Wednesday, August 31, 2022

Menlo Security appoints John Wrobel as CRO and Todd Wilson as VP of Global Channels

Menlo Security announced that John Wrobel has joined the company as Chief Revenue Officer (CRO), and Todd Wilson has joined as vice president of global channels.

As members of the Menlo executive team, Wrobel and Wilson will help guide the company’s continued worldwide growth Go-to-Market (GTM) programs and partner ecosystem development.

With a track record of proven success growing revenue, building teams and business development at both startups and mature companies, Wrobel brings over 20 years of experience to Menlo Security. Prior to joining Menlo, Wrobel was CRO for Skytap, where he established new partnerships with cloud providers to transform Skytap’s GTM efforts and drive growth.

He was previously with NetApp, most recently as vice president, cloud data service, sales, and business development. While with NetApp, Wrobel launched and led sales for cloud data services, growing revenues from zero to $150M in just 3 years, making it NetApp’s fastest growing business. He also built a 200-person global sales team. Prior to NetApp, Wrobel held a variety of sales management roles at SanDisk and IBM.

Todd Wilson has been named vice president of global channels. Reporting to Wrobel, Wilson’s charter is to build and lead Menlo’s global channel program. Most recently Wilson was with AppOmni, where he led the company’s global channels and alliances efforts in the Software as a Service (SaaS) security market. Previously, Todd spent 4.5 years at NetSkope, leading their GTM efforts with service providers and global system integrators including Deloitte, Accenture, AT&T and Verizon. Wilson’s nearly 20 years of security industry experience includes global channel management positions with AT&T and Forcepoint.

“I’m very excited for John and Todd to join Menlo in these two key roles. I’m confident their leadership experience will help us continue our rapid growth, building Menlo into a global leader by fostering long lasting relationships with our customers and partners,” said Amir Ben-Efraim, co-founder and CEO of Menlo Security. “I know they will have a huge impact bringing our products to market, enabling more companies to benefit from Menlo’s unique protections against ransomware, malware and Highly Evasive Adaptive Threats (HEAT).”


from Help Net Security https://ift.tt/zbjaXLp

These Are the Three Best Vegetarian Broths

Unless you have an uncreative, uncurious mind, you know that “vegetarian” does not mean “bland.” Sure, bland vegetarian food exists, but have you ever had a baked, under-seasoned chicken breast? Meat doesn’t always equal flavor, particularly when we’re talking about broth.

Chicken broth is good and all, but you usually have to add a few aromatics and seasonings to make it great. With the exception of chickpea broth, these vegetarian broths don’t really need all that much help. Their primary ingredients are so flavorful, you really only need water, and maybe a little salt.

Chickpea broth

If you’re looking for a vegetarian broth that reads as “chicken-y,” this is the one for you. As A.A. Newton has explained previously, it’s golden and savory, but still neutral enough for use in almost any recipe:

You might think it’ll make everything taste like chickpeas, but you’d be wrong—if anything, it tastes surprisingly chicken-y. It’s got all the body you could want too, thanks to the starches in the chickpeas themselves. And with its gorgeous, golden hue, chickpea broth even looks just like good chicken stock. Have you ever bought a box of veggie stock that was murky brown or bright, carroty orange—and tasted like nothing at all? Chickpea broth would never do that to you.

Making chickpea broth is also quite easy:

Stocking up on chickpea broth before the big day is as easy as making a big ol’ pot of dried chickpeas. An overnight soak is completely optional, but if you choose to soak, cook the beans right in that soaking water for the richest possible broth. (The bean experts at Rancho Gordo stand by this technique, and so do I.) Season them however you like—the classic combo of carrot, celery, onion, garlic, and bay leaf is hard to beat...and add 2-3 tablespoons of olive oil per cup of dried beans, then cook until tender...When your chickpeas are done, strain them and reserve every last drop of that sweet, sweet bean juice. Season the broth taste and store in the fridge for 2 weeks, or indefinitely in the freezer.

G/O Media may get a commission

Parmesan broth

Saving parm rinds in the freezer for soups, sauces, and rissoto is a classic no-waste hack, but those cheesy ends can also be used to make a simple two-ingredient broth that is packed with savory glutamates. Like chickpea broth, it’s also not at all challenging to cook up:

All you need is about a cup of cheese rinds. Make sure they’re clean and rinsed off, then toss them into a pot. Cover them with about eight cups of water, and bring it to a boil. Simmer for an hour or two, and you’re done—cook longer to get the level of rich flavor you really want. They even note you can toss in some broth-friendly veggies too if you like, but you don’t have to. When you’re done, let it cool and store it in the fridge for a few weeks, or the freezer for a few months. You can use your new cheese broth in place of chicken or vegetable broth just about anywhere, like in a soup recipe, when you’re making risotto or rice, in a pot of beans, to deglaze a pan, and more.

Garlic broth

I’m a big fan of tossing garlic skins into my scrap broth bag, but this garlic broth recipe from Food52 ups the garlicky intensity by making a stock with two whole heads. All you have to do is peel and roughly chop the cloves, then cover with 12 cups of water. Bring to a boil, let simmer for about an hour, then strain through a fine mesh sieve, pressing the mushy cloves to extract as much flavor as possible. Season with salt to taste and use as you would any stock or broth, or just sip it for a savory treat.

    


from Lifehacker https://ift.tt/eXWFKMk

The Differences Between Just Overeating and a Binge Eating Disorder

Photo: Tero Vesalainen (Shutterstock)

With so much of our culture hyper-focused on what a person eats (and what a person weighs), it can be hard to define what “overeating” actually is—and when that overeating becomes a bigger problem. Do you simply have a big appetite, or are you actually struggling with an eating disorder? Here’s how to decipher the differences between regular overeating and the more serious binge eating disorder.

What is binge eating disorder?

According to the National Eating Disorders Association, binge eating disorder is severe and can be life-threatening but is also treatable. It’s characterized by recurrent episodes of eating large quantities of food. This is typically done very quickly and to the point of feeling uncomfortable. Other characteristics of BED include a feeling of loss of control during the binge and shame or guilt after it. Notably, bulimia involves unhealthy compensatory measures like purging after a binge, while BED does not.

BED is recognized in the DSM-5, but its addition to the diagnostic manual as its own disorder is relatively recent. Prior to 2013, it was considered a subtype of OSFED, or “other specified feeding and eating disorder.” Now, it’s the most common eating disorder in America.

Diagnostic criteria include the following:

  • Eating within a discrete time period an amount of food that is definitely larger than what most people would eat in that time period under similar circumstances
  • A sense of lack of control over eating during the episode
  • Eating more rapidly than normal, eating until feeling uncomfortably full, eating large amounts when not hungry, eating alone because of embarrassment over how much is being consumed, and feeling disgusted, depressed, or guilty afterward (note that three of these must be present for a diagnosis)
  • Marked distress regarding bingeing
  • The binge occurs, on average, at least once a week for three months
  • The binge eating is not associated with inappropriate compensatory behaviors like purging and does not occur exclusively during the course of bulimia nervosa or anorexia nervosa

G/O Media may get a commission

How is binge eating disorder different from overeating?

According to Healthline, BED is a medical condition, and overeating is not. BED is also associated with other psychological symptoms like depression and anxiety.

Another primary difference between the two is the feeling of distress or shame that comes with BED and its related behaviors. If you occasionally overeat, but you don’t feel distressed or guilty about it afterward, it’s unlikely you have BED. Next time you overeat, take note of what is going on. If you are doing it alone to hide your behavior, feeling out of control when it’s happening, and feeling ashamed afterward, you could have BED and should consider talking to a mental health professional.

(Here is how to find a good therapist even if you don’t have insurance, and here are warning signs your child may have BED.)

What can be done about BED?

If you end up with a diagnosis, here’s what you need to know: First, getting the diagnosis is a good thing, as BED can cause health complications like asthma, type 2 diabetes, heart disease, high cholesterol, and high blood pressure in addition to mental health problems like depression and anxiety.

Second, there are treatments available. Typically, people with BED will be treated with some kind of psychotherapy or counseling and there will be a medical or nutritional component, too. To figure out what kind of treatment you need, your mental health professional will consider emotional factors and the severity of your BED. Therapy can help address the underlying causes of the disorder, and medicine can help regulate your eating habits.


from Lifehacker https://ift.tt/5loegNH

Combine Your Love of Art and Fat and Make a Butter Terrine

Both of my younger (identical) sisters are accomplished visual artists, whereas I—in spite of having taken Drawing for Non-Majors during my last semester at the University of Florida—struggle to draw stick figures. This lack of artistic ability extends to cake decorating, or anything that requires fine motor skills. I am, however, fully capable of mashing softened compound butters into a mold to make a visually interesting, if somewhat rustic, butter terrine.

A butter terrine is exactly what it sounds like—butter that has been layered into a mold or loaf pan, chilled, and then served in slices. You can flavor and color the different butters as much or as little as you like, and you can suspend things (like radishes) in the layers to create a stunning, or at least curious, visual effect.

Other than butter, and stuff to put in your butter, you’ll need a mold. I used a vintage Pyrex loaf pan, and lined it with plastic wrap, but a silicone loaf pan or mold would work beautifully, and result in a smoother, unwrinkled exterior (though I think the little squiggles look kind of cool).

About that butter: You’re need a lot of it. I ended up using four whole sticks when filling my 1 1/2-pint Pyrex dish, and it still wasn’t all the way full. You’re also going to want to let it soften completely before attempting to make a compound butter, unless you want a terrine to be punctuated with greasy little butter chunks, completely fucking up the vibe.

The most difficult part of making a butter terrine is choosing your compound butter. I have many suggestions for such, but for the terrine you see above, I kept it very simple, summery, and fresh, and layered basil butter with Meyer lemon butter, then capped it off with a layer of plain butter studded with radishes. (I do wish I had used a few more radishes, but I think it has a kind of neat modern art look, no?)

G/O Media may get a commission

Basil Lemon Butter Terrine

Ingredients:

  • 4 sticks (2 cups) of salted butter, softened and at room temperature
  • 8 basil leaves
  • 2 teaspoons Meyer lemon juice
  • The zest of 1 Meyer lemon
  • 1/2 teaspoon sugar
  • 4-6 radishes, washed with stems and root tap removed

Line a small loaf pan (about 1 1/2 pints in volume) with plastic wrap and set aside. Finely chiffonade the basil leaves, then rotate the cutting board 90 degrees and chop the ribbons into smaller bits. Add to a bowl with one stick of butter and mush and mash until the basil is evenly dispersed. Spread into the loaf pan and smooth the top out as much as you can. Pop it in the fridge while you make the next layer (at least five minutes).

Add the lemon zest, juice, sugar, and another stick of butter to a bowl, and mix until the zest is evenly dispersed, then spread that compound butter on top of the basil compound butter. Return the loaf pan to the fridge for five minutes.

Take the last two sticks of butter and mash them in a bowl until they are spreadable. Spread half of the butter on top of the lemon butter layer, then gently press the radishes into the butter. (I just kind of scattered them around, but those with a more visually-inclined mind could probably do a better job.)

Cover the radishes with the rest of the butter, then set the whole thing in the fridge to chill overnight.

When you’re ready to serve your butter terrine, just lift the whole thing out of the loaf pan by gently tugging on the plastic wrap. Serve with a nice country loaf, or as part of a butter flight.

   


from Lifehacker https://ift.tt/Eednlmk

Should You Lift With Barbells or Dumbbells?

Should You Lift With Barbells or Dumbbells?

Let's break down the major advantages and disadvantages between two of the most popular weight-lifting implements.


from Lifehacker https://ift.tt/7QrNu4c

10 of the Best Dating Shows That Actually Teach You Something About Love

I’m not here to judge reality dating shows. Not even a little. TV trash or TV treasure, that’s all in the eye of the beholder, and sometimes watching pretty people and their drama is, oddly enough, the perfect way to relax. If one s looking for validation in that type of entertainment, it’s entirely fair to suggest that we can learn as much from questionable behavior and poor judgement as we can from watching people make solid life choices.

Still, there are dating shows that try a little harder or, at least, have lessons for us that go beyond “wear sunscreen and bring a lot of condoms.” Sometimes the lessons are, broadly speaking, cultural: People talk about “modern dating” like it’s all one thing, but there are as many variations between queers in the midwest and straights in NYC as there are between singles in Chicago and Seoul. Regions, cultural backgrounds, and even relative neurodivergences all play a part in complicating things (for better and for worse). So it’s instructive to take a look at shows that take a stab at exploring the reasons why dates work, and why they don’t—even between people who are otherwise compatible.


from Lifehacker https://ift.tt/xhHeDpP

Tuesday, August 30, 2022

JavaScript bugs aplenty in Node.js ecosystem – found automatically

How to get the better of bugs in all the possible packages in your supply chain?
from Naked Security https://ift.tt/Ihuroct

How to Recover From a Moral Injury

Photo: fizkes (Shutterstock)

Most of us are familiar with post-traumatic stress disorder, or PTSD, which is triggered by witnessing or experiencing a traumatic event. A person suffering from PTSD will often experience a constellation of mental health symptoms, such as nightmares, flashbacks, severe anxiety, and uncontrollable memories of the incident. As psychologists are starting to discover, though, in addition to PTSD (which relates to feelings of physical safety), people can also develop what is known as “moral injury”—when a person either witnesses or commits actions that go against their personal values and beliefs.

 Soul Console: Healing from Moral Injury. 

What is “moral injury”?

The idea of moral injury was first developed while treating veterans of the Vietnam War, many of whom were dealing with mental distress over actions that they either committed themselves or witnessed others doing, whether it was failing to save the life of another, engaging in or witnessing acts of violence, freezing up during a particularly dangerous moment, or failing to report ethical violations.

Although moral injury was developing in the context of treating war veterans, there are a number of other circumstances in which a person might go through a similar experience if they personally committing an action that goes against their own beliefs; experience a sense of betrayal due to the actions of a loved one, such as a parent or partner; or discover the unethical actions of a previously trusted institution, such as your church or school.

Moral injury is inherently about the loss of trust, whether it’s a loss of trust in yourself, another person, or an institution. “Betrayal is a big part of moral injury,” therapist Michele DeMarco said. “At the core of moral injury, it is very relational.”

G/O Media may get a commission

How can you heal from a moral injury?

There still isn’t consensus on what the best treatment methods are for a moral injury and whether the strategies used for treating PTSD are also applicable. Healing is made more complicated by the fact that people suffering from moral injury tend to withdraw and isolate. “They feel like they are contaminated, or else the world is contaminated, and they need to protect themselves,” DeMarco said.

As DeMarco notes, moral injury has a way of completely upending a person’s understanding of who they are and the world they live in. “Their whole existential positioning gets completely distorted,” DeMarco said. “Ultimately, it’s a loss of innocence.”

Although we still have a lot to learn about the best ways to heal from a moral injury, DeMarco notes that part of the process inevitably has to include coming to terms with the world as you now experience it, which includes that loss of innocence.

“Sometimes it’s learning, with benevolent honesty, that sometimes things in life are just sad, and finding a way to live with that,” DeMarco said.

Another essential aspect of healing is finding ways to connect with others. “Healing very much requires reconnection and bonding,” DeMarco said. Sometimes this will also include evaluating which relationships are essential, and which ones can be let go.

In her own work, DeMarco has also found that writing can offer relief for people suffering from moral injury, as that can be a way to get people to open up, even if only to themselves, about what happened, and what the effect was.

Doing this can help people access “little kernels of truth,” which can then be used to make sense of what happened. As DeMarco puts it, the big question is: “How do I plant these [kernels of truth] in a way that doesn’t keep me in the fetal position, and allows me to grow in a new light?”


from Lifehacker https://ift.tt/wmhS1AR

What Did You Find Cute When Dating but Irritating in a Relationship?

Photo: MDV Edwards (Shutterstock)

At the beginning of a relationship, when your rose-colored glasses are securely in place, a new partner’s quirks are cute. But as the early stages of dating turn into the harsh realities of a serious relationship, certain behaviors go from endearing to downright irritating.

I, for one, have watched countless love interests grow disillusioned with my red hair after it starts to cover every inch of their home. Or I’ve realized that the wildly funny person I’ve been seeing is actually incapable of ever turning off the jokes. Then there are, of course, the litany of noises that go from “cute” to “insufferable” real quick: Constant humming. Clinical snoring. Sneezing one million times in a row.

So now I’m asking you, Lifehacker readers, to share the last time your rose-colored glasses lost their rosy tint. What did you find cute in the early days of dating, only to later find irritating in a relationship?

Did something happen after they began to show their gross side, when certain habits go from cute-gross to gross-gross? Was someone’s easy-going vibe actually frustrating whenever you two had to make a decision? Or perhaps someone’s spontaneity began to morph into recklessness? Or—heaven forbid—does your partner do a baby voice?

know I like to romanticize the idea that as a relationship grows, you only grow fonder of your love’s little quirks. In reality, many of us have at one point uttered the phrase: “Well, I thought it was cute at first...” All too often, what was initially endearing becomes less tolerable in a longterm relationship.

G/O Media may get a commission

Comment below what sorts of things went from cute to irritating over the course of your relationship. Then, I’ll round up the best answers in a separate post next week.

   


from Lifehacker https://ift.tt/F4RDaxp

Google Docs Now Has an Emoji Shortcut

Screenshot: Jake Peterson

Google Docs is embracing the emoji. Back in April, the company added the ability to react to docs with emojis, rather than leave a full comment. Now, Google is expanding its emoji support, adding a quick and easy way to insert emojis into Google Docs without needing to rely on an outside source.

It comes as part of Google’s “insert” shortcut. When you start a new doc, you’ll see “Type @ to insert,” which you might miss if you start typing too quickly. Here, you’ll see a menu of options at your disposal: You can email a draft of the doc to someone, share it with recent Google contacts, bring in other docs, as well as insert typical word processing elements, like links, breaks, and page numbers. But the new addition here is the emoji. If you scroll through the menu, you’ll find the option as the last entry under “Media.” Click it, and you’ll have access to an easy-to-use emoji selection menu. Pick from the preview, or search for something in particular.

You can also pull up this menu from the hidden shortcut on the right side of your document. Hover your mouse over the side parallel to your text, then click on the smiley face.

While this menu is useful, if you already know what emoji you want to use, you can access it faster. Type “@:” and then start typing the name of the emoji. You might be familiar with this type of emoji system if you’re coming from an app like Slack: As you type, you’ll see a selection of emoji that changes depending on the description you type. For example, typing @:laugh brings up the Laughing, Joy, and Rofl emoji options.

If the emoji you want to use is the top option, you can simply hit Enter on your keyboard to insert it into your doc. Otherwise, select one of the other options with your keyboard arrows, then hit Enter when ready.

G/O Media may get a commission

[The Verge]

   


from Lifehacker https://ift.tt/4YjkzKO

There’s No Such Thing As a ‘Normal’ Body Count

A lot like “virginity,” a “body count” is an arbitrary metric used to define a person’s sexual experiences in a rudimentary way, simply referring to how many people someone has had sex with. It has no tangible impact on who you are as a person or how you operate in a relationship. Plus, it’s subjective: Does someone you’ve had oral sex with get added to your body count list? What about anal? What about group sex? If you’re in a foursome but you don’t touch one of the participants, are they still on your list?

It’s a topic designed to shame the sexually active—there’s really no “normal” number.

Rates of sexual activity have decreased

A study published by the Journal of the American Medical Association’s in 2020 found that sexual inactivity increased among American men and women between the ages of 25 and 34 from 2000 to 2018. That tracks with recent findings suggesting that Gen Z is also more hesitant about hookups than preceding generations.

If you’ve wondered whether your body count is “too low,” these findings are for you. From concerns about the future of access to reproductive healthcare like birth control and abortion to lingering effects of the pandemic and its lockdowns, there are plenty of reasons people are banging less. Plus, some people just aren’t—and never have been—into casual hookup culture. If you’re concerned you’re not experienced enough for a more experienced partner, have an open conversation with them about what you perceive as your lack of experience. You might be surprised how enthusiastic they are to show you the ropes.

The average rates of sexual partners varies a lot

In spite of what you might see on Twitter or Reddit, there is no “acceptable” number of lifetime sexual partners. That hasn’t stopped all manner of researchers from trying to pinpoint a number, anyway.

For instance, U.K.-based health retailer Superdrug conducted a survey of about 2,000 Americans and Europeans in 2019, finding that women, on average, had seven partners in their lifetime and men had 6.4. Both genders agreed that about 7.5 was the optimal number for a single person. That same survey, though, pointed out how relative those numbers are: Louisiana residents reported an average of 15.7 lifetime partners, but residents of Utah reported about 2.6.

People are so curious about the average body count that even the Centers for Disease Control and Prevention has waded into the discourse. The CDC’s latest data says that stateside, the median number for women is 4.3, and for men, it’s 6.3. Per the organization, these numbers account for respondents who’ve had “vaginal, oral, or anal sex with a partner of the opposite sex,” so they’re heteronormative but inclusive of more than just penis-in-vagina intercourse.

The CDC’s data also shows that 12.9% of women between 25 and 49 and 28.3% of men in that age range have had 15 or more partners, while 17.7% of women and 11.2% of men in that age range have had just one—so there’s more room for variation than the 4.3 and 6.3 might lead you to believe.

What does this mean for you and your relationship?

Body counts do not matter and, for the most part, they’re pretty sexist. While it’s clear from the data above that men tend to have higher counts than women, it’s women who are routinely shamed for this arbitrary number. On forums like Reddit, for instance, posts about body counts are framed with questions like, “Does a woman’s body count actually matter to men?” and “Should a woman’s body count be a dealbreaker?” The cultural pearl-clutching around women’s body counts in particular is part of the same misguided nonsense as concerns that sex “changes” a woman’s body or otherwise alters her. We already know that the tightness of a vagina is not related to how much PIV sex its owner has had, but even if it were, body counts are irrelevant: Someone with a count of 50 one-time partners would still have had less sex than someone whose body count was just one, but had sex with their partner every three nights over the course of a year.

Luckily, if you look into most of the Reddit threads referenced above, you’ll also find some reasonable answers. While commenters agree body counts “matter” culturally, they also agree “it mostly boils down to insecurity.”

In a thread where a man lamented learning his girlfriend had been with about 300 people before him, one person wrote, “You’ve got to be a grown up and realize that ABSOLUTELY NO ONE’S PAST IS ABOUT YOU, and here’s another thing, YOU DON’T OWN PEOPLE.” While some commenters point out the number is none of a current partner’s business, it is still fair to consider that beyond being a potentially sexist and definitely arbitrary measure of someone’s worth or experience, some people may see a higher body count as a risk when it comes to sexually-transmitted infections. (That Superdrug survey pointed out that Louisiana had not only the highest average number of partners, but that STI rates were higher than the average, too.)

As always, get tested regularly and be open and honest with your partner about your expectations for condom use and health history. You shouldn’t lie about your body count and if you’re in a situation where you feel like you have to in order to keep being respected by your partner, that may speak volumes about your relationship.


from Lifehacker https://ift.tt/ohfkby5

Monday, August 29, 2022

The Easiest Way to Fix Bluetooth Issues on Your Mac

Photo: Dontree_M (Shutterstock)

Bluetooth is as fantastic as it is finicky. It enables our devices to communicate with each other wirelessly, empowering us to both walk away from our computers while still listening to music, or type on our keyboards without worrying about wires. But it isn’t perfect, and it isn’t perfect often. If your experience is like mine, your Bluetooth devices fail to work properly on your Mac on a frequent enough basis that it’s a pain in the ass. Luckily, there’s a quick—albeit hidden—fix that can help in a pinch.

First, have you turned it on and off again?

It’s a cliché for a reason. Turning your Bluetooth device on and off again is sometimes all the troubleshooting you need to flush out a weird issue. On Mac peripherals, like your keyboard, trackpad, or mouse, there’s an obvious power switch. On devices without an obvious on/off button, like AirPods, placing the device back in its charging case and taking them out again can achieve the same.

Don’t forget about your Mac itself. Shutting down your computer and turning it back on can solve Bluetooth issues, too. If a power cycle doesn’t fix things, sometimes unpairing your devices from your Mac and setting them up as new can jostle things back into place. We have a guide on resetting your AirPods in such a case.

However, you might not need to go through the annoying process of unpairing and re-paring Bluetooth devices to your Mac, nor do you need another article telling you to turn your devices off and on again, do you? Instead, here’s another reset option Apple doesn’t tend to advertise, similar to the Mac’s secret reset buttons.

G/O Media may get a commission

Comfy classics
These quirky clogs are obviously here to stay—and with their 360 degree flexibility, there’s no denying their comfort. Might as well buy two of ‘em!

Reset the Bluetooth module

Resetting your Mac’s Bluetooth module might be the solution to your nagging Bluetooth issue. This reset is like an on/off switch for the part of your Mac that handles Bluetooth connections. If there’s something wrong with it, a reset will restore it to working order, (hopefully) allowing your devices to communicate clearly with your Mac.

The only thing to remember with this strategy is it will knock out all Bluetooth connections momentarily. That means, if you rely on a wireless keyboard and mouse to use your Mac, you won’t be able to do anything until Bluetooth comes back online. It’s usually back within seconds, but don’t try this option until you know you won’t need to use your Mac for a minute.

In the past, this trick worked the same on all Macs. But Apple recently changed things up with last year’s macOS Monterey.

How to reset the Bluetooth module in macOS Monterey and later

To reset the Bluetooth module on a Mac running macOS 12 Monterey or macOS 13 Ventura, open Terminal. Next, copy and paste sudo pkill bluetoothd into the Terminal window, then hit Enter on your keyboard. Enter your password when prompted, hit Enter again, then restart your Mac. When your Mac boots back up, the Bluetooth module will be reset.

How to reset the Bluetooth module in macOS Big Sur and earlier

For those of us rocking Macs pre-Monterey, there’s a simpler way to reset the Bluetooth module. To start, hold down Shift + Option on your keyboard, then click the Bluetooth icon in your menu bar. You’ll see a host of hidden options that aren’t normally present in this menu; bring your mouse to Debug. When the menu expands, choose Reset the Bluetooth module, then restart your computer.

   


from Lifehacker https://ift.tt/AoEl8Fw

Never Go Camping Without These Things

Photo: anatoliy_gleb (Shutterstock)

If you’re an outdoorsy kind of person, nothing beats camping, whether you’re enjoying the light luxuries of an RV or truly roughing it in a tent. While communing with nature is a blast, there’s a reason humans have spent millennia trying to tame it and coming up with advancements that make interactions with the elements an optional, recreational activity instead of a necessity: The outdoors can be a little uncomfortable at best, and dangerous at worst.

Here are some things you should pack to make your next camping trip more fun, relaxing, and safe.

Pack a tarp

When it’s time to lie down, a tent and blanket alone are not enough. Lifehacker staff writer Meredith Dietz suggested also packing tarps. These pull double duty, better protecting your body from any pointy rocks and creepy crawlers underneath you, and protecting your food or possessions from the elements, animals, and even other campers.

Bring an inflatable solar lantern

You’re probably already packing flashlights, as well as candles and matches, but light is extremely necessary—especially if you’re setting up camp someplace you’ve never been before. This tip comes from Lifehacker video producer Jordan Hicks: Solar lanterns charge during the day, using the sun’s rays, so you don’t need to be paranoid about your battery-packing. An inflatable solar lantern, like this one, is collapsable, waterproof, and bright, giving off light for up to 24 hours.

G/O Media may get a commission

Comfy classics
These quirky clogs are obviously here to stay—and with their 360 degree flexibility, there’s no denying their comfort. Might as well buy two of ‘em!

Include a personal water filter

Personal water filters are also a must, according to Hicks. Even a personal straw filter, like the LifeStraw, will do the trick. You should, of course, be packing as much drinkable water as possible, but in the event you run out or find yourself without it, a device to protect you from bacteria, parasites, and microplastics can help you stave off dehydration and get back to a safer spot.

Load up on walkie talkies

Even if you select a spot with decent cell service, it’s smart to have walkie talkies for everyone in your group in case you get separated or find yourself with worse service than you expected. Sure, it’s 2022, so you might not even have walkies talkies lying around, but these things come at a variety of price points. Check out this highly rated set for around $30 or these for about $150.

Bring a multitool

It’s hard to anticipate what you’ll encounter when you go camping, but even if you’re planning to just use a firestarter and lounge around reading a book, you might be surprised at some of the issues you’ll encounter when you’re miles from the nearest store. Your best bet is a multi-tool, like this 14-in-one bad boy, which comes with a long nose pliers, round nose pliers, cutting pliers, various knives and screwdrivers, and a bottle opener. You can’t predict all the issues you’ll run into, but for about $20, you can at least stock up on tools to help you tackle them. Thank Lifehacker senior health editor Beth Swarecki for this one.

Some other essentials

In addition to these ideas, here are more of the basics you need for your camping trip, according to safety organization SureFire CPR:

  • Flashlights
  • Batteries
  • Trash bags for garbage, so animals are more likely to stay away from your site
  • Bug spray
  • Extra water
  • First aid
  • Matches (and lighters)
  • A compass
  • Sunscreen, a sun hat, sunglasses, and long-sleeved shirts
  • Heavy-duty tape
  • A whistle
  • Extra clothing

from Lifehacker https://ift.tt/KM3VB1J

How to Pick Out the Best Produce

How to Pick Out the Best Produce

We visited the Union Square Greenmarket to hunt down the freshest fruits and veggies.


from Lifehacker https://ift.tt/3OMBrj1

10 Renovations That Can Actually Decrease the Value of Your Home

Photo: RossHelen (Shutterstock)

Having something like a sound system, theater projector, or smart home features installed in your home can seem luxurious and useful. Instead of having wires running everywhere, it’s all neatly hidden away, and access to inputs and controls is convenient and easy. And a “smart home” can feel very modern while offering real benefits in terms of efficiency and control over your environment.

The problem is that potential buyers may not have the same needs as you, and electronics baked into the walls of the home might be wasted on them, or might become outdated over time, becoming not just an eyesore, but an eyesore that doesn’t even work well. In other words, built-in electronics can appear as future bills to house-hunters, because they immediately estimate how much it will cost them to remove and/or upgrade them.


from Lifehacker https://ift.tt/6bK38ZV

LastPass source code breach – do we still recommend password managers?

What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?
from Naked Security https://ift.tt/t2h1rDg

Raw Eggs Aren't the Only Reason You Shouldn't Eat Cookie Dough

All cookie dough is edible if you’re not a coward, but sometimes being a little bit of a coward pays off. Being sick, particularly the kind of sickness that comes from being poisoned by food, is never fun, and raw cookie dough can make you quite sick, even if it is quite rare.

Most people assume eggs are the culprit, and they sometimes are (though it’s pretty rare), but no one ever expects the flour, which could also potentially cause trouble. According to the FDA, it’s not Salmonella you have to worry about, but E. coli (because of animal poop):

“Flour is derived from a grain that comes directly from the field and typically is not treated to kill bacteria,” says Leslie Smoot, Ph.D., a senior advisor in FDA’s Office of Food Safety and a specialist in the microbiological safety of processed foods. So if an animal heeds the call of nature in the field, bacteria from the animal waste could contaminate the grain, which is then harvested and milled into flour.

Common “kill steps” applied during food preparation and/or processing (so-called because they kill bacteria that cause infections) include boiling, baking, roasting, microwaving, and frying. But with raw dough, no kill step has been used.

This is important to know because, for some reason, a few “edible” cookie dough recipes list raw flour as one of the ingredients. I won’t tell fully grown adults what to put their bodies—eat untreated mouse poop if you must—but I would not feed it to the children, the elderly, or the immunocompromised.

How to make truly safe, edible cookie dough

Luckily, you can make truly safe cookie dough, you just need to pasteurize your eggs and flour. For the eggs, you’ll need an immersion circulator. Just put them in a water bath set to 135℉ for 75 minutes, then use them in your recipe like you usually would.

G/O Media may get a commission

Comfy classics
These quirky clogs are obviously here to stay—and with their 360 degree flexibility, there’s no denying their comfort. Might as well buy two of ‘em!

To kill potential E. coli bacteria in your flour, you just need to nuke it. Place it in a large, microwave-safe bowl, and microwave in 30-second intervals, stirring in between each blast, until it reaches 165℉ on an instant-read thermometer. Let cool, then use as usual. (Or you could bypass all that and use graham crackers instead. Graham crackers are famously free of mouse poop.)

   


from Lifehacker https://ift.tt/6urfFGh

Resecurity partners with ECOMIL SAS to improve cybersecurity for Colombian organizations

Resecurity announced its partnership with ECOMIL SAS to expand Resecurity’s AI-driven cybersecurity solutions and threat intelligence services to Colombia.

Resecurity

Based in Bogotá, Colombia, ECOMIL SAS provides cybersecurity, IT management and networking solutions to enterprise and government customers in Colombia.

Colombia is rapidly transforming to a digital economy, where remote work has exploded 400% post pandemic. The transition to a digital economy has increased the threat of cyber-attacks, which increased 59% in the first half of 2020 alone.

The uptick in cyber-attacks have increased the need for cyber security services in Colombia. To accelerate the adoption of AI-powered cybersecurity solutions, Resecurity is partnering with ECOMIL SAS to provide managed threat detection and response to Colombian organizations, along with tailored solutions oriented on needs of law enforcement, government agencies, aerospace and defense (A&D).

“We are thrilled to partner with ECOMIL and to join forces to deliver our solutions across all market verticals in Colombia” – said Gene Yoo, CEO of Resecurity, Inc.

“Partnership with Resecurity will positively impact on Colombian cybersecurity market, and will enable delivery of cutting-edge solutions to protect critical sectors of economy” – Edgar Ernesto Hernandez, CEO of Ecomil SAS.

Resecurity’s innovative cybersecurity solutions allow organizations to automate the identification, assessment, and triage of possible cyber threats while staying ahead of cybercriminals using advanced tactics to attack organizations at scale.

The AI-driven platform allows administrators to reduce potential blind spots and security gaps by quickly seeing in-depth analysis and specific artifacts obtained through the Dark Web, botnets activity, network intelligence, and high-quality threat intelligence.


from Help Net Security https://ift.tt/fEbKGN9

Data security hinges on clear policies and automated enforcement

In 2003, California became the first U.S. state to require and implement a series of data breach notification laws designed to protect against the misuse of residents’ personal information. The more recently enacted California Consumer Protection Act (CCPA) provides two main benefits: it allows consumers, as individuals or a class, to sue businesses when their personal information is disclosed without their authorization, and it provides a statute that prevents anyone who does business in the state from sweeping a data breach under the rug.

modern data security

In the two decades since, the conversation around data protection, security, and privacy has ballooned. As a result, businesses of all sizes and across industries now take extra precautions to protect their employee and customer data.

Similar protective measures also exist outside of the United States. Countries around the world are realizing that with the amount of data at our disposal, data privacy regulations are paramount to keeping customers and employees safe and organizations protected. The financial services industry is a great example of why.

For FINRA (the Financial Industry Regulatory Authority), whose mission is to safeguard financial markets, the ability to store data in the cloud (instead of on-prem) proved to be beneficial. But how did FINRA manage the data once it entered the cloud?

“Pretty soon after getting into the cloud, our security group started to say that the security posture could very well be better in the cloud than we had in our data center,” said Aaron Carreras, Vice President of Data Management and Transparency Services Technology at FINRA. Their role as an oversight organization meant their ability to segment and access data was key. With proper tooling for cloud, they were able to find comfort in knowing their sensitive data would remain private and secure.

Data privacy is essential to modern data security

Developments in emerging technologies, data privacy, cybersecurity, and digital assets are proving to be beneficial for organizations. Yet, given the level of sensitive and confidential data held and maintained, companies need to be locked in on how to advance their policy priorities and stay up to speed on the debates that impact their businesses and markets. After all, no organization wants to go through the headache of dealing with reputational and/or financial damage, or other common side effects of a malicious or even unintentional data breach. Put simply, data privacy is an essential component of modern data security.

Dissecting the components of modern data security

For many, the easiest way to think about securing data is the practice of assigning policies to secure a company’s assets and prepare the organization against a potential attack. The way in which policies are designed can range from classification and handling of data to credentials management and network access.

Because incidents aren’t tied to one specific cause, it’s important for organizations to think about:

  • The classifications of data they hold
  • The combinations and permutations of who gets access to what, and
  • What it means if sensitive data are hacked and released.

The key is to establish policy guardrails for internal use to minimize cyber risk and maximize the value of the data.

Once policies are established, the next consideration is establishing continuous oversight. This component is difficult if the aim is to build human oversight teams, because combining people, processes, and technology is cumbersome, expensive, and not 100% reliable. Training people to manually combat all these issues is not only hard but requires a significant investment over time.

As a result, organizations are looking to technology to provide long-term, scalable, and automated policies to govern data access and adhere to compliance and regulatory requirements. They are also leveraging these modern software approaches to ensure privacy without forcing analysts or data scientists to “take a number” and wait for IT when they need access to data for a specific project or even everyday business use.

With a focus on establishing policies and deciding who gets to see/access what data and how it is used, organizations gain visibility into and control over appropriate data access without the risk of overexposure. The reliance on data privacy may at first glance appear daunting and tedious, but with clear policies and automated enforcement, data is governed and protected with little to no extra effort.

Looking forward

With all these challenges to ensure the proper protection of personally identifiable information (PII) and with the growing number of global mandates designed to ensure privacy, organizations need to get ahead of the problem.

Without a doubt, when it comes to protecting and keeping track of the volumes of data, along with who can see and use it, protecting PII will always be challenging. For some, these issues can be mitigated by prioritizing data cataloging and classification, a focal point called out in the EDM Council’s Cloud Data Management Capabilities Framework. With data expanding in type and volume each day, companies will need to keep proactive data access governance at the top of their priority lists.


from Help Net Security https://ift.tt/0wY1p8z

Sunday, August 28, 2022

The complexity of modern aircraft cybersecurity

Modern aircraft are more connected now than they ever have been. The results have been rewards like faster flight turnarounds, greater fuel efficiency, and more comfortable and enjoyable passenger experiences. Underpinning all of this technology, however, is operational technology: the digital components inside aircraft that allow the sensors and actuators inside of them to interact with one another and fly passengers safely. This operational technology was designed in an era with safety and reliability at … More

The post The complexity of modern aircraft cybersecurity appeared first on Help Net Security.


from Help Net Security https://ift.tt/ApS7g51

Creating cyber career opportunities during the talent shortage

With roughly 700,000 cybersecurity positions open, businesses across America are feeling the direct impact of the cyber talent shortage. As ransomware attacks and data breaches continue to make headlines, it’s clear that threat actors aren’t backing off, and employees are now holding down the line in the face of cyberattacks. In this Help Net Security video, Mark Manglicmot, SVP of Security Services at Arctic Wolf, talks about creating cyber career opportunities during the talent shortage.

The post Creating cyber career opportunities during the talent shortage appeared first on Help Net Security.


from Help Net Security https://ift.tt/31woUZp

Attackers changing targets from large hospitals to specialty clinics

Critical Insight announced the release of the firm’s H1 2022 Healthcare Data Breach Report, which analyzes ​​breach data reported to the United States Department of Health and Human Services by healthcare organizations.

data breach healthcare organizations

With the healthcare industry continuing to be a top attack vector for cybercriminals and ransomware threat groups, H1 2022 saw an interesting change in targets as attackers moved from large hospital systems and payers, big targets that would likely yield the most data but also have more sophisticated defenses, to smaller hospital systems and specialty clinics that lack the same level of security preparedness, staff size, or budget.

Aside from this change in victim focus, attackers this half of the year hit the jackpot, with the Eye Care Leaders EMR breach, which exposed more than 2 million records. This trend of focusing on a systemic technology that is used across most healthcare providers is a trend we anticipate continuing throughout the remainder of 2022.

Healthcare organizations data breach trends

Total breaches are declining: The number of reported breaches crested during the second half of 2020 when organizations were so distracted by the pandemic that attackers had an easier time breaching their defenses. Since then, the total number of breaches has slowly, but steadily declined, from the peak of 393 to 367 in the first half of 2021, 344 in the second half of 2021, and 324 in the first half of this year.

Total individuals affected: The latest numbers are encouraging with roughly 20 million individuals affected in the first half of 2022, representing the third consecutive quarter of declining numbers, a 10% drop compared to the prior six-month period and 28% less than the first half of 2021.

Who is getting breached?: Healthcare providers represent 73% of total breaches, business associates represent 15%, and health plans 12%. The interesting trend is that breaches associated with healthcare providers dropped from 269 in the first half of 2021 to 238 in the first half of 2022.

Most common breach causes: Hacks associated with network servers declined from a peak of 67% in the first half of 2021 to 57% in the first half of 2022. But EMR-related breaches soared from zero in the first half of 2020 to nearly 8% of all breaches in the first half of 2022.

One thing we’re watching: When we look at which segments of the healthcare ecosystem had Hacking/IT Incident type breaches, we’re now seeing smaller hospital systems and specialty clinics rising to the top. Breaches associated with health plans decreased by 53%, but attacks against business associates jumped by 10% and attacks against providers went up 15%.

“Attackers are continuing to push the envelope and change the playing field when it comes to healthcare data breaches and attacks,” said John Delano, Healthcare Cybersecurity Strategist at Critical Insight and VP at Christus Health.

“This move from large hospital systems and payers to smaller entities that truly have a deficit when it comes to cyber defenses, shows a massive change in victims and approach. As we continue into 2022, we anticipate attackers to continue to focus on these smaller entities for ease of attack, but also for evasion of media attention and escalation with law enforcement.”


from Help Net Security https://ift.tt/nEOmyZs

Rise in IoT vulnerability disclosures, up 57%

Vulnerability disclosures impacting IoT devices increased by 57% in the first half (1H) of 2022 compared to the previous six months, according to a research by Claroty.

vulnerability disclosures IoT devices

The report also found that over the same time period, vendor self-disclosures increased by 69%, becoming more prolific reporters than independent research outfits for the first time, and fully or partially remediated firmware vulnerabilities increased by 79%, a notable improvement given the relative challenges in patching firmware versus software vulnerabilities.

The report is an examination and analysis of vulnerabilities impacting the Extended Internet of Things (XIoT), a vast network of cyber-physical systems including operational technology and industrial control systems (OT/ICS), Internet of Medical Things (IoMT), building management systems, and enterprise IoT. The data set comprises vulnerabilities discovered by Team82 and from trusted open sources including the National Vulnerability Database (NVD), the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), CERT@VDE, MITRE, and industrial automation vendors Schneider Electric and Siemens.

Key findings

IoT devices: 15% of vulnerabilities were found in IoT devices, a significant increase from 9% in Team82’s last report covering the second half (2H) of 2021. Additionally, for the first time, the combination of IoT and IoMT vulnerabilities (18.2%) exceeded IT vulnerabilities (16.5%). This indicates enhanced understanding on the part of vendors and researchers to secure these connected devices as they can be a gateway to deeper network penetration.

Vendor self-disclosures: For the first time, vendor self-disclosures (29%) have surpassed independent research outfits (19%) as the second most prolific vulnerability reporters, after third-party security companies (45%). The 214 published CVEs almost doubles the total in Team82’s 2H 2021 report of 127. This indicates that more OT, IoT, and IoMT vendors are establishing vulnerability disclosure programs and dedicating more resources to examining the security and safety of their products than ever before.

Firmware: Published firmware vulnerabilities were nearly on par with software vulnerabilities (46% and 48% respectively), a huge jump from the 2H 2021 report when there was almost a 2:1 disparity between software (62%) and firmware (37%).

The report also revealed a significant increase in fully or partially remediated firmware vulnerabilities (40% in 1H 2022, up from 21% in 2H 2021), which is notable given the relative challenges in patching firmware due to longer update cycles and infrequent maintenance windows. This indicates researchers’ growing interest in safeguarding devices at lower levels of the Purdue Model, which are more directly connected to the process itself and thus a more attractive target for attackers.

Volume and criticality: On average, XIoT vulnerabilities are being published and addressed at a rate of 125 per month, reaching a total of 747 in 1H 2022. The vast majority have CVSS scores of either critical (19%) or high severity (46%).

Impacts: 71% have a high impact on system and device availability, the impact metric most applicable to XIoT devices. The leading potential impact is unauthorized remote code or command execution (prevalent in 54% of vulnerabilities), followed by denial-of-service conditions (crash, exit, or restart) at 43%.

Mitigations: The top mitigation step is network segmentation (recommended in 45% of vulnerability disclosures), followed by secure remote access (38%) and ransomware, phishing, and spam protection (15%).


from Help Net Security https://ift.tt/bZerUiw

How to Clean Your Vacuum

Photo: Ireshetnikov54 (Shutterstock)

Most of our household appliances—including the ones we use to clean our homes—need some kind of maintenance, and vacuums are no exception. And unfortunately, it involves more than simply emptying the bag or canister when it’s completely full.

Considering all the dirt, dust, and grime that passes through your vacuum each time you use it, it makes sense that even the most modern vacuums need to be cleaned on occasion in order to function properly. Here’s what to know.

How to clean a vacuum

When cleaning a vacuum or any other appliance, it’s best to refer back to the manufacturer’s instructions to ensure you don’t do anything to make things even worse. Even if you threw the instructions out years ago, you should be able to find them—or a full owner’s manual—with a quick online search.

Today, we’re going to focus on cleaning stick vacuums with a canister (as opposed to those that use bags, or are robots). Here’s a basic overview of what to do:

  1. Disconnect the vacuum from its power source (i.e. unplug it, remove the battery pack, etc)
  1. Empty the canister, then wipe it out with a dry cloth or paper towel
  2. Remove any attachments—including any extenders, like the stick or a flexible tube
  3. Using a pair of scissors, cut the hair, string, and thread caught in the main rotating brush, as well as any attachments with smaller brushes—being careful not to cut the bristles on the brush itself
  4. Use a household brush, an old comb, and/or tweezers to remove hairs and other fibers stuck in or around other attachments
  5. Remove and empty any lint traps or reusable filters in the vacuum
  6. Finish taking the vacuum apart (if you haven’t already), detaching everything from the motorized component
  7. Fill a tub or basin with warm, soapy water (dishwashing liquid works), and wash each piece of the vacuum (without the motor or any electrical components) using sponges, brushes or other cleaning tools as necessary
  8. Rinse each piece in clean, warm water
  9. Set the pieces of the vacuum on a towel for several hours, or as long as it takes for them to air dry completely
  10. Wipe down the vacuum’s exterior, which probably got even dirtier while you cleaned the inside

G/O Media may get a commission

Magnetically Docking

Mode Electric Toothbrush

Luxury brushing
Mode is the first magnetically charging toothbrush, and rotates to dock in any outlet. The brushing experience is as luxurious as it looks—with soft, tapered bristles and a two-minute timer to be confident you reached all the crevices of your molars.

After that, reassemble your vacuum, and marvel at how much better it works.


from Lifehacker https://ift.tt/6RTjaS7

How to Tell If Your At-Home COVID Test Really Expired

Photo: Daisy Daisy (Shutterstock)

At this point in the ongoing COVID-19 pandemic, at-home rapid antigen tests are one of the key tools at our disposal when it comes to stopping the spread of the virus. And though it’s been less than a year since these tests were scarce and expensive, they’ve now become fixtures in most of our medicine cabinets.

In the past, we’ve discussed how to order these tests for free from the U.S. government, as well as how to properly store them so you don’t inadvertently make them less effective. Now, it’s time to talk about their expiration dates—more specifically, that the ones printed on the boxes of at-home COVID tests may no longer be accurate. Here’s what to know.

When do at-home COVID tests expire?

As you may have noticed, there is an expiration date printed on the box of every FDA-approved at-home COVID test (or on a sticker that’s on the box). The precise location differs from brand-to-brand.

Currently, the U.S. Food and Drug Administration (FDA) has approved 22 rapid antigen COVID-19 tests for at-home use (the full list can be found on their website, in alphabetical order). Along with information on the manufacturer, type of test, and who is authorized to use it, the FDA also lists the length of its shelf life—which, depending on the test, is anywhere from four to 18 months.

How to check the expiration date on your at-home COVID test

Initially, most expiration dates were based on the tests having an estimated shelf-life of four to six months. But now that the tests have been around for a longer period of time, the FDA’s ongoing research is demonstrating that many remain accurate and effective beyond their original expiration date.

G/O Media may get a commission

Magnetically Docking

Mode Electric Toothbrush

Luxury brushing
Mode is the first magnetically charging toothbrush, and rotates to dock in any outlet. The brushing experience is as luxurious as it looks—with soft, tapered bristles and a two-minute timer to be confident you reached all the crevices of your molars.

As of today, the FDA has extended the expiration dates on 12 out of their 22 approved self-tests. To find the most up-to-date expiration dates for the ones you have at home, consult this table on the FDA website. The column all the way on the right provides information on the shelf-life of the test—including whether it has been extended, and for how long.

If yours is among those with an extended shelf-life, click the link below to look up the new expiration date, using your test’s lot number. (Here’s an example of what that looks like.)

If the FDA table doesn’t indicate that the expiration dates on your tests have been extended, continue to use them as directed.


from Lifehacker https://ift.tt/kKqhDRl

The Meanings Behind Common Real Estate Terms

Photo: Feng Yu (Shutterstock)

Previously, we explained the difference between a half-bath and a full-bath, and other toilet-related math, along with why you may start seeing listings referring to the “primary” (rather than the “master”) bedroom. But when it comes to the terms in real estate listings, those are only the beginning.

Here’s a breakdown of some of the other common words, phrases, and acronyms you may come across while scouring listings for your new home (or doing some escapist browsing of properties you could never afford).

Meanings of common real estate terms and acronyms

If you find yourself skipping over the jargon in real estate listings, you could be missing out on some crucial information about the property. Here are a few definitions that could help:

  1. As-is: The home needs repairs and/or renovations that the seller will not complete before or as part of the sale
  2. Comps: Homes/properties that have recently sold, and are comparable to one that is currently on the market in terms of location, size, and type; helps realtors/buyers set the asking price of a home
  1. Contingency: A condition that must be met before the sale of the property is finalized; common examples include a home inspection, appraisal, and financing
  2. DOM: Days on the market; if a property is taking longer than usual to sell, it may be considered a stale listing
  3. EMD: Earnest money deposit; typically goes toward the down payment and closing costs
  4. FSBO: For sale by owner (i.e. no realtor is involved in the sale)
  5. Handyman special: The home needs some work, the extent of which can range from major structural repairs and/or a total gut, or more minor, cosmetic updates
  6. Market value: The price that a buyer is willing to pay and a seller is willing to accept on the open market; the going rate for a home/property, given its location, size, condition, and supply and demand at a particular time
  7. MLS: Multiple listing service; a database accessible to realtors (not the general public) with listings in a particular area
  8. Serious buyers only: Only arrange a viewing if you are genuinely interested in purchasing the property
  9. Stale listing: A property that has been on the market longer than expected; buyers may interpret as there being something wrong with the home
  10. Turnkey: The home is move-in-ready (though the buyer may want to make cosmetic changes)

from Lifehacker https://ift.tt/8E9e0YS

Week in review: RCE bug in GitLab patched, phishing PyPI users, Escanor malware in MS Office docs

OPIS

Thoma Bravo: Securing digital identities has become a major priority
In this Help Net Security interview, Andrew Almeida, Partner on the Flagship team at Thoma Bravo, talks about the firm’s recent acquisition of SailPoint, and about innovation in the enterprise identity space.

Critical RCE bug in GitLab patched, update ASAP! (CVE-2022-2884)
GitLab has fixed a remote code execution vulnerability (CVE-2022-2884) affecting the Community and the Enterprise Edition of its DevOps platform, and has urged admins to upgrade their GitLab instances immediately.

Fake DDoS protection pages are delivering malware!
Malware peddlers are exploiting users’ familiarity with and inherent trust in DDoS protection pages to make them download and run malware on their computer, Sucuri researchers have warned.

How attackers use and abuse Microsoft MFA
Microsoft has been pushing for the use of multi-factor authentication (MFA) to thwart attackers for many years.

Phishing PyPI users: Attackers compromise legitimate projects to push malware
PyPI, the official third-party software repository for Python packages, is warning about a phishing campaign targeting its users.

7 open-source malware analysis tools you should try out
Performing static analysis of a malicious binary means concentrating on analyizing its code without executing it. This type of analysis may reveal to malware analysts not only what the malware does, but also its developer’s future intentions (e.g., currently unfinished functionalities).

How CISOs can safeguard security in CI/CD environments
Security is a product pillar these days, given the dire consequences of data breaches. Organizations must marry security with agile DevOps releases.

Escanor malware delivered in weaponized Microsoft Office documents
Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, identified a new RAT (Remote Administration Tool) advertised in Dark Web and Telegram called Escanor.

Disk wiping malware knows no borders
Fortinet announced the latest semiannual FortiGuard Labs Global Threat Landscape Report which revealed that ransomware threat continues to adapt with more variants enabled by Ransomware-as-a-Service (RaaS).

What type of fraud enables attackers to make a living?
In this Help Net Security video, David Senecal, VP of Architecture and Research at Arkose Labs, talks about the economics involved in online fraud attacks, and illustrates what type of fraud enables attackers to make a living.

DDoS attacks jump 203%, patriotic hacktivism surges
Radware released a report revealing that the number of malicious DDoS attacks climbed by 203% compared to the first six months of 2021.

DDoS tales from the SOC
In this Help Net Security video, Bryant Rump, Principal Security Architect at Neustar Security Services, talks about the challenges of mitigating immense DDoS attacks.

How vulnerable supply chains threaten cloud security
Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their overall security strategy to the evolving landscape, according to a Proofpoint study released in collaboration with The Cloud Security Alliance (CSA) reveals.

A closer look at identity crimes committed against individuals
In this Help Net Security video, James E. Lee, Chief Operating Officer of the Identity Theft Resource Center, discusses the 2021 Trends in Identity Report, which looks at the trends in identity based on information from the victims that contact the ITRC.

Organizations changing cyber strategy in response to nation-state attacks
66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been either directly targeted or impacted by a nation-state cyber attack, according to Venafi.

What businesses can do to anticipate and mitigate ransomware threats
In this Help Net Security video, Kevin Holvoet, Cyber Threat Intelligence Instructor, SANS Institute, discusses ransomware and Ransomware as a Service (Raas) attacks, and illustrates how preparedness with a proper top-down response is critical for business continuity in case of an attack.

API security incidents occur at least once a month
Postman released the results of its 2022 State of the API Report, which surveyed more than 37,000 developers and API professionals on a range of topics, including their organizations’ priorities, how they get their work done, and where they see the industry going.

CISOs see little need for a point solution to cover ransomware risk
In this Help Net Security video, Sara Behar from YL Ventures talks about how CISOs see little need for a point solution to cover ransomware risk, believing instead in utilizing a full security stack for a multi-layered approach that addresses many security concerns at once.

Ransomware dominates the threat landscape
Acronis researchers have concluded that ransomware continues to be the number one threat to large and medium-sized businesses, including government organizations.

New social engineering tactics discovered in the wild
In this Help Net Security video, Otavio Freire, President and CTO at SafeGuard Cyber, offers insight on new social engineering tactics discovered in the wild, and illustrates how phishing attacks are changing, including how they’re evolving beyond email.

How to navigate payment regulations without compromising customer experience
In this Help Net Security video, Chris Federspiel, CEO of Blackthorn, discusses how to provide customers with a secure experience and how businesses can promote compliance in the payments ecosystem despite the regulatory environment.

We need to think about ransomware differently
In this Help Net Security video, David Mahdi, Chief Strategy Officer & CISO Advisory at Sectigo, talks about how ransomware isn’t solely a malware problem, bad actors want access to your data, so it really is a data security and access problem.

How complicated access management protocols have impacted cloud security
In this Help Net Security video, Tim Prendergast, CEO of strongDM, talks about how technical professionals consistently have to jump through hoops, which could lead to risky workarounds and project delays.

Lean security 101: 3 tips for building your framework
Cobalt, Lazarus, MageCart, Evil, Revil — cybercrime syndicates spring up so fast it’s hard to keep track. Until they infiltrate your system. But you know what’s even more overwhelming than rampant cybercrime?

New infosec products of the week: August 26, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Drata, Ntrinsec, PlainID, Privitar, and ReasonLabs.


from Help Net Security https://ift.tt/N0rxnLU

Saturday, August 27, 2022

Elastic appoints Ken Exner as CPO

Elastic has appointed Ken Exner as chief product officer (CPO) effective August 29, 2022.

Exner will be responsible for leading engineering, product management, and product design, with a focus on enhancing the Elastic Enterprise Search, Observability, and Security solutions and delivering a cloud service to Elastic customers. Exner will report to Elastic CEO Ash Kulkarni.

Exner brings three decades of experience leading product and engineering teams. Prior to joining Elastic, he spent 16 years at Amazon Web Services (AWS), where he built and managed dozens of products used by millions of customers worldwide.

Most recently, Exner served as vice president and general manager of AWS Developer Tools, where he ran a portfolio of more than 30 products. He holds a bachelor of science degree from the Haas School of Business at the University of California, Berkeley.

“Ken is a deeply experienced leader with a proven track record of managing a broad product portfolio and delivering cloud services at hyper-scale,” said Ash Kulkarni, CEO, Elastic.

“I’m excited to welcome Ken to Elastic, and I look forward to seeing his product and cloud expertise put into action as we continue to accelerate our cloud-first business strategy, and strengthen our relationships with all of our cloud partners.”, Kulkarni continued.

“Helping customers gain actionable insights from data is increasingly important in a world of ever-increasing volumes of data, and I am impressed with the technology that Elastic has built to power solutions in enterprise search, observability, and security,“ said Ken Exner.

“I look forward to leveraging my experience running large-scale cloud services to help work towards making Elastic one of the next great technology platforms.”, Exner continued.


from Help Net Security https://ift.tt/WO7ApnH

How to Remove a Broken Light Bulb From a Socket

Photo: Chones (Shutterstock)

Given the combination of broken glass and electricity, if a light bulb breaks while still screwed into the socket of a lamp or other light fixture, it’s not a situation to be taken lightly.

Fortunately, there are a few different ways to safely remove the shattered bulb from the socket without hurting yourself or damaging the lamp. Here are a few to consider.

Safety first

Before doing anything, it’s extremely important that you disconnect the lamp or light fixture from its source of electricity. If the broken bulb is stuck in a lamp, all you need to do is unplug the lamp. For hard-wired fixtures, flip the switch so it’s turned off, and then cut the electricity to that room at the breaker or fuse box.

Consider putting a sheet or tarp down beneath the lamp or fixture to catch any broken glass that becomes detached during the process. And, for the same reason, wear gloves and eye protection.

How to remove a broken light bulb from a socket

Once you’ve taken the safety precautions above, it’s time to get started. Here are three methods to consider (other than using a broken bulb extractor):

Use a raw potato

Double check to make sure the power is off. Wearing gloves and safety glasses, use pliers to break off whatever is left of the glass from the bulb. Then, cut a potato in half (short ways), and press one of the halves into/onto the socket so it covers the base of the broken bulb. Twist the potato counterclockwise (you can use a towel to get a better grip, if necessary) until the bulb comes out.

G/O Media may get a commission

Magnetically Docking

Mode Electric Toothbrush

Luxury brushing
Mode is the first magnetically charging toothbrush, and rotates to dock in any outlet. The brushing experience is as luxurious as it looks—with soft, tapered bristles and a two-minute timer to be confident you reached all the crevices of your molars.

Pliers and patience

Sometimes, you can get the job done using pliers alone. If the filament is intact and accessible, grip it at the glass base and turn it counterclockwise until the bulb twists out.

In situations where that doesn’t work—or, if the filament is broken—place the pliers inside the base, and open them as wide as you can, so that they’re pressed up against opposites sides. Turn the pliers counterclockwise while you’re holding them open, and that should do the trick.

Quick-setting epoxy

In situations where neither method above works or is even a possibility, some quick-setting epoxy and a screwdriver may be the solution you need. First, fill the base of the broken bulb with epoxy, and stick a screwdriver in the middle (like you were making a popsicle). Once the epoxy has dried and hardened, twist the screwdriver counterclockwise to remove the base of the bulb.


from Lifehacker https://ift.tt/1fKHcmg

Friday, August 26, 2022

Five of the Most Underrated Fast Food Menu Items

Five of the Most Underrated Fast Food Menu Items

Check out these underdogs when you’re tired of the classics.


from Lifehacker https://ift.tt/l3Yaqht

The Easiest Ways to Open a Can Without a Can Opener

Photo: Aaron J Hill (Shutterstock)

One basic rule of life is that everything is easy with the proper tools, and nearly impossible without them. A great example of how this works is the can opener: Although we’ve had the pull-tab design since 1962, you can still somehow find plenty of canned goods on the grocery shelves that lack this simple advancement—and if you have one and lack a can opener, you will quickly learn the definition of futility.

That doesn’t mean it’s impossible—cans are designed to be opened, after all, even if it doesn’t much seem like it after you’ve spent 15 minutes denting and cursing it. A can opener is just a sharp blade wheel that slices through the seal on the can’s lid, after all—the main problem with most attempts to open a can without one is that they resort to the wrong physical forces. A hammer is going to do a lot of damage to your can, but it probably won’t open it in any useful way. Here are the smartest and easiest ways to open that can without a can opener (and without cutting off a finger in the process).

How to open a can without any tools

If you don’t even have a spoon to your name when you need to open a can, don’t despair—you can still get that can open as long as you can give it a little elbow grease. All you need is a rough surface—a rock will do just fine, as will concrete or sandpaper.

Just turn the can upside down and rub the top along your rough surface vigorously. This will wear down the soft metal on the top of the can, eventually separating the seal—it shouldn’t take more than a minute to do this, because friction is some powerful stuff. You can pause periodically to give your can a squeeze to see if you’ve worn it down enough, or you can wait until you see some leakage. At this point, you can probably pop the top off with a squeeze like Popeye going for the green stuff, or insert a knife or other flat tool into the seam to lift off the top.

Just pay attention. If your mind wanders while you’re rubbing the can you could wear the deal away entirely and your food could wind up all over the place. The trick is to stop before you get to that point. And also be careful about metal shavings—just like sanding wood, this method will create a bit of metal “dust” that you’ll want to make sure doesn’t get into your food.

G/O Media may get a commission

Magnetically Docking

Mode Electric Toothbrush

Luxury brushing
Mode is the first magnetically charging toothbrush, and rotates to dock in any outlet. The brushing experience is as luxurious as it looks—with soft, tapered bristles and a two-minute timer to be confident you reached all the crevices of your molars.

How to open a can with a knife, screwdriver, or spoon

The lid on canned food is designed to be punctured, but you’ll need a tool that will do the job. Placing the can on a flat, stable surface, you need to puncture the top along the edge several times in sequence, then peel back the lid enough to pour out the contents.

A sharp, sturdy knife will puncture the lid most easily (a box cutter can do the job, as well), but is kind of dangerous to use—it’s easy to really hurt yourself if your hand slips. If you have a flathead screwdriver (hammer optional), it’s a little safer to tap the tip of the screwdriver around the edge of the can until you’re able to insert it under the lip you’ve just created and peel the top up.

There’s also the spoon method, which requires you to grind the edge of the spoon along the inner edge of the can until it deforms, then insert the tip of the spoon and rock it up and down to slice through the seal until you have a large enough opening. This requires a little more dexterity and effort, but is good to know about if you somehow lack any kind of knife or screwdriver but do happen to have a spoon—just be careful about the sharp edges this creates.


from Lifehacker https://ift.tt/tMvC9g8