Monday, October 31, 2022

20 Movies Set on Halloween That Aren’t ‘Halloween’

Screenshot: Sony Pictures / YouTube

John Carpenter and Debra Hill crafted a perennial holiday banger back in 1978, a movie that you can pull out every year during spooky season—it’s called Halloween, and it’s set on Halloween, so there’s really no confusion. Even if it weren’t such a great movie, it would be rewatchable just for so clearly stating its intentions. If that’s not quite enough, there are twelve others, all set on the night itself or during the holiday run-up.

It’s certainly not the only one: Lots and lots (and lots) of horror movies are set on and around Halloween; it’s just a convenient date for for spookiness. There are plenty of less obvious movies, though, set around the holiday—some of them spooky-adjacent, others a bit more surprising. These movies all have connections to the season: They’re either set on Halloween, or have pivotal scenes involving seasonal festivities.


from Lifehacker https://ift.tt/5QWetic

Five Ways to 'Clean' the Air in Your Home

Photo: Shutterstock (Shutterstock)

There are lots of tips out there—and here on Lifehacker—about how to clean everything in your home, from your toilet to your fireplace to your couch cushions. The stuff in your home gets dirty and needs to be maintained to keep it in good working order, but the same is true for the areas where there is no stuff. Your air can be dirty, too, and that can make your allergies worse. Here are five ways to make the air in your environment as healthy as possible.

Be choosy with your cleaning products

You might think pumping aerosols and spritzing chemicals all around your home will make the air cleaner. Be careful with this approach and don’t just Lysol your breathing space willy-nilly. As noted by Live Science, “nasty ingredients” in some cleaning products can lead to headaches, fatigue, and eye or nose irritation—all of which is counterproductive when you’re trying to improve the quality of your air.

Household products can unleash volatile organic compounds (VOCs), and a 2018 study in Science showed that some products release way more VOCs than previously estimated. Your best bet is to spend some time—and maybe a little extra money—sourcing “natural” cleaning products. Here’s a handy guide to help you find good ones, but in the meantime, expect to use a lot of baking soda, vinegar, and borax. And read the ingredients list on the “natural” cleaners you find at the store carefully—look for fragrance-free, Green Seal-certified products, and avoid aerosols generally.

Be choosy with your plants, too

The internet loves to tell you that plants can filter and clean your air, but these claims are more than a little dubious, as Lifehacker has explained before. There’s no harm in having a bunch of plants, since they do boost oxygen levels within your home, can possibly reduce stress, and overall make your space a prettier and happier one (provided you don’t kill them immediately).

The idea that a bunch of plants will “filter” your air, no purifier needed, is overblown, but plants actually can help clear the air in one practical way: by collecting dust. Some plants collect dust better than others; here are the best choices to reduce airborne dust around the house:

  • Rubber plant
  • Pygmy date palm tree
  • English ivy
  • Spider plant
  • ZZ plant
  • Dripping guanyin
  • Bamboo palm
  • Peace lily
  • Ferns

These plants are great at collecting dust, but you still need to dust and clean the the plants themselves. Think of them like a Swiffer pad: After you swipe it around the floor, you need to clean the pad too, or the next time you use it it will already be caked with grime.

G/O Media may get a commission

Instant Facelift
Think of the Foreo Bear as exercise for your face, engaging muscles to provide radiance and lift with lasting results.

Ventilate your space

Crack your windows every once in a while—even when it’s cold—to let fresh air in and release any built-up pollutants that have accumulated from, say, cooking or cleaning. Don’t take an “out of sight, out of mind” approach to you vents, either; those suckers need to be cleaned. Here are simple ways to clean your air vents—and don’t forget about the exhaust fan in your bathroom.

Consider having your air ducts professionally cleaned every three to five years, according to the National Air Duct Cleaners Association. There’s only so much you can do on your own to battle the grossness that is accumulating deep within the bowels of your home.

Get an air purifier

Lifehacker’s own Senior Health Editor Beth Skwarecki recommends an air purifier, and has seen a decrease in her asthma symptoms since getting one, so if you’re on the fence about something that sounds like it might be a placebo machine, look into it. True, there’s no conclusive air purifiers will really improve your symptoms, but there is plenty of anecdotal evidence. If you do decide to pick one up, want to make it uses a HEPA filter.

Attack any mold quickly

Mold can crop up in a lot of places, so keep a close eye on anything damp. Your washing machine, tub, and even wood anywhere in your home can be a breeding ground for the stuff. Get rid of it fast—using the cleaning guides linked in the preceding sentence—to keep yourself from developing allergy-like symptoms.


from Lifehacker https://ift.tt/HdoZcjR

Psychotherapy extortion suspect: arrest warrant issued

Wanted! Not only the extortionist who abused the data, but also the CEO who let it happen.
from Naked Security https://ift.tt/RW1czoy

Instagram account suspension wave hits users

Earlier today, many Instagram users were faced with an alarming message when they tried to use the service:

Instagram account suspension

Clicking on the “Disagree with decision” button lead the users to either a perpetually loading screen, a “Try again later” message, or a request to enter their username, password and security code to verify their account.

Some received the code, some didn’t – even after many attempts, after which they got blocked. Some of the former entered the code, and were again faced with a loading screen. Some where automatically logged out and, after trying to log in again, are being told by Instagram that the account with that email address or phone number does not exist. Some say that the problem with security code verification started even earlier.

By following the #instagramdown hashtag on Twitter – where many affected users have flocked to complain to Instagram and see if others were affected – one can see that this “outage” hit users around the world. But, as I discovered by polling my colleagues who use Instagram, not all users in the same geographic location have had their account suspended.

“We’re aware that some of you are having issues accessing your Instagram account. We’re looking into it and apologize for the inconvenience,” Instagram’s PR team posted on Twitter a few hours ago, and hasn’t been answering affected users’ frantic cries for help or an explanation (well, at least not publicly).

The Verge reported that many accounts were losing followers by the thousands or even millions, which also seems a consequence related to this issue.

On Reddit’s Instagram subreddit, some users are saying that they’ve been able to get back into their account (and warning about possible scams related to this service outage), but there is still no official confirmation from Instagram.

We’ll update this piece when we know more about the cause of this outage / account suspension wave.


from Help Net Security https://ift.tt/HQqjI62

The Best Apps to Have in an Emergency

Most emergencies don’t come with advance warning, which is why it’s best to do some basic preparation ahead of time. You can check out tips for extremely specific emergencies and create an ‘If I Go Missing’ file, but don’t forget the one useful lifesaving tool you undoubtedly have with you at all times: you phone. Here are seven recommendations for essential apps to download in case of emergency.

An offline messaging app

Internet connectivity is often disrupted during serious emergencies. To get around it, it’s a good idea to download a few offline messaging apps. Instead of relying on a cell signal, most of these apps use Bluetooth or wifi to find people around you.

As long as others have the same app installed and are within 150 to 300 feet of your current location, you will be able to message them. If you use Android, Briar is a great option. For cross-platform use, Bridgefy is a solid alternative.

A better way to contact people around you

If internet isn’t disrupted, you can try Zello, a walkie talkie app that lets you talk to people over cellular or wifi. Zello has public and private channels where you can talk to others around you and reach out for help. While it is a useful tool for emergencies, the app will not work if Zello servers are down.

G/O Media may get a commission

Instant Facelift
Think of the Foreo Bear as exercise for your face, engaging muscles to provide radiance and lift with lasting results.

Get disaster alerts in realtime

The U.S. government’s Department of Homeland Security’s agency for emergencies, the Federal Emergency Management Agency (FEMA), has a useful app that alerts you about emergencies in any location within the country.

The FEMA app allows you to pick a location and select the kinds of emergencies for which you’d like notifications, including natural disasters, evacuations, and other hazards, plus it contains information for dealing with various types of emergencies. Should you find yourself in one of these situations, the app also offers resources you can reach out to.

Apps to teach you some first aid

If you’re facing a health emergency, the American Red Cross’ First Aid app, available on iPhone and Android, will help. It has easy to follow first aid instructions for various medical emergencies, plus links to additional resources and information on hospitals near you.

An app for your pets

The American Red Cross also has a useful first aid app to help your cats or dogs. It contains instructions on dealing with veterinary emergencies, including first aid and links to nearby vet hospitals.

Pet First Aid has interactive quizzes that makes it easy to learn what to do when your pet is in danger so you can react accordingly if something should happen. You can download Pet First Aid on iPhone or Android.

Location-sharing apps make it easy for people to find you

When you need to contact emergency first responders, you can use various apps to share your location with them—especially useful if you live in a neighborhood with confusing signs or unusual numbering patterns. You can easily share your location using iMessage, WhatsApp; alternatively, you can try location sharing via apps such Google Maps or SirenGPS (Android, iPhone).

Don’t forget your phone’s built-in SOS features

Smartphones ship with plenty of SOS features built-in, so take a few minutes to familiarize yourself with them. You never know when they’ll be useful.

Your iPhone has an Emergency SOS feature that takes a minute to learn. Similarly, you should enable Fall Detection on your Apple Watch to alert others when you need help. If you use an Android phone, here’s a neat hack to create an SOS alert on your phone.


from Lifehacker https://ift.tt/AhvLMel

Apple Only Commits to Patching Latest OS Version

People have suspected this for a while, but Apple has made it official. It only commits to fully patching the latest version of its OS, even though it claims to support older versions.

From ArsTechnica:

In other words, while Apple will provide security-related updates for older versions of its operating systems, only the most recent upgrades will receive updates for every security problem Apple knows about. Apple currently provides security updates to macOS 11 Big Sur and macOS 12 Monterey alongside the newly released macOS Ventura, and in the past, it has released security updates for older iOS versions for devices that can’t install the latest upgrades.

This confirms something that independent security researchers have been aware of for a while but that Apple hasn’t publicly articulated before. Intego Chief Security Analyst Joshua Long has tracked the CVEs patched by different macOS and iOS updates for years and generally found that bugs patched in the newest OS versions can go months before being patched in older (but still ostensibly “supported”) versions, when they’re patched at all.


from Schneier on Security https://ift.tt/wcR4nWb

Will cyber saber-rattling drive us to destruction?

As cyberattacks have grown increasingly destructive, nations are entertaining the idea of responding to them with conventional military forces.

It is difficult to determine how serious countries are when they threaten “kinetic” responses to digital attacks. Yet, the ambiguity over if or when cyberattacks should be answered with military force only increases the risk of things going terribly wrong.

responding to cyberattacks

What’s the problem?

In 2018, Air Marshal Phil Osborn, from the UK Ministry of Defence, suggested a strategic military approach when responding to severe cyberattacks:

“We will need to secure a deep and persistent understanding of a prospective opponent’s strengths, weaknesses and options, and then develop, preposition and employ our own capabilities for advantage, defence and deception. Those capabilities must of themselves be agile, and capable of ‘last safe moment’ deployment and employment to avoid being physically or virtually fixed,” he said.

“Our aim should be to understand first, to decide first, and then if necessary to act first, across the physical and virtual, to secure decision advantage and then operational advantage, seeking swift yet controlled exploitation of vulnerabilities and the proactive denial of opportunities.”

Nations have long used a preemptive strike doctrine to justify who initiates wars. Now, when one reserves the right to act first across the physical and virtual, they are advocating a policy of aggression. There are circumstances where a provocation forces a country to take up arms, but these cases are few and should remain few. When cyberattacks – or the mere threat of – are considered casus belli, it creates the potential for minor events to spiral into major catastrophes.

Consider what US President Joe Biden said in 2021 in his address to the Office of the Director of National Intelligence (ODNI):

“You know, we’ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world. I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up — well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence. And it’s increasing exponentially — the capabilities.”

It bears mentioning that an active “shooting war” with another major power has the potential to escalate into a nuclear Armageddon (a concern already on the table with the conflict between Russia and Ukraine). It is difficult to imagine any kind of cyberattack worthy of initiating such a gamble.

More to the point, NATO is laying down rules for when cyber operations (CO) may constitute a use of force against member nations. Specifically, NATO says:

“[I]f COs cause effects that, if caused by traditional physical means, would be regarded as a use of force under Article 2(4) of the UN Charter or an armed attack under jus ad bellum, then such COs could similarly be regarded as a use of force or armed attack.”

The seriousness of a cyberattack classified as an “armed attack” against a NATO member cannot be overstated. It is the apex of high stakes in the arena of global warfare.

Perhaps the situation is less alarming than it appears. Sun Tzu famously said that all warfare is based on deception. Are countries using increasingly combative language in hopes that it will act as a deterrent to those considering catastrophic cyberattacks? Is the multinational saber-rattling over cyberattacks merely a threat with no follow-through?

Are the right people at the helm?

Some positions in government are seen as so crucial that they require a lifetime of career experience to attain. Becoming a general in the military and being vested with the authority to oversee large-scale operations in theaters of war is one example. Another example are Supreme Court justices, who interpret the law of the land for over 320 million citizens. The gravity of these positions and the far-reaching impact of their decisions separate them from elected representatives, who serve under term limits. While rotating officials can carry out many functions of a representative democracy, there are some aspects of the state they cannot.

Military generals and Supreme Court justices have held a long tenure within their respective fields. They are lifelong experts who are often regarded as top performers within their professions. Their decisions are not subject to a democratic vote, nor answerable to the will of the people. Simply put, they are positioned as trusted leaders whose guidance represents the final say on matters of national importance.

Yet, there does not appear to be a similar measure of professional gravitas overseeing the short path from a major cyberattack to a military response. Elected officials, most without cybersecurity or warfare experience, set public expectations through their statements. They often rely on advice from the heads of relevant government agencies, many of whom are political appointees. Yet, the appointees in charge of these agencies regularly rotate out of their positions whenever new leadership from another party takes control. Unlike military generals or Supreme Court justices, they never accrue the lifelong experience needed to prepare for the heavy responsibility of life-or-death decision making.

National cyberattack analysis and response measures are ambiguously spread across various government agencies. It is unclear which agency would ultimately determine the origin of cyberattacks or formulate response actions. At the international level, world governments cannot agree on a unified policy for responding to cyberattacks. NATO has broadly defined cyber activities that affect national sovereignty as a use of force, but what that means is open to individual interpretation. There have been attempts by the private sector to address this issue as well. During RSA 2017, Microsoft called for a Digital Geneva Convention. This same idea is often discussed today, without much to show in the way of progress.

What if we do nothing?

If we continue upon our present course, it is almost certain that one nation will eventually use a cyberattack to justify using its military against another. After promising to do so for years, it would be difficult for a country to do otherwise. This unfortunate situation offers bad actors a golden opportunity to escalate tensions between nations. Threat actors regularly obfuscate their activities by using other adversaries’ tactics, techniques, and procedures (TTPs). Now, they can pose as state-backed actors hoping to stir up trouble between countries.

responding to cyberattacks

Deceptive cyberattacks could lead to false attribution and catastrophic consequences

Consider a hypothetical situation where one nation wants to start a conflict between two others. Suppose country “A” knows that country “B” will retaliate with force to a cyberattack, because they’ve promised to do so for many years. Country A decides to launch a highly destructive cyber campaign against country B, but makes the attack appear to come from country “C”. Country B has no formal processes requiring cyberattacks to be positively identified before reacting, and launches a military action against country C. Could this happen? There is nothing explicitly in place to prevent it.

Attribution of cyberattacks is a notoriously difficult task. The threat research papers from the world’s most sophisticated cybersecurity firms often avoid naming the origins of an attack altogether. The complex nature of major threat groups, such as Conti, hinders attribution efforts. Conti is widely reported as a Russian threat group, but its highly publicized problems following the invasion of Ukraine indicate it may not be state-backed. Does Conti operate from Russia due to its lenient cybercrime laws, or are they surreptitiously operating under the direction of the Russian government? Should a Conti attack be considered an attack from Russia?

Other sophisticated advanced persistent threat groups (APTs) openly advertise themselves as mercenaries. By hiring experienced threat groups to conduct cyberattacks on other countries, governments can maintain plausible deniability. All these factors make it possible for nations to blame a cyberattack on the wrong actor. How can a country be certain they were attacked by another, rather than adversaries using the TTPs of previous state-backed attacks? What prevents nations from simply running their shadowy cyber operations as private enterprises, to create the illusion of separation? In cyberspace, evidence is easily forged, attack paths are widely distributed, data is heavily encrypted, and culpability is often unclear.

Responding to cyberattacks: What can be done?

Those waiting for a global agreement, or a Digital Geneva Convention, may still be treading water when the next state-backed cyberattack makes headlines. Trying to implement solutions at a global level – when similar proposals have not succeeded at the national level – seems misguided. While there is no simple solution for addressing state-based cyberattacks worldwide, there are some steps that can improve the current situation.

Placing proverbial “guardrails” on government responses to cyberattacks could help avert any corresponding retaliations from spiraling out of control. It is important to balance a nation’s need for broad response capabilities with policies that prevent unnecessary escalation. One approach could be implementing requirements that insist on proportional responses. Perhaps something like: “We will not respond with military force unless a cyberattack directly results in the loss of human life”. This leaves countries a wide range of response options without immediately opening the Pandora’s box of global warfare.

Ultimately, Realpolitik dictates that nations will do whatever is necessary when their sovereignty is threatened. To this point, it matters little what treaties, policies, or legislation is in place should a truly catastrophic cyberattack occur. However, continually threatening military responses to serious cyberattacks inadvertently puts a country into a straitjacket, where they must respond with force to save face. Toning down bellicose rhetoric allows nations to keep their options open without explicitly revealing how severe their responses may be. As former US president Teddy Roosevelt famously advised, “Speak softly and carry a big stick; you will go far.”


from Help Net Security https://ift.tt/nZVPaCf

Sunday, October 30, 2022

Cyberattacks in healthcare sector more likely to carry financial consequences

Netwrix announced additional findings for the healthcare sector from its global 2022 Cloud Security Report, revealing that 61% of respondents in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months, compared to 53% for other verticals. Phishing was the most common type of attack reported.

healthcare sector cyberattack

“The healthcare sector is a lucrative target for attackers because the chances of success are higher. The first two years of the pandemic exhausted the industry. With patient health being the main priority for these organizations, IT security resources are often too stretched and are focused on maintaining only the most necessary functions,” comments Dirk Schrader, VP of Security Research at Netwrix.

“Plus, the high value of data gives cyber criminals better opportunities at financial gain: they can either sell stolen sensitive medical information on the dark web or extort a ransom for ‘unfreezing’ the medical systems used to keep patients alive.”

An attack in the healthcare sector is more likely to result in financial consequences. 32% of respondents from other industries report that an attack had no impact on their business, while only 14% of healthcare organizations say the same. Unplanned expenses to cover security gaps and compliance fines are the most common types of damage that the healthcare sector faces due to a cyberattack.

“Healthcare organizations plan to increase the share of their workload in the cloud from 38% to 54% by the end of 2023. Fast cloud adoption should be accompanied by relevant security measures and special attention to internet-of-things (IoT) devices and systems; for example, compromise of respirators or IV infusion devices can lead to physical harm to patients,” adds Schrader.

“Network segmentation will help prevent one compromised device from impacting the entire system. IT teams must also strictly limit who — humans and machines — can access what data and systems according to the least-privilege principle, and regularly review and right-size those access rights.”


from Help Net Security https://ift.tt/QOUsMPi

Persona releases unified identity platform to help businesses fight fraud

Persona has launched the next evolution of its unified identity platform to help businesses mitigate online fraud and meet ever-evolving compliance standards.

Persona platform

The new Persona platform connects, centralizes and orchestrates all fragmented identity data, disparate systems and identity operations under a single infrastructure.

Leading companies—including Square, Gusto, Revel, Toast, Coursera, and Dapper Labs—leverage Persona to adapt to evolving fraud techniques and regulatory compliance requirements—all while creating a frictionless experience for customers.

“With rising fraud rates and tightening regulation, organizations need to ensure the people and businesses they work with are who they say they are,” said Rick Song, CEO, Persona.

“But the way businesses manage and verify their customers’ identities today is purely transactional. This is because identity is ever-evolving and incredibly resource-intensive to manage. No use case is created equal. The rigor necessary for a company to verify one user might drastically differ from another due to a number of factors, including transaction risk, location and associated regulations. And applying a one-size-fits all approach leads to high failure rates and frustrated customers.”, Song continued.

The new Persona platform: Building blocks for identity operations

In order for businesses to effectively mitigate fraud and stay compliant, they need to be able to customize the way they interact and build a relationship with each user. Persona’s configurable building blocks allow organizations to tailor and streamline each stage of their unique identity processes.

Solutions include:

  • Verifications: the robust and fully-automated suite of international verification tools—e.g., database, documentary, biometric, digital ID, and behavioral signals.
  • Dynamic flow: the dynamic risk assessment engine that customizes the way businesses collect and verify information based on real-time signals.
  • Cases: a fully-customizable investigation center that can be tailored and optimized for every team’s internal review processes.
  • Workflows: a flexible no-code identity process automation builder that can ingest data, automate complex decisions, and trigger actions.
  • Graph: a link analysis and fraud investigation solution that surfaces hidden fraud rings and detects new fraud patterns.
  • Marketplace: a library of integrations with identity data providers and business productivity applications that enables organizations to unsilo and connect identity data to their business systems for better decision-making and automation.

Each of Persona’s products work independently and in tandem with each other, allowing businesses to build their ideal solution for any use case. Two of Persona’s newest solutions, Graph and Marketplace, illustrate how Persona’s building blocks work together seamlessly to power all identity operations from end to end in one place.

For example, if a business is having trouble preventing duplicate account fraud, they can use the Marketplace to consolidate active and passive signals from Persona with third-party signals, such as data from partners including Chainalysis and SentiLink.

Graph then takes that information and surfaces suspicious patterns to prevent fraud before it escalates. Finally, the business can use the business platform integrations from the Persona Marketplace to automate any follow-up actions, such as updating accounts in Salesforce or closing out tickets in Zendesk.

Song continued, “In today’s constantly changing digital landscape, organizations struggle to balance fraud mitigation and conversion optimization without putting a huge strain on their operations team. With Persona’s re-architected platform, companies can tackle every identity need—from identity verification to fraud review—individually, or orchestrate and safeguard their identity operations from end to end by combining building blocks on one cohesive platform.”


from Help Net Security https://ift.tt/qURGOhD

Mitek MiPass combines voice and face recognition to strengthen digital security

Mitek launches Mitek MiPass – a passwordless identity authentication solution that allows a person to access digital accounts securely using two features that are uniquely theirs: voice and face.

Mitek MiPass

  • How: To access a digital account using MiPass, a person simply uses a smartphone to take a quick selfie and then record a phrase.
  • Why: Combining the two is a significant security improvement beyond the face recognition-only systems many use today. Authenticating digital identities with MiPass reduces the risks associated with on-device stored biometrics, which can be easily compromised, shared between people or overwritten with a simple passcode.

No one likes passwords. An average person has more than 100 passwords to manage, often making it difficult and frustrating to complete even the simplest online transactions.

“MiPass provides the highest level of digital security available today,” said Mitek CTO Steve Ritter. “MiPass combines voice and face recognition using sophisticated liveness detection technology to defend against digital and deepfake attacks in real time.”

Hassle-free and secure account access helps both companies and their customers

Experts estimate that more than 80% of hacking breaches involve the use of stolen passwords or credentials, fraud that can cost a large company as much as $1 million a year. By moving to a more secure, passwordless approach to digital account authentication, companies can both increase customer loyalty and reduce their own risk from identity theft and account takeover attacks.

Because MiPass algorithms have been developed and tested against balanced and representative data sets, to avoid bias, MiPass can accurately authenticate customers regardless of race, ethnicity, age or gender.

According to recent research by YouGov, 74% of people say they want their bank to adopt the latest technology to keep their account safe. As many as 44% of adults ages 18-34 say they would like their bank to adopt newer, modern technologies to make it easier to log in to accounts.

“Companies care about their customers’ trust and security more than anything,” said Mitek Head of Product Chris Briggs. “Mitek understands this. That’s why we focus all our attention on bringing products to market that enable trusted online access. People are most loyal to companies that offer both convenience and security. That’s where MiPass excels.”

MiPass demo is available now

A developer-friendly software development kit (SDK) makes MiPass easy to embed into a wide variety of customer use cases, such as simple account information updates, password resets, device rebinding and high-risk financial transactions.


from Help Net Security https://ift.tt/SfwcYOX

How to Change the Cabin Air Filter in Your Car

Photo: wellphoto (Shutterstock)

Over the past few years, air purifiers have become common household appliances, thanks not only to COVID-19 and smoke from wildfires, but also a better understanding of exactly how dirty the air we breathe can get. In addition to the air quality inside our home, we should also think about what we’re breathing in when we’re inside our cars.

This brings up a question: When was the last time you (or a professional) changed your car’s cabin air filter? Here’s what to know about that process, including how to replace cabin air filters, and how long they typically last.

How long do cabin air filters last?

In most cases, cabin air filters were designed to last for between 12,000 and 30,000 miles. But if you live in an industrial area with a lot of air pollution, or somewhere with regular wildfires, you may need to replace it on a yearly basis, or even more frequently.

Signs your cabin air filter needs to be replaced

So if mileage isn’t always an accurate way of determining when to replace your cabin air filter, how do you know when it’s time? According to Jonathon Klein of The Drive, these are some of the usual signs:

  • You can easily smell what’s outside your car—farms, factories, skunks, etc.—including when the air inside the car is being recirculated
  • The airflow out of your vents is weak, even when it’s set to the highest level
  • It sounds like air is struggling to get through the car’s HVAC system and out the vent, or like the vent itself is blocked
  • You can see smoke or other particulates come through the vents

How to replace your car’s cabin air filter

Even if you typically bring your car into the dealership for routine maintenance like oil changes or tire rotations, this is one situation where, in most cases, it doesn’t make sense to pay the dealership’s inflated fee—which can range from around $40 to $130—for something you can do by yourself in a few minutes.

G/O Media may get a commission

A gift for literally everybody.
Gifts under $20, $10, and even $5. It’s Wish, the catch-all shop for all of the above.

The tools you need and the process involved depends on the type of vehicle you have, so your best bet is to start by looking at your owner’s manual to find out where your cabin air filter is located, and how to change it.

More often than not, the cabin air filter is located behind the glovebox—though it can also be found at the base of the windshield, under the hood.

Behind the glovebox

In some vehicles, you simply press a tab on each side of the glovebox, which drops it down, allowing you to access the cabin air filter. From there, you pull out the old filter, slide in the new one, and pop your glovebox back into position. The end.

In other vehicles, you may need to remove the glovebox door to get to the cabin air filter. In this case, use a flathead screwdriver or Torx/Hex wrench (whatever is stipulated in your owner’s manual) to remove the glovebox door. This should allow you to access the air filter. Then it’s a matter of taking the old filter out, putting the new one in, and finally, reattaching the glovebox door.

Under the hood

First, start the car, switch the windshield wipers on, then turn the car off when the wipers are positioned so they’re pointing towards the sky. Then, pop the hood. We’ll let Klein take it from here:

  1. Remove the windshield washer hose from the clips on the plastic cover near the base of the windshield.
  2. Pull away the hood weatherstripping.
  3. Remove the plastic cover (you may need a flathead screwdriver).
  4. Remove the cabin air filter.
  5. Replace with the new cabin air filter.
  6. Reinstall the plastic cover, hood weatherstripping, and windshield washer hose.
  7. Close the hood.

This is a simple task that’s well worth the effort: Your car’s HVAC system will work better, and most importantly, you’ll breathe cleaner air.


from Lifehacker https://ift.tt/ObaKvqu

How to See If American Airlines Owes You Money in Their Checked-Bag Settlement

Photo: JL IMAGES (Shutterstock)

Even before the pandemic made everything worse, air travel was already harder than it needed to be. One of the most frustrating parts is that as a passenger, you could do everything right—following all the rules, getting there with ample of time before your flight, always having your ticket and ID ready to go—and still encounter plenty of hassle, thanks to other people who weren’t prepared, or didn’t follow TSA guidelines.

In other situations, it’s on the airlines. This was the case for many American Airlines customers, who accused the air travel provider of requiring them to pay for checked bags that were supposed to be free.

The result was a class-action lawsuit, and in August, the airline agreed to pay the customers a settlement in order to resolve the issue. Here’s what you need to know about the payout, including whether you’re eligible to claim a portion of it.

Why was there a class-action lawsuit against American Airlines?

One of the perks of having Gold Status in the AAdvantage loyalty program is getting to check a bag for free. That also happens to be a benefit that comes with certain American Airlines-branded credit cards. So after AA customers in both of those categories were forced to pay to check their bags, a group came together to file a class-action lawsuit against American Airlines.

G/O Media may get a commission

A gift for literally everybody.
Gifts under $20, $10, and even $5. It’s Wish, the catch-all shop for all of the above.

In their complaint, these individuals (the plaintiffs in the lawsuit) claim that when they went up to the counter to check their bags, the AA employee told them that even with their Gold Status or AA-branded credit cards, the computer doesn’t indicate that they get to check any bags for free.

The plaintiffs come to the conclusion that the AA computer system had not been updated to reflect this perk, and “as a result, AA passengers were improperly charged and forced to pay baggage fees.”

In its own court filings, American Airlines denied any wrongdoing. Yet, in August, the company agreed to a payout of at least $7.5 million to compensate the customers who were incorrectly charged to check bags. The settlement is currently awaiting final approval from the court.

How to know if you qualify to receive part of the settlement

In the settlement, class members are divided into two groups:

  • Travelers with AA-branded credit cards that entitled them to free bag-checking privileges, but were charged on a domestic flight.
  • Passengers who received email confirmation that one or more of their bags would be free to check, but still had to pay.

In addition to fitting into at least one of the groups above, you also must have traveled on or after Feb. 24, 2017, and your tickets must have been purchased no later than April 8, 2020.

If the court approves American Airlines’ proposed settlement, those who qualify will get a full refund for the checked bags they paid for that were supposed to be free.

How to file a claim in the settlement

This is also on hold until a court approves the settlement, but in papers American Airlines provided to the court, the company indicates that it plans to notify customers who are eligible to receive a refund as part of the settlement. For now, your best bet is to keep an eye on the settlement website for updates.


from Lifehacker https://ift.tt/TPynmUj

Week in review: OpenSSL critical fix, Medibank data breach, Apple fixes zero-day vulnerability

The week in security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Incoming OpenSSL critical fix: Organizations, users, get ready!
The OpenSSL Project team has announced that, on November 1, 2022, they will release OpenSSL version 3.0.7, which will fix a critical vulnerability in the popular open-source cryptographic library (but does not affect OpenSSL versions before 3.0).

Apple fixes exploited iOS, iPadOS zero-day (CVE-2022-42827)
For the ninth time this year, Apple has released fixes for a zero-day vulnerability (CVE-2022-42827) exploited by attackers to compromise iPhones.

MyOpenVDP: Open-source web application to securely disclose vulnerabilities
MyOpenVDP is a turnkey open-source solution allowing anyone to host their own vulnerability disclosure policy (VDP). Developed by YesWeHack, the web application is available on GitHub.

How cybersecurity VCs find visionary companies in emerging sectors
33N Ventures is fundraising €150 million for investing in cybersecurity and infrastructure software companies across Europe, Israel, and the US. The fund will mostly target investments at Series A and B, with an average ticket size of around €10 million, and has an investment capacity of €20 million already committed by Alantra and its strategic partners.

Your CCTV devices can be hacked and weaponized
In this interview for Help Net Security, Camellia Chan, CEO at Flexxon, talks about the dangers of closed-circuit television (CCTV) hacks and what users can do to protect themselves.

Asset risk management: Getting the basics right
In this interview with Help Net Security, Yossi Appleboum, CEO at Sepio, talks about asset risk management challenges for different industries and where it’s heading.

Medibank data breach: More customers affected, attacker got in via stolen credentials
Australian private health insurance provider Medibank has revealed that the hack and data breach it discovered over two weeks ago has affected more customers than initially thought.

Don’t wait for medical device cybersecurity legislation: Act now to save patients’ lives
Cyberattacks can cost lives — especially in the healthcare sector. Nearly a quarter of healthcare providers victimized by ransomware reported increased mortality rates following an attack, and 70% experienced longer hospital stays or procedure delays leading to poor patient outcomes.

The long-term psychological effects of ransomware attacks
Northwave has conducted scientific research into the psychological effects of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected.

Shadowserver: Get free access to timely, critical Internet security data
In this Help Net Security video, Piotr Kijewski, CEO at The Shadowserver Foundation, talks about what they do and offers insight into their track record of delivering high-quality, actionable cyber threat intelligence for over 15 years.

Fill the cybersecurity talent gap with inquisitive job candidates
The impact of the Great Resignation and the Great Reshuffle is still strongly felt across many industries, including cybersecurity. There is a talent gap: Companies are struggling to hire enough talent to fulfill their needs and goals.

cert-manager: Automatically provision and manage TLS certificates in Kubernetes
cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters and simplifies the process of obtaining, renewing, and using those certificates.

Mitigating the risks of artificial intelligence compromise
The number of cyberattacks directed at artificial intelligence (AI) continues to increase, and hackers are no longer planting malicious bugs within code – their techniques have become increasingly complex, allowing them to tamper with systems to compromise and “weaponize” AI against the organizations leveraging it for their operations.

DHL takes top spot in brand phishing attempts
Check Point Research has published its Brand Phishing Report for Q3 2022, which highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August and September.

Key observations on DDoS attacks in H1 2022
In this Help Net Security video, Juniman Kasman, CTO at Nexusguard, talks about how, while the total number of attacks did grow, the average (0.59 Gbps) and maximum (232.0 Gbps) attack sizes each decreased by 56% and 66.8%, respectively, during the same period.

Delivering visibility requires a new approach for SecOps
As the world watches the conflict with Russia unfold, cybersecurity defenders are working overtime. Defenders are being asked by key stakeholders, boards, and even CISA for transparency on how their organization is faring against cyberattacks.

To retain cybersecurity professionals, keep remote work as an option
(ISC)² highlighted a stark increase in the shortage of cybersecurity professionals as it announced the findings of its 2022 (ISC)² Cybersecurity Workforce Study.

What closed-source software developers can learn from their open-source counterparts
In this Help Net Security video, Josep Prat, Open Source Engineering Director at Aiven, illustrates how threat actors see greater use of open-source software as an opportunity, deploying new methods targeting tech professionals and open-source projects.

Protecting organizations by understanding end-of-life software risks
In this Help Net Security video, Keith Neilson, Technical Evangelist at CloudSphere, discusses how simply knowing what is in your IT estate does not guarantee that you understand what will cause chaos.

What consumers expect from organizations that handle their personal data
In this Help Net Security video, Robert Waitman, Privacy Director and Head of Privacy Research Program at Cisco, discusses the key findings of Cisco’s 2022 Consumer Privacy Survey.

Why dark data is a growing danger for corporations
In this Help Net Security video, Dannie Combs, SVP and CISO at Donnelley Financial Solutions, discusses why dark data represents a potential cybersecurity threat for global businesses.

Ghostwriter: Open-source project management platform for pentesters
In this Help Net Security video, Christopher Maddalena, Director of Internal and Community Product at SpecterOps, showcases Ghostwriter, which helps you manage clients, projects, reports, and infrastructure in one application.

Economic strife fuels cyber anxiety
The 2022 SonicWall Threat Mindset Survey found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused on financially motivated attacks like ransomware. In this Help Net Security video, Immanuel Chavoya, Threat Detection Expert at SonicWall, talks about the key survey findings.

Know the dangers you’re facing: 4 notable TTPs used by cybercriminals worldwide
In this Help Net Security video, Dmitry Bestuzhev, Most Distinguished Threat Researcher at BlackBerry, talks about some of the most interesting tactics, techniques, and procedures employed by cybercriminals in recent months.

Social engineering attacks anybody could fall victim to
This Help Net Security video talks about what social engineering is, how can it be performed, and how can you fight against it.

Cloud security made simple in new guidebook for lean teams
In the ebook “The Lean IT Guide to Cloud Security”, Cynet describes what the optimal cloud security toolkit looks like, along with how lean security teams can take advantage of similar strengths without increasing staff or ballooning security spending.

A quick guide for small cybersecurity teams looking to invest in cyber insurance
In the world of insurance providers and policies, cyber insurance is a fairly new field. And many security teams are trying to wrap their heads around it.

New infosec products of the week: October 28, 2022
Here’s a look at the most interesting products from the past week, featuring releases from ARMO, Array, AuditBoard, Illusive, Kasten by Veeam, Prove, SkyKick, and Socure.


from Help Net Security https://ift.tt/fndBIX7

Saturday, October 29, 2022

Elektrobit and Canonical join forces to build the next generation of automotive software

Elektrobit and Canonical have partnered to bring the benefits of Canonical’s Ubuntu operating system to automotive software.

As the industry transitions towards software-defined vehicles, the new partnership will make it easier than ever before for car makers, suppliers, and developers to create the next generation of vehicle applications, while meeting stringent automotive standards.

Combining Canonical’s open-source Linux operating system with Elektrobit’s expertise in automotive-grade embedded software will enable long-term maintenance, over-the-air updates and functional vehicle safety innovation, all underpinned by Ubuntu’s developer community.

“Canonical is proud to collaborate with Elektrobit in building the next generation of automotive software,” said Régis Paquette, VP global alliances and channels, Canonical.

“Combining Elektrobit’s world-class automotive offering with Ubuntu’s popularity and reliability will pave the way to a new era of software-defined vehicles. Ubuntu’s availability across ECUs, developers’ desktops and the cloud reduces OS fragmentation and maintenance efforts while facilitating digital twin deployments. Together with the open-source community, Elektrobit and Canonical will provide the automotive industry with greater stability, enabling greater efficiency and focus on their key differentiators.”, Paquette continued.

“Elektrobit’s partnership with Canonical will enable us to offer an OS solution with a unique value proposition to the automotive industry,” said Michael Robertson, Vice President, Head of Products and Strategy, Elektrobit.

“This open-source solution will complement the product portfolio of Elektrobit, and offer the key elements of an automotive OS solution from a single source.”, Robertson added.


from Help Net Security https://ift.tt/2gxfqr5

Notebook Labs raises $3.3 million to improve security for Web3 users

Notebook Labs (“Notebook”) has closed its $3.3 million seed round. The round was led by Bain Capital Crypto, with participation from Y Combinator, Soma Capital, Abstract Ventures, Pioneer Fund, NFX, Very Serious Ventures Partner Chase Adams, Algofi Co-Founder Owen Colegrove, and Landeed Founder and CEO Sanjay Mandava.

Built during TreeHacks – Stanford University’s premier and largest hackathon – in 2022 by a group of Stanford University undergrads, Notebook was developed to solve the Web3 identity problem by enabling Web3 protocols to trust their users without requiring users to compromise their anonymity.

Currently, when users create on-chain credentials or go through identity verification processes, they are required to disclose their wallet and personal information to a centralized institution without knowing how the data will be used, stored, or monetized.

Notebook uses zero-knowledge cryptography to create a new paradigm for identity verification, giving users full control of their data and allowing them to retain their privacy. Notebook’s technology equips Web3 protocols with simple Sybil-resistant login infrastructure that protects them from attackers and bots and allows them to verify users in a privacy preserving way.

Notebook’s seed funding will enable the company to further expand its development team and scale its technological infrastructure.

“Until now, blockchain users have been required to identify themselves with wallet addresses, which has not only compromised their privacy, but has also subjected the blockchains themselves to Sybil attacks. This has led many people to oppose putting their sensitive data on-chain for the sake of decentralization and has subsequently constrained DeFi’s growth,” said Solal Afota, Co-Founder of Notebook Labs.

“Notebook is paving the way towards mass adoption of DeFi by giving Web3 users the privacy and anonymity they deserve, while also enabling more secure logins that will make protocols safer.”, Afota continued.

“Our team at Notebook is excited to launch a solution that we believe will be critical to the mainstream adoption of Web3,” added Nathaniel Masfen-Yan, Co-Founder of Notebook Labs.

“Notebook’s technology is designed to help significantly improve a number of applications, from enabling lending protocols to build credit scoring systems that offer lower-collateralized loans to allowing DAOs to check the identity of their users in a privacy preserving way.”, Masfen-Yan added.

“Notebook aims to help Web2 users and platforms transition to Web3 through seamless user and developer experiences,” said Dhruv Mangtani, Co-Founder of Notebook Labs.

“Web3 has the potential to transform how users and organizations interact with each other, and we thank our dedicated investors for their support as we seek to catalyze the Web3 movement. We can’t wait to begin introducing Notebook’s technology to users and protocols across the world.”, Mangtani continued.

“Zero knowledge proofs are critical to Web3’s privacy and scalability efforts, and we are thrilled to partner with the Notebook team as they empower protocols and users to realize the full potential of this technology,” said Lydia Hylton, Partner at Bain Capital Crypto.

“We look forward to continuing to support Notebook’s strong team as it creates a path for exciting development and interconnectivity in the services offered over the blockchain, while retaining decentralization and anonymity for users.”, Hylton continued.

The close of Notebook’s seed round comes after the company was selected as part of Y Combinator’s Summer 2022 batch, a bi-annual program in which thousands of startups apply to receive funding and guidance from Y Combinator. The Summer 2022 batch saw Y Combinator invest in 240 startups out of 19,000 applicants.


from Help Net Security https://ift.tt/9ERMP8w

Drawbridge names William Haney as CEO

Drawbridge has named William (Bill) Haney as CEO and appointed him to its board of directors. This CEO appointment represents the next step in Drawbridge’s expansion strategy as the company continues its growth to meet intense market demand for cybersecurity software and services for alternative asset managers.

As part of this plan, Drawbridge Founder and Board of Directors’ member Jason Elmer will become President, continuing to guide the company’s long-term vision and innovation strategy as Drawbridge evolves its next generation platform and customer experience to extend its market leading position.

“Bill is an accomplished leader who has steered some of the world’s most innovative and disruptive technology companies. The breadth and depth of his operational and hands-on experience scaling global businesses is unmatched, and the board and I are excited to have selected Bill as our next CEO,” said Jason Elmer, Founder and President of Drawbridge.

“Bill’s proven leadership skills will be invaluable to Drawbridge and our customers as we accelerate our global growth and continue to set the bar for innovation, customer service and cybersecurity excellence in the alternative investment industry.”, Elmer continued.

Haney is a financial services industry veteran with extensive board experience and a track record implementing high growth strategies, managing rapid change and scaling international sales, operations and technology investments.

He formerly served as CEO of Credit Benchmark, a pioneer in the creation of bank-sourced consensus credit ratings, and BISAM, a provider of performance, attribution, risk, GIPS composites management and reporting solutions that was acquired by FactSet Research Systems in 2017.

Throughout his career, Haney has held multiple senior roles at Thomson Financial and Thomson Reuters, among other international businesses. He also served as investor and non-executive chair of Alva (sold to Falfurrias Capital Partners in 2021) and most recently Enhesa, a market leader in helping companies track and understand global regulations for employee and consumer safety.

“The passionate and committed team at Drawbridge has built an extraordinary company with a product, vision and commitment to customers that are unmatched across the industry. It is my privilege to join this talented group and help drive forward Drawbridge’s mission,” said Bill Haney.

“In only a few years, more than 1,000 alternative investment managers have selected Drawbridge to help proactively manage their complete cybersecurity requirements and reduce their business risk. I’m excited to work alongside Jason and the leadership team as we begin the next stage of our growth journey, extend Drawbridge’s all-in-one platform and give alternative investment managers the solutions they need to keep their assets safe and comply with SEC and other regulations.”, Haney added.

2022 has been an exceptional year for Drawbridge. In September, the company received a strategic growth investment from Francisco Partners, a global investment firm that specializes in partnering with technology and technology-enabled businesses.


from Help Net Security https://ift.tt/PjhyM0H

These Are the Cheapest American Cities to Buy a Home in Right Now

Syracuse, New York
Photo: Wangkun Jia (Shutterstock)

It can be hard to keep up with the ever-changing housing market. With so many factors at play—like the pandemic, rising interest rates, and housing in short supply—the process of buying and selling homes has gotten more complicated. And, in many situations, it has become more expensive.

But that’s not the case everywhere. According to a new report from Realtor.com, “some cities still have humming home markets, with low prices that insulate, to some extent, against the effects of rising mortgage rates.”

So where are these havens of affordable housing? Here’s what to know about the 10 cheapest U.S. cities to buy a home in right now.

The 10 cheapest U.S. cities to buy a home in right now

First, a few things to know about these cities. Most of the affordable housing markets in the U.S. at the moment are in cities that were thriving at one point during their history—as industrial or manufacturing hubs, centers of transportation and commerce, or state capitals—then had a steep decline.

G/O Media may get a commission

A gift for literally everybody.
Gifts under $20, $10, and even $5. It’s Wish, the catch-all shop for all of the above.

Plenty of housing was constructed during the city’s boom times in order accommodate people relocating there for jobs. But when industry left town, plants closed, or train routes were no longer in service, the city fell into economic hard times, and saw its population dwindle.

Flash forward to today, and these cities have a larger supply of housing available at prices more affordable than other urban areas in the country. Here are the 10 cheapest markets, according to data from Realtor.com:

1. Youngstown, OH

Median home list price per square foot: $95
Median home list price: $149,900

2. Scranton, PA

Median home list price per square foot: $124
Median home list price: $225,000

3. Syracuse, NY

Median home list price per square foot: $130
Median home list price: $217,250

4. Wichita, KS

Median home list price per square foot: $134
Median home list price: $304,475

5. Jackson, MS

Median home list price per square foot: $138
Median home list price: $299,000

6. Little Rock, AR

Median home list price per square foot: $141
Median home list price: $298,873

7. Indianapolis, IN

Median home list price per square foot: $144
Median home list price: $300,000

8. McAllen, TX

Median home list price per square foot: $144
Median home list price: $270,000

9. Columbia, SC

Median home list price per square foot: $146
Median home list price: $308,900

10. Augusta, GA

Median home list price per square foot: $150
Median home list price: $311,575


from Lifehacker https://lifehacker.com/these-are-the-cheapest-american-cities-to-buy-a-home-in-1849718203

Don't Throw Out Your Fall Mums

Photo: image17 (Shutterstock)

When summer begins to wind down, there are a few telltale retail signs that fall is approaching: Halloween costumes, candy, and decorations take over the seasonal aisles in supermarkets and big-box stores; pumpkin spice flavored or scented products are everywhere; and customers are welcomed to retail establishments with an indoor and/or outdoor display of pumpkins and mums.

Vibrant fall mums have earned their place on front porches and stoops alongside pumpkins and various parts of dried-out corn plants as quintessential outdoor autumn decor. And so often, when the mums lose their color, their join the pumpkins and corn corpses in the trash.

But it doesn’t have to be that way. That’s because contrary to popular belief, many mums are perennials, not annuals. Here’s what to know.

Why you shouldn’t throw your mums out at the end of the season

While annual chrysanthemums—as in the kind that only live for one year—do exist, and also appear in retailers in the fall (mostly in smaller gift-sized pots), a “large majority” of the mums sold are the hardy perennial varieties, according to Old World Garden Farms.

G/O Media may get a commission

A gift for literally everybody.
Gifts under $20, $10, and even $5. It’s Wish, the catch-all shop for all of the above.

You can find out which type you have by checking the tag or little paper stake that comes with the plant when you buy it: Perennial mums will be labeled “chrysanthemum morifolium,” while annuals will be labeled “chrysanthemum multicaule,” Associated Press gardening columnist Jessica Damiano explains in a recent article.

If there’s no tag, she recommends checking the foliage: “Perennial mums have broad, deeply toothed leaves; annuals have narrow and less-notched foliage,” Damiano writes.

Will perennial mums survive in every climate?

According to Damiano, the climate in about half of the United States—areas in horticultural zones 5 through 9—is suitable for planting and growing perennial mums. While they can handle cold winter weather, mums can’t survive the deep freezes of New England, and some parts of the Northwest and West. They also don’t do well in extremely high temperatures seen in the southern parts of Florida, Texas, and California, as well as western Arizona.

What to do with your mums over the winter

Once your mums lose their color and start looking more like Halloween decorations, it’s time to take action. This means moving them indoors—pots and all.

Though it’s possible to plant mums directly in the ground in early fall, by this point in the season, that window has closed. That’s because they don’t have enough time to get their roots established in the soil, and will likely freeze and die over the winter.

Anyway, before moving your potted mums indoors, cut the plant back a few inches above the potted soil line, so it’s mostly stems and a few small leaves. Then, touch the soil. If it feels dry, give it a light sprinkle of water—not too much, or it can cause the roots to rot over the winter.

Ideally, you want to keep the potted mums somewhere indoors with temperatures between 45° and 60°, like a chilly corner of the basement, or a semi-heated or insulated garage.

The goal is provide the mums with the conditions to go dormant, while still keeping them alive. Give the mums a light sprinkle of water every few weeks, and that’s it. Then, in the early spring, you can either replant your mums in new pots, or plant them directly in the ground.


from Lifehacker https://ift.tt/XZdaj7w

Friday, October 28, 2022

Five Great Apps to Gamify Your Life

By

Meredith Dietz and Jordan Hicks


from Lifehacker https://ift.tt/Q7TZIJU

What's New on Paramount+ in November 2022

Over the past several years, Taylor Sheridan has become one of the most important movers and shakers in television. I mean, presumably. Like the work Dick Wolf and Steven Bochco—two other writer/producers whose shows trade in violence and crime—I don’t actually watch anything Sheridan makes.

But the buzz for series like Yellowstone, its prequel 1883, and the recent Mayor of Kingstown was loud enough that even I noticed it. And his next series, Tulsa King, co-created with Terrance Winter and premiering Nov. 13 on Paramount+, has an entertaining enough trailer—not the mention the presence of a craggy Sylvester Stallone in the lead role—that I’m going to add it to my queue.

Tulsa King | Official Trailer | Paramount+

Stallone plays Dwight Manfredi, a once-powerful mafioso fresh out of prison who is sent to the backwaters of Tulsa to start a criminal operation. A bit out of his element, Manfredi wanders into the local legal weed dispensary and starts talking business to the befuddled budtenders, promising to protect them from the gangs (“What gangs?”) and the law (“This is...legal?”) and generally treating the place like the sordid New Jersey city it obviously isn’t. It looks tense, funny, and tremendously entertaining.

Here’s everything else coming to Paramount+ in November, including the first and only season of the short-lived CMT drama Sun Records, a show about the early days of rock ‘n roll that covers some of the same ground as the recent Elvis biopic, as well as the scandalous marriage that derailed the career of Jerry Lee Lewis (RIP).

Paramount+ Originals coming in November 2022

Arriving Nov. 11

  • Transformers: EarthSpark premiere

Arriving Nov. 13

  • Tulsa King premiere
  • MTV Europe Music Awards

Arriving Nov. 18

  • Blue’s Big City Adventure premiere

Arriving Nov. 24

  • Criminal Minds: Evolution premiere

Arriving Nov. 25

  • Fantasy Football premiere

TV shows coming to Paramount+ in November 2022

Arriving Nov. 9

  • The Challenge (Season 36)

Arriving Nov. 11

  • The Greatest @Home Videos

Arriving Nov. 15

  • The Amazing Race (Seasons 1 - 22)

Arriving Nov. 16

  • Baby Shark’s Big Fishmas Special
  • The Casagrandes (Season 2)

Arriving Nov. 17

Arriving Nov. 23

  • Ryan’s Mystery Playdate Christmas Special
  • Top Elf (Season 2)

Arriving Nov. 24

  • The Thanksgiving Day Parade on CBS

Arriving Nov. 25

Arriving Nov. 26

  • Robbie the Reindeer – Hooves of Fire
  • Robbie the Reindeer – Legend of the Lost Tribe

Arriving Nov. 29

Arriving Nov. 30

Movies coming to Paramount+ in November 2022

Arriving Nov. 1

  • 2 Days In The Valley
  • A Boy Named Charlie Brown
  • A Christmas Carol
  • A Christmas Carol
  • A Walk on the Moon
  • An Inconvenient Truth
  • An Inconvenient: Truth to Power
  • Anita
  • Arctic Adventure: On Frozen Pond
  • Basic Instinct
  • Basic Instinct: Director’s Cut
  • Becoming Jane
  • Black Rain
  • Bram Stoker’s Dracula
  • Bruce Lee, The Legend
  • Christmas in Compton
  • Clueless
  • Coach Carter
  • Coffy
  • Cool World
  • Cousins
  • Crimson Tide
  • Dear White People
  • Down to Earth
  • Dr. No
  • Flight
  • Footloose
  • Forrest Gump
  • Four Brothers
  • From Russia with Love
  • Funny Face
  • Gladiator
  • Goldeneye
  • Goldfinger
  • High Fidelity
  • Hot Rod
  • How to Lose a Guy in 10 Days
  • In & Out
  • Into the Wild
  • Jackie Chan’s Project A
  • Jackie Chan’s Project A2 (A Gai Waak Juk Jaap)
  • John Carpenter’s Escape From L.A.
  • Justin Bieber: Never Say Never
  • Katy Perry The Movie: Part of Me
  • Lemony Snicket’s A Series Of Unfortunate Events
  • License to Kill
  • Like a Boss
  • Love, Rosie
  • Madonna: Truth Or Dare
  • Malena
  • Men at Work
  • Men, Women & Children
  • Miami Blues
  • Minority Report
  • Monster Trucks
  • Mousehunt
  • My Fair Lady
  • The Naked Gun: From the Files of Police Squad!
  • Naked Gun 33 1/3: The Final Insult
  • Nick of Time
  • Paranormal Activity
  • Paranormal Activity: The Ghost Dimension
  • Primal Fear
  • Rabbit-Proof Fence
  • Ride Like a Girl
  • Salmon Fishing in the Yemen
  • Salvador
  • Save the Last Dance
  • School of Rock
  • Scrooged
  • Seven Psychopaths
  • Shaolin Soccer
  • Sliver
  • Snoopy, Come Home
  • Something Wild
  • Son of Rambow
  • Split
  • Starship Troopers
  • Stop-Loss
  • Strictly Ballroom
  • Super 8
  • The Back-up Plan
  • The Barefoot Contessa
  • The Big Country
  • The Crow
  • The Crow: City of Angels
  • The Doors
  • The Great Gatsby
  • The Heart of the Game
  • The Italian Job
  • The Madness of King George
  • The Mexican
  • The Perks of Being a Wallflower
  • The Pope of Greenwich Village
  • The Professional
  • The Relic
  • The Spy Who Loved Me
  • The Sum of All Fears
  • The Three Amigos
  • The Train
  • The Warriors
  • The Weather Man
  • The Words
  • Things We Lost In The Fire
  • Titanic
  • Top Five
  • Transformers: Dark Of The Moon
  • Transformers: Revenge of the Fallen
  • Trekkies 2
  • Under the Tuscan Sun
  • Vice
  • Without a Paddle
  • Yours, Mine & Ours
  • Zoolander

Arriving Nov. 2

Arriving Nov. 3

Arriving Nov. 14

 


from Lifehacker https://ift.tt/5bXzON4

How to Clean Your TV Without Damaging It

By

Lindsey Ellefson and Jordan Hicks


from Lifehacker https://ift.tt/Uw1IhK8

Why Other Devices Put Your Laptop to Sleep

Photo: PAPALAH (Shutterstock)

Like smartphones and other battery-powered devices, laptops go to sleep to conserve energy. But you might notice your machine hitting the sack in the middle of work, for no apparent reason other than bringing another device too close. No, the battery didn’t die; it’s much simpler.

There are a few ways to manually put your laptop into sleep mode. On a Mac, you can click the Apple logo in the top right and choose “Sleep.” On most laptops—Mac or PC—you can press the power button to do the same (macOS may bring up the Lock Screen for a minute before going to sleep). Of course, the method most often used is to just close the laptop lid. Once the device is in clamshell mode, it automatically goes to sleep.

But therein lies the problem. Your laptop uses magnets to keep itself securely shut, but those magnets also let it know when the lid is closed. When the top of the lid gets close enough to the base of your laptop, it triggers sleep mode. That’s why, for many laptops, you can get it to sleep even before the lid is fully shut. These magnets are often strong enough to hold up AirPods, too (just be sure they aren’t there when you slam the lid shut).

However, your laptop doesn’t know the difference between the magnets in the lid and magnets in other devices. An iPad, for example, contains magnets for attaching smart devices. When you bring your iPad’s magnets close enough to the base of your laptop, it thinks your iPad is really the lid, and goes to sleep.

You can see the issue in action from this Reddit post. OP was confused as to why their laptop would turn off whenever their iPad got too close. The answer is, as we now know, magnets (how do they work)?

G/O Media may get a commission

A gift for literally everybody.
Gifts under $20, $10, and even $5. It’s Wish, the catch-all shop for all of the above.

How to change how often your laptop goes to sleep

Perhaps your laptop is still going to sleep on its own with no magnetic device to be found. In that case, I’d recommend diving into your computer’s power settings to see if you have a sleep timer set up. My Mac will go to sleep after 30 minutes of inactivity, but you can set that timer to as little as one minute. While that won’t affect things when you’re actively typing, you might be surprised how often you go without hitting a key or moving the cursor. If your sleep timer is short enough, it could be the culprit.

On a Mac, you’ll find the option in System Settings > Lock Screen (macOS Ventura) or System Preferences > Battery or Energy Saver. On Windows, head to Start > Settings > System > Power & battery > Screen and sleep (Windows 11) or Start > Settings > System > Power & sleep (Windows 10).

 


from Lifehacker https://ift.tt/ldxb3NM

Finish Everything With Breadcrumbs

Photo: Luisrftc (Shutterstock)

Frequently added before cooking as binder (for meatballs) or a coating (for chicken cutlets), breadcrumbs can be mistaken for something that needs to be cooked. But breadcrumbs are already cooked. They’re bread. They’re delicious, crunchy, and they deserve your attention. Not just as a prep ingredient, but as a finisher.

Serving breadcrumbs alongside a meal makes for a lovely flourish. Think of it like adding croutons to your salad, but super tiny. (And you don’t have to make a salad.) It can help boost the crust of already breaded components that may have lost some texture, or give a desirable crisp to something you never thought you needed crisped. One of the best ways I’ve experienced them was in a meal of strips of braised steak and Brazilian farofa. (Farofa is a “breadcrumb” made from cassava, more on that later.) I wouldn’t normally envision that steak cooked in that way—heavily marinated and drenched in sauce—could have a crisp outer layer. Yet after one taste of a piece adorned with a farofa dip, I was sold.

The most practical ways to apply breadcrumbs to anything are to sprinkle them on top by the spoonful (like a flavorsome fairy dust), or to simply use them as a dip: Scatter crumbs over your plate, or dip forkfuls of food straight into the crumbs. I prefer to use the dipping method for meats because it gives excellent coverage; dip anything that has even a tad of moisture to it, and the crumbs will stick beautifully.

Steamed or pan fried vegetables, rice, grilled chicken, or tofu: If it’s on your plate, it will be better dipped in breadcrumbs. That lovely meatball tastes great, but have you had it as a crunchy breaded meatball? Dunk it! The added benefit is that if for some unfathomable reason you don’t prefer it, you can push aside the dish of breading and continue on with your sad, crunchless, mono-textural meal.

As noted, this post-breading technique can be done with many types of crumbs, including other starches like cassava root farofa, panko, or crushed cracker meal. Make your own crumb dip by tossing your favorite ranch-flavored croutons into the food processor, adding seasonings or fried onions, or just stick with the canister of Italian style breadcrumbs you have in the back of your cabinet.

G/O Media may get a commission

A gift for literally everybody.
Gifts under $20, $10, and even $5. It’s Wish, the catch-all shop for all of the above.

Finishing with crumbs can bring an already delicious meal to new heights, and also be summoned as a Hail Mary to save disappointingly humid delivery food and make it edible again. Like that chicken sandwich that was described as “crispy” but was distinctly wet when you opened the bag. (I’m talking to you, Popeye’s.)

  


from Lifehacker https://ift.tt/39GtXfj