair.

The new agreement will go into effect on January 1, 2021 and run through December 31, 2026.


from Help Net Security https://ift.tt/36oocFK

Fuze awarded new patent for processing heterogeneous data streams in real time

Fuze announced that it has been awarded a new patent for processing and analyzing heterogeneous streams of communications data across multiple users and mediums, in real time.

The U.S. Patent and Trademark Office (USPTO) issued Fuze U.S. Patent No. 10798191B1 on October 6, 2020.

The invention enables the Fuze platform to quickly and effectively analyze all voice, meeting, messaging, and email communication data and produce a single, complete view of user activity across organizations, departments, or individual users. This empowers enterprises with actionable information and enhanced insights into Fuze user behavior and patterns.

“Teams are becoming increasingly distributed, relying on communication and collaboration tools that enable them to remain productive and engaged across a variety of devices and modes,” said Rob Scudiere, president and chief operating officer at Fuze.

“It has never been more important to have real-time access to user data and patterns across voice, meeting, messaging, and email, to quickly address any challenges and identify opportunities to improve operational processes and user experience.”


from Help Net Security https://ift.tt/3mqW8XN

SS8 awarded two multi-million dollar Lawful Intelligence contracts

SS8 Networks has been awarded two multi-million dollar Lawful Intelligence contracts using its Intellego XT and Xcipio family of products.

SS8 was awarded these contracts due to their continued effort of providing leading edge and cost-effective solutions. Intellego XT and Xcipio comprise of scalable intercept, monitoring, and data analytics solutions specifically designed for large scale national deployments.

Together these platforms provide law enforcement agencies with real-time intelligence regarding criminal and terrorist activities.

SS8 is constantly improving the Intellego XT family of products and now offers many new data capture and analytic tools for law enforcement agencies. Both products are deployed in 5G networks providing Lawful Intelligence.

“SS8 continues our heritage of providing leading technology for the law enforcement community and is proud to have been awarded these prestigious orders,” Dr. Keith Bhatia, Chief Executive Officer, SS8.

“We will be providing our new metadata solution as well as our new micro-service based passive and active intercept platform. As an active participant in the standards committees, SS8 will continue to provide technology to help save lives.”


from Help Net Security https://ift.tt/3fQjwf1

Totum Labs raises $13M to drive commercialization of its DMSS technology

Satellite IoT connectivity company Totum Labs announced it has completed a $13 million Series A financing. Heroic Ventures and Space Capital co-led the investment round with participation from existing investors, including Qualcomm Co-founder Dr. Andrew Viterbi and new strategic investor Qamcom.

The investment brings Totum’s total funding since launch to $15.5 million and will enable the company to accelerate the deployment and commercialization of its low power sensor to satellite network and connectivity.

Totum is developing the revolutionary communication system and chip level technology required for simple, global, outdoor and indoor low-cost connectivity that will allow Low Power Wide Area (LPWA) connections to scale into the billions.

“Others that have launched satellites are not on a technical path to scale to billions of connections and they will largely be limited to high value, low-volume endpoints historically associated with satellite connectivity,” said Ted Myers, Founder and CEO of Totum Labs.

“Only Totum’s DMSS technology can go head-to-head with the cellular industry for LPWA connectivity and provide a robust and cost-effective connectivity experience for a massive number of endpoint connections across a wide variety of industry use cases.”

“I’ve closely followed LPWA technologies for more than a decade, and I believe DMSS is the right answer for global connectivity on a massive scale,” said Qualcomm Co-founder Dr. Andrew Viterbi,

“Totum has a dominant waveform with an unparalleled link budget that positions the company to unlock the massive LPWA asset tracking and monitoring market,” said Matt Robinson, Founder and Managing Partner of Heroic Ventures. “The Totum team has unmatched LPWA communications technical expertise and we are thrilled to support them.”

“We see Totum’s deep communications expertise and DMSS technology as highly differentiated from other players who come to the market as a pure satellite industry orientation,” said Tom Ingersoll, Managing Director of Space Capital.

The Series A funding builds on a number of exciting accomplishments for Totum, including the tape out of its DMSS 3990 Endpoint Device through Orca Systems, the issuance of 4 foundational patents, and strategic partnerships with Qamcom and others.

The DMSS 3990 is a highly integrated Low Power Sensor to Satellite (LP-S2S) System on a Chip (SOC) ASIC that includes a DMSS modem, RF functionality, baseband and application CPUs, and provides for efficient integrated power regulation (for multi-year battery life) in a small/low cost package using the Global Foundries 22DFX process.

Qamcom is a EU-based expert provider of value-driven technology application solutions, products and services focused around sensors, signals and systems.

“We are extremely impressed with Totum’s core DMSS technology and the world class capabilities of the Totum technical team,” said Johan Lassing, CEO of Qamcom. “We look forward to working with them closely as both a technical partner and solution provider to turn technology into value by bringing DMSS solutions to market.”


from Help Net Security https://ift.tt/3qf2Zpv

How to Upgrade Your PC With Your New Black Friday Buys

It’s one of the best times of the year if you’ve been thinking about upgrading your PC. Odds are good that you can score great deals on components from Black Friday through Cyber Monday (even if you’ll never get that flagship Nvidia or AMD graphics card in your holiday stocking). Whether this is your first time upgrading or your fiftieth, there are a few things you’ll want to do before ripping into your gear and grounding yourself.

Did you receive the right gear?

Mess-ups happens, as retailers are dealing with a lot of shopping right now. Before you rip open whatever it is you purchased—a new CPU, RAM, motherboard, et cetera—take a deep breath. Look at the box. Look at the specs. Make sure that what you received is exactly what you ordered from the retailer (or were intending to order). And even when you carefully open your purchases (don’t rip), look at the gear itself. Was the correct item placed in the correct packaging? Did you actually get DDR4-3000 memory when you meant to get DDR4-3600?

This sounds pedantic, I know, but it’s a lot better to catch a mistake early on than after you’ve already stuffed said components into your desktop system.

Make sure your purchases aren’t fakes

I confess, I’ve never experienced this in my way-too-many years of PC building, but that’s not to say it doesn’t happen. It’s possible that you might receive a fake or dummy product—something a previous purchaser ordered, swapped out for a lesser or cheaper component, and returned. As Redditor altimax98 explains:

I purchased a i9-10850KA (yup, probably the latest Intel on the market indicating this is still occurring) and when I got it, it didn’t feel right. The box was messed up, but IDC if the processor is fine. But it was really banged up, and the security tape was not clear, it had oddities in it - so I started taking photos. I looked at the processor and as I havent upgraded in about 4 years It didnt strike me as odd. I opened up the box and grabbed the CPU and thats when I noticed that it appeared there was a sticker on the top and a small defect in the way it was applied. At this point I was 99.9% sure it was a fake so I started looking online for 10850k/10900k CPU’s and thats when I saw 1: dummy CPUs have this shape and 2: the real CPU in the socket is all you should be looking for, and thats when I noticed mine was a fake.

What could this have done if I placed it in my $400 motherboard, who knows but it would have absolutely made my return/refund process monumentally more difficult.

I got lucky, my experience saved my butt but I know a lot of people that post here are brand new, so before you bend pins or potentially short a motherboard out...

G/O Media may get a commission

Again, odds are good that most people reading this will never have a problem with fake components. But this is why I always caution that it’s worth being careful upfront and taking your time to really inspect what you ordered before you take apart your PC to install it (or use it in a new desktop PC build).

Make sure all the gear you bought plays nicely together

Now that you’re staring a big pile of (legitimate) stuff for upgrading or building a desktop PC, take a moment to self-assess. Are you reasonably confident that everything you purchased is compatible with each other? Does your motherboard support your CPU’s socket? Did you buy the right memory for your motherboard? Does your motherboard PCI Express chipset match the fastest your graphics card supports? Is your power supply big enough to handle your upgraded system? Can your graphics card (or integrated graphics) handle your high-resolution monitor? Does your motherboard have enough SATA ports for all your drives?

If this all sounds like technobabble, or you’ve already researched all of it (or had a little help) but are now starting to doubt yourself, don’t worry about it—there are plenty of forums you can hit up to get someone more knowledgeable than you to vet your purchases before you open everything up and realize there’s a problem. I’ve always been a big fan of the geeks over at the buildapc subreddit, who always seem willing and eager to help the less-experienced with their builds.

Measure, measure, measure

The last thing you want to deal with is figuring out how the hell you’re going to get that [critical part] into your PC if, or when, space gets tight. And if you’re lucky enough to have one of the latest graphics cards from Nvidia or AMD, you’ll want to make triple-sure that your desktop PC’s case has enough space for these monstrosities before you start your build.

You might, for example, have to remove part of the case—like some drive bays—to free up enough space for your beast of a graphics card and its cables. And this might be something that’s a lot easier to do before you’ve installed your motherboard, power supply, hard drives, case fans, or whatever else you’re working with.

You have a few ways to go about this. You can write down all the critical measurements of the parts you’re buying to make sure you have enough space in your case before you order them. Once they’ve arrived, I’d recommend laying them all out and conducting a dry run—only install the very basics, like your motherboard and graphics card, before worrying about things like your CPU, drives, cables, and so on. You’re only going for a fit test, as well as an idea of what order you might need to install everything. Once you’re confident, you can then start screwing everything in, connecting cables, and getting all your other gear into place.

Make sure you understand the nuances of PC building

Building a PC is simple, but I say that as someone who used to build system after system after system for places like Maximum PC: There are definitely some nuances that come second-nature to experienced PC builders, but might be things you didn’t even know existed if you’re relatively new to PC building (or upgrading). For example, did you use the right PCI Express slot for your graphics card? Did you put your memory in the correct slots? Did you make sure to enable XMP (or its equivalent) so your memory runs at its correct speed? Did you apply your thermal paste the right way? Did you remember to adjust your 120Hz gaming monitor’s refresh rate in Windows, so it’s not just running at a default 60Hz? Did you really connect all the cables? Are you building your PC on a carpet floor? (Don’t do that.)

If you’re not sure what you’re doing, or want to make sure you’ve covered all the bases when building a new PC, there are many resources out there that will help walk you through the process. I’m always a fan of Austin’s tutorial videos, because he’s so damn upbeat:

YouTuber Robeytech also does a great job with this up-to-date tutorial:

When in doubt: Stop and ask for help

If you reach a point in your PC build where something feels off—your parts don’t fit, you’re not sure what to connect to where, or you think you’re done and your system doesn’t power on at all—don’t panic. It’s time to phone a friend.

Odds are good that you you know a geek or gamer who can help you troubleshoot the process over the phone, video chat, or (safely) in person. And if you truly don’t have any friends who have done this before, it’s possible that you at least know a gamer or two, and they might have a friend who could help you out. Heck, I’m happy to help, too.

I’ve been down this road before, and it can lead to a flurry of frantic googling and frustration when something isn’t quite working with the PC you just built. Spare yourself the anxiety and wasted afternoons. Do a little troubleshooting, but if the answer doesn’t pop out at you, it might be worth getting a second set of eyes to check out. Odds are good they’ll be able to identify the “duh” mistake—like, say, forgetting to flick the power switch on the back of your power supply—that experts tend to remember and newbies might easily forget.


from Lifehacker https://ift.tt/33v8bMm

How to Score Great Deals on Samsung Androids and Refurb iPhones Today

I’ve been successful at avoiding all things Black Friday/Cyber Monday this year, save for a small splurge on a cold-brew coffee maker. If you’re looking to upgrade your life in a bigger way—in the form of a new phone—you should know that you can get Samsung’s flagship Galaxy S20 Androids (the S20 and S20+) at their lowest prices ever right now. And not to be outdone, Apple fans can also score some pretty great savings on refurbished iPhones.

We’ll start with Samsung. Head on over to Amazon, where you’ll find the Galaxy S20 for a mere $750. The larger Galaxy S20+ can be had for $900. A quick look at Amazon price-tracking site camelcamelcamel verifies that these are, indeed, the lowest prices Amazon has ever offered on the Galaxy S20 and Galaxy S20+. Those prices are for the base models of both phones (128GB), and can pick from the Cloud Blue and Cosmic Gray colors for the S20; or the Cloud Blue, Cosmic Gray, or Cosmic Black colors for the S20+.

We’ve covered both phones’ specs some time ago. I’d say that either is a solid choice if you want a top-shelf product (if prone to a bit of software bloat) that’s still reasonably sized—and provided you don’t need a stylus for anything. Both phones also support 5G, for whatever that’s worth in your area.

As for those iPhones, head on over to Woot to view the full listings. You’ll find refurbished iPhones ranging from the iPhone 7 to the iPhone XR and XS. In other words, iPhones that are anywhere from 2-4 years old, with potential cosmetic damage—a fact that shouldn’t really matter at all once you slap it in a protective case. If you can, shoot for the iPhone XS or iPhone XR, as they’ll be a bit more future-proofed than the ancient iPhone 7 (even though $150 for an iPhone isn’t bad at all).

G/O Media may get a commission

And, yes, Woot’s offers beat Apple’s own refurbished listings. For example, you can buy a refurbished iPhone XS directly from Apple for $640. That same configuration, during Woot’s one-day sale, is only $430. Not bad, but there’s a caveat; it appears the Woot phones offer no guarantees about the condition of the battery, beyond that they will have at least an 85% charge. As one who has dealt with an iPhone X’s decaying battery—and the resultant performance issues—i wouldn’t be thrilled to get anything but a brand-new battery in my newly purchased iPhone.

That’s partly why Apple’s refurbished iPhones cost more—they come with a one-year warranty (same as any new iPhone) and a brand-new battery. On Woot, you’re getting a 90-day limited warranty and a battery that has been tested, but could be in less that peak condition. On the plus side, you can always give the iPhone a try and, if you hate it, return it within 30 days.


from Lifehacker https://ift.tt/2JvstxY

The Out-of-Touch Adults' Guide To Kid Culture: Viral TikTok Overload

Illustration: art_inside (Shutterstock)
Internet CultureInternet CultureIt's hard to keep up with internet culture, but don't worry: Each week we'll tell you the best of what you need to know.

When it comes to kids and teenagers, it’s all about TikTok. Competitors can try to clone it, the president can try to shut it down, but the made-in-China video sharing service just keeps on rolling, with around 850 million people estimated as active users. Even if you don’t like it, TikTok is the marketplace of ideas for anyone under 25, whether it’s silly arguments about the occult, deadly serious ones about COVID-19 vaccines, or heartwarming reimagining of mid-2000 kids’ movies.

Baphomet TikTok is best TikTok

You know who’s gaining popularity on TikTok? Satan’s little pal Baphomet! The goat-headed deity first rose to fame in 1307 during the Inquisition of the Knights Templar, but he/she/it is still hip. Baphomet is all over the Tik these days, with gothy (and ironic) teens using the app’s “Time Warp” feature to pay tribute to the dark one by making themselves in its image. 

It’s the today version of throwing up horns at an Ozzy show, and like the Satanic Panic of the 1980s that Ozzy and friends birthed, religious TikTok is not happy with the movement. I, however, love everything about this trend. I love the edgy teens making so-super-spooky Baphomet videos—my people! I love the Christians who are earnestly (or smugly) warning their peers about the totally real dangers of devil worship. But most of all, I love this guy, the Ned Flanders of the occult.

A serious note for parents: Baphomet isn’t real (it’s a long story), but if your kid is into techno-devil-worship-biz, it’s probably because they’re creative and school is boring. If they’re into warning other kids about Baphomet, it’s probably because they’re pure-hearted and idealistic. So let’s cut everyone some slack.

G/O Media may get a commission

Vaccine TikTok is also best TikTok

Even if they don’t realize it, the most important thing happening on planet earth for teens is the development and deployment of vaccines for coronavirus. But because this is a dark and terrible time, people are actively spreading misinformation about potential pandemic-killing injections. Luckily, a group of users on TikTok are countering the spread of vaccine lies by creating a place for experts to provide valuable and truthful information to curious teenagers. (Disappointingly, it turns out the vaccines being developed don’t implant a microchip in your bloodstream so the Illuminati can track your movements.)

There is, of course, a counter-movement—a group of cranks and weirdoes on TikTok trying to convince people of the dangers of the vaccines, but unlike the well-meaning Christians worried about Baphomet, these people aren’t endearing, but despicable.

Viral video of the week: Exploding apples

Before the internet, if you wanted to see an apple being spun so fast it explodes, you’d have to do a lot of mescaline in the produce section of your local supermarket, but thanks to technology, now you just have to go to YouTube.

The (presumably mad) scientists of The Slo Mo Guys channel have posted a video for you where apples are blowed up real good. They not only used compressed air to spin an apple at 6,565 RPM, they also captured the resulting apple-‘splosion on a camera running at 28,500 frames per second. Because I hate apples with my entire being, this video is like porn to me; I’m all, “Take that, apple!” Over a million viewers have watched the video in only its first couple days online, and I suggest you do as well.

This week in video games: New glitch livens up ‘Red Dead Online’

I love amusing and useful glitches in video games, and a gamer on Reddit has discovered a great one in Red Dead Online. Here’s how it works: There is a wooden bridge between Macfarlane’s Ranch and Armadillo, and if you throw some knives or tomahawks at the third or fourth plank, the bridge will begin bouncing wildly. Step on it, and you will be launched into the stratosphere, where you can fly for incredible distances, and even visit otherwise inaccessible parts of the game’s map.

Check out this video to see the glitch in action. Whether RockStar, the game’s developer, will patch this mistake remains to be seen, but they’ve been known to leave amusing or popular glitches alone in other games, so let’s hope they see space-launch-bridge as a feature and not a bug.

This week in movies: ‘Ratatouille’ returns

The hottest movie this week on TikTok is 2007’s Ratatouille. Musical theater-nerd TikTok has taken it upon themselves to create a musical version of the Disney movie, complete with original songs, dance numbers, and more.

As the movement grew, “real” people in the business started noticing. Playbill compiled the “official (fake) Ratatouille Playbill.” Patton Oswalt, voice of Ratatouille, started tweeting out songs. Disney has even played nice and refrained from suing anyone yet. I hope a real version will come to a theater near me when all this madness is over.

It’s all so impossibly adorable I can’t stand it. Here are these kids who love musical theater more than I am capable of loving anything, but they can’t attend any shows because a plague stalks us all. Rather than cry and give up, they wrote their own show. It’s like a musical from the 1930s: They got the gang together, sewed some curtains, and put on a show in the old barn. They collaborated with each other, worked their crafts, and ended up creating something amazing out of a terrible situation. I’m sort of choked up by how fragile and beautiful life can be sometimes. Maybe theater nerd TikTok is the best TikTok.


from Lifehacker https://ift.tt/3luRI12

How to Read More Books in 2021, With The Root's Danielle Belton and Maiysha Kai

Photo: Maiysha Kai and D. Finney Photography

This week we’re joined by Danielle Belton, editor in chief of The Root, and Maiysha Kai, the managing editor of The Glow Up, to talk all things books. More specifically, how to read more of them in the coming year, and how to upgrade your reading list to get you ready. Listen to hear these two voracious readers talk about how they make time to read, how they discover their next great reads, and why it’s so important to branch out when it comes to the types of books you gravitate towards.

Danielle and Maiysha are the hosts of The Root’s new podcast, The Root Presents: It’s Lit!, which we also highly recommend checking out.

Listen to The Upgrade above or find us in all the usual places podcasts are served, including Apple Podcasts, Google Play, Spotify, iHeartRadio, and NPR One.

Highlights from this week’s episode

From Danielle Belton:

On how to diversify your reading list:

I always encourage people like the first thing you have to have [is] an open mind. Like if you don’t have an open mind like this is going to be a really short exercise for you. You have to be willing to be a little uncomfortable and have your ideas questioned, you know, because that’s what diversifying your reading is all about. It’s about introducing things into your life that you might not normally know about or understand or might not even have a natural curiosity for because you’re just trying to better understand things.

G/O Media may get a commission

From Maiysha Kai:

On the importance of diversifying your reading list:

I would encourage that curiosity in general about people’s lives, not about race per se, or gender or whatever, but about people’s lives. Because I think that that curiosity naturally drives diversity in your reading. I think that looking at it as exactly that: I’m interested in somebody else’s life, somebody else’s experience. And I think it makes you a better person ultimately.

On how to find your next great read:

I also find books, lead me to other books. And so if I’m writing if I’m reading something that’s historical, then the bibliography of that book will often lead me to a book. Wikipedia will lead you to books all the time, all the time, right? So, yeah, I would say that books beget books. I’m also a huge fan of recommendations like, you know, I love going to a bookstore’s site to see what they’re recommending or Well-Read Black Girl is one of my favorites. They have a book club, but they also have recommendations by year of things, which I started looking at for research, but now also look at for pleasure.

To hear more about how to get more books into your life, listen to the full episode!

Have any feedback or ideas for future episodes? Want to be featured on the show? Leave us a voicemail at 347-687-8109 or send a voice memo to upgrade@lifehacker.com.

Episode Transcript


from Lifehacker https://ift.tt/2VgDENM

Reset Your Fit, Tech, and Gear for up to 60% off in Huckberry's Cyber Monday Sale

Holiday 2020Holiday 2020Whether you're celebrating with your loved ones in person or from a distance, The Inventory staff is dedicated to spreading holiday cheer with the top gifts to ring in the season—and maybe a few good deals to snatch up for yourself. It's okay, your secret's safe with us.

Cyber Monday Sale | Huckberry

When it comes to men’s apparel, there is no retailer more coveted by our readers than Huckberry, and it’s not hard to see why. It sells everything from wool sweaters to weatherproof boots to polarized sunglasses, some of which are available exclusively to the brand. But Huckberry doesn’t just sell apparel, it sells home goods, accessories, and even some tech products, ALL of which are discounted in its Cyber Monday sale.

Need a new pair of earbuds, resistant to water and sweat while you’re working or exploring outside? Jaybird’s Earthproof wireless headphones are marked down $81. Clean house and spark joy with a Yamazaki shoe rack tower reduced 25%. And when all’s said and done, pour a glass of something strong with a 4-pack of Whiskey Peaks American Mountains whiskey glasses for $52. Back in the clothing department, some of your favorites are back, too, including boots from Astorflex and Rhodes Footwear, Seavee’s slip-ons, Malouf’s Zoned Dough pillows, and more.

Don’t miss out on Huckberry’s biggest sale—and lowest prices—of the year.

G/O Media may get a commission



from Lifehacker https://ift.tt/2VeD9Ut

Close All Your Tabs. Just Close 'Em

Just another day at the office
Screenshot: Joel Cunningham

Lifehacker has spilled a lot of digital ink over the years trying to help you get your browser tabs problem under control. How to use tabs more efficiently on Chrome. How to reopen your tabs after a browser crash. How to get an intervention for your tabs addiction. The best browser extensions to make opening a new tab better. But today I’m sharing a bold take that you might not like: You should just close all of your tabs regularly, without poring over them first. Just close ‘em all.

I don’t say this lightly. I have been known to regularly keep browser tabs open for weeks—even months—before finally plowing through that New Yorker long read or adding those best albums of the year to my Amazon Music queue. But with the expectation of getting a new work laptop today, I decided to do a little browser maintenance over the weekend, and after 10 minutes of trying to deal with each tab before closing it out, I finally just said “screw it’ and closed them all...and I felt instantly free. (Well, freer. Everything is still terrible.)

Writers and psychologists have mused at length about why we all have so many open browser tabs. According to Digital Information World, clinical psychologist Marc Hekster observed that computers and phones now serve as an “extension of our brain”; you can think of open tabs like your subconscious noodling away at something you don’t have time to devote your full attention to. Metro UK’s Ellen Scott likens the functionality to “task-switching”; it allows us to move on to a new activity when we grow bored—but also invites distraction.

But at a time when I am already particularly distracted—by the increasingly bizarre news, increasingly intrusive social media, my increasingly demanding children who have been stuck at home for nine months—the last thing I need is more of it. Those tabs lurking at the top of my browser bar not only make it harder to find the various windows I need, they actively encourage me to do anything but focus.

G/O Media may get a commission

If tabs are also troubling you—or turning your browser into an unwieldy system-hogging beast—just close them all without looking at them. Do it at the end of every work day, or before you go to bed, or multiple times in-between. If it turns out you really did need one of them, it will still be there in your browser history. For all the rest: out of sight, out of mind.


from Lifehacker https://ift.tt/36nKSpO

Your Office Doesn't Need a Virtual Holiday Party

Photo: AleksandarNakic (Getty Images)

Even as the pandemic stretches into a nine-month slog, upending lives and shattering economies around the world, a pretty much universally reviled corporate custom still threatens to rear its ugly head: the office holiday party.

This year, your office holiday party will be different, or at least it really should be. Instead of piling into some rented venue, you and your colleagues will sit in front of your computers and attempt to ring in some holiday cheer via Zoom, Google Hangouts, or HouseParty. The typical awkwardness of video chat will abound, and your colleague’s presumably smiling faces will be sequestered into grainy squares on a monitor. And for what, exactly?

Holiday parties, in the best sense, are a chance to let loose and informally get to know the colleagues you spend more time with than your actual family. But this year, you won’t even get to enjoy the unexpected silliness of seeing your work acquaintances get weird after one too many spiked eggnogs. If the pandemic has given us a chance to shatter any rote tradition that few people actually look forward to, it’s the corporate holiday party. Because it just won’t be the same on a video chat.

Video chats are awkward

When there’s an objective at hand, video chats aren’t as awkward; if you’re going through a corporate agenda or presentation, people know they have to pay attention because it’s pertinent to their jobs. But if the context is less formal, workers with little rapport outside the office are going to flounder and your well-intentioned holiday soiree will feel like social purgatory.

G/O Media may get a commission

Just think of video chat’s trademark hiccups: washy internet connections, lapses in conversation, people talking over each other, stragglers who forget to mute their microphones. It’ll be harder, or impossible, to mingle and let casual conversation flow. When one person talks in a video chat, everyone has to pipe down and listen. These tools weren’t really designed to facilitate the spontaneous and organic environment of parties.

That’s one reason your Zoom party will suck. It’s one thing to deal with the annoyances of relying so heavily on technology for the sake of work in this COVID-stricken environment, but why willfully subject yourself to it for the sake of manufactured fun?

It’ll be depressing

I hate to be so negative in this time of pestilence and economic decay, but I’m not here to lie to you. The holidays call for merriment and gratitude, and logging on to a work holiday party might feel like papering over the horrifying reality of what the world is going through right now.

Want to feel sad? Stare into a lonely computer monitor at several other solitary faces trying their damndest to celebrate the holidays with a group of relative strangers. Trying to pretend that things can be normal when they’re so glaringly the opposite isn’t going to make it feel like Christmas, or Hanukkah, or any other festive tradition.

Like I said, I hate to dwell on the misery of our times, but let’s not pretend a virtual party with work colleagues is going to make things feel less terrible.

None of the usual fun stuff will happen

Silver linings may be in short supply this year, but there’s usually a pretty consistent one with office holiday parties—or at least there was in the Before Times. It comes when your colleagues do something unexpectedly funny. It’s always a treat when a colleague gets a little too toasty and breaches the corporate decorum, or when that one working stiff from accounting shows that he can, despite all presumption, really throw down on the dance floor.

None of that impromptu stuff will happen this year. You will occupy a window on a screen, perhaps nodding mechanically to a mundane conversation about how weird it is to be isolated during the holidays. In this remote setup, you can’t be the free-floating social butterfly who has different conversations about different topics with different work friends.

Video chat parties are for friends and family

Let’s be honest, our personal and leisure time is fleetingly small, and it’s best to spend it with those you really know well and care about. This is no disrespect to your coworkers (you might be close friends with them, after all) since they have friends and family whom they’d probably rather be doing holiday stuff with as well.

With all this in mind, it might be better just to shelve the office holiday party until next year, when we at least have a chance of making the most of them.


from Lifehacker https://ift.tt/3qe8DbE