Tuesday, February 28, 2023

10 Professional Baking Tools I Use at Home

Photo: DiAnna Paulk (Shutterstock)

There are plenty of baked goods that spend more time cooling than they do in the oven. Give them an appropriate place to cool-off. A large, criss-cross patterned wire rack is possibly one of my most used tools in my kitchen, second to pots and pans. Yes, I use it for cooling cakes, but also for glazing desserts in ganache or thin icings, so the excess topping can run below. It’s also great for resting hot grilled cheese sandwiches so they don’t get soggy on the bottom, baking bacon, or roasting other meats to keep them above the level of their rendering fat.

The grid pattern is important, as is the large rectangular size. Single direction wire racks are okay, but smaller items can fall through, and soft cookies can become misshapen or break if they fall halfway off a wire. Rectangular wire racks are often sold in sizes that fit perfectly into rimmed baking sheets, so measure your baking sheets before purchasing. These two tools can work in tandem to cool large sheet cakes, or catch wayward crumbs. I often end up needing two racks to flip a hot cake out of its pan, so save your fingertips and buy two racks.


from Lifehacker https://ift.tt/35q1hb6

Use ‘Hydro-Dipping’ to Give Anything a Faux Marble Finish

Photo: Aarnav Dommata (Shutterstock)

Sometimes an old piece of glassware or plant pot simply needs a refresh, or you might have a thrifted item that doesn’t quite go with your decor. Refinishing can be a hassle, especially with ceramic and glassware—but there’s a way to use a bucket of water and some paint to make your old things look fresh again, with a simple faux marbling trick.

What you need before you get started

For this project, you’ll need a bucket of water big enough to submerge your upcycling project, some oil-based craft paint in two to three colors of your choice, or some spray paint in two to three colors of your choice, a barbecue skewer, a stir stick, and a tarp or newspaper to lay down on so it doesn’t damage the surface you’re working on. While spray paint is a popular option for this project, oil-based craft paint is a little bit easier to control. However, for larger items, spray paint is a simpler choice because of the speed you can use it and the size of the container. (For really tiny items or for paper, nail polish will work.)

Make sure to do this in a well-ventilated area because the fumes from oil-based paint are toxic. The substances used to clean up oil-based paint, like mineral spirits or turpentine, are also toxic, so be sure to wear gloves. Also take note that the paint you’re using for this is flammable, so stay clear of sparks and open flames.

How to create a faux marble finish

Set your container of water on a protected surface to begin—the paint you’re using will be hard to remove from most surfaces without ruining them. To create your marble pattern, put a few drops of paint or one spray from the spray can of each color into your water bucket. The oil won’t mix with the water, so the droplets will float on the surface. Add paint as necessary to make your pattern larger or more saturated. Next, use your skewer to move the paint on the water’s surface, creating a marble pattern. You can be as creative as you like with this step.

Once you’re happy with your marble pattern, you can dip your item in the water, turning it as necessary to cover the whole thing. If you’re not sure how the pattern will look, you can do a test on a different surface, such as a jam jar, before you commit to the final look. If you don’t have enough paint in the bucket on the first go around, you can add more and re-dip (although doing this too many times will cause the pattern to look muddy). Place your dipped project on a tarp or newspaper to dry, taking care not to smear the wet paint. Watch Phillis at JRC Restoration Decor & Designs use this technique:

Hydro Dipping Technique || DIY Faux Marble Ginger Jar || Thrifted Lamp turned Faux Marble Ginger Jar

To clean up the bucket, use the stir stick to gather the paint from the surface of the water, and then allow the paint to dry on the stick. This will keep the oil-based paint from going down the drain and causing a clog or an environmental issue (not to mention ruining your sink). Once your project is dry, it’s ready to use.


from Lifehacker https://ift.tt/TXBmOc6

What to Do When You Can Smell Layoffs Coming

It’s been a hell of a layoffs season. With this uncertainty in the labor market—not to mention the bigger picture of a looming recession—it’s natural to feel a sense of helplessness. You can’t live in a constant state of paranoia, but it helps to be on the lookout for some signs that layoffs are coming to your office. Even if you can’t fully prevent yourself from getting laid off, there are precautions you can take once the vibes get ominous.

Here are some of the clues that your workplace is preparing to lay people off, and what you can do to make sure you’re ready if (or when) they happen.

Common signs layoffs are nigh

Only hindsight is 20/20, but there are some signs you can look for now that might foretell layoffs. Of course, nothing here is exactly hard science. Try not to read into every little thing and drive yourself mad with layoff anxiety.

Your company’s finances aren’t doing hot

The most obvious clue that layoffs are likely is whether or not your company is suffering. Of course, some workplaces lay off employees even when they’re making money, and some employers hold onto their staff even as they’re going under. Still, the strongest indicator that a company might start slashing its workforce is if it’s looking desperate to cut costs.

Similarly, talk of a merger or acquisition is a strong sign that some employees will be laid off in the process.

You hear ominous buzzwords

Pivots. Restructuring. Cost-cutting measures. If you start seeing this kind of coded language in company-wide emails, brace yourself for cuts to your team.

You get a bad vibe

If you stop getting invited to meetings, or your start noticing meetings disappear from your calendar, it could mean your company is planning for a future without you in it. There’s a difference between office politics and a serious sense of doom.

It’s a Friday

This one is mostly in jest, but there is some logic to the workplace rumor that layoffs happen on Friday afternoons According to experts in Huffpost, breaking the news on a Friday is the choice for employers who want to give both the laid off employees and their remaining workforce the weekend to process the news at home.

Of course, layoffs can happen any day of the week and at any time. A cheery thought!

What you can do to prepare for layoffs

The best way to prepare for layoffs would be ensuring you’ve always been an invaluable cog in the company’s machine, or perhaps turning back time and fixing the larger economy. Until you figure that out, here are some precautions you can take once you start seeing the signs of an impending layoff.

  • Back up your important information. If you keep your calendar, contacts, and any personal files on your company-owned computer, make sure to download them to your personal devices. Your employer may shut off your access right when you get laid off, so you should regularly back things up on your own.
  • Take advantage of your health insurance now. There are ways to keep health insurance after losing your job, but it’s wise to stock up on prescription refills and squeeze in any appointments you can now.
  • Secure a positive referral for your next job. Layoffs are cruel and impersonal, but it’s in your best interest to make sure your boss still thinks highly of you on your way out.
  • Focus on your savings. If you predict a loss of income in the near future, you want to make sure you’ve built up an emergency fund to get you through uncertain times.

For more details about what to do before and after being laid off, read our guide here. Check out our tips for coping with layoff anxiety, plus how to explain your past layoff in your next job interview.


from Lifehacker https://ift.tt/VNiqs3c

How to Get Off a Scammer's 'Sucker List'

It’s probably not just a feeling you have: Some people really do get way more spam calls, emails, and texts than others. For every fake McAfee order email your friend gets, you get three missives from African, Swedish, Jordanian, and Australian princes trying to take your money—plus two fake package tracking texts and a call about your car’s extended warranty. Is it just luck of the draw, or is there a more sinister reason this happens?

As it turns out, you’re not targeted more than your friends by scammers because the universe is out to get you. The more likely reason is you somehow ended up on a “sucker list” scammers use to target victims.

What is a scammers’ “sucker list”?

A sucker list is an aggregate list of names, addresses, phone numbers, and other personal information that is created, sold, and bought by scammers, spammers, and dishonest telemarketers.

Scammers like to classify us victims as “suckers” once we’ve fallen for any of their many tricks. Whether you’ve been scammed out of $10,000 worth of Bitcoin, picked up a spam call, or replied (even to unsubscribe) to a spam email, your actions have marked you as a sucker—an easy mark—in the view of scammers, and gotten you placed on a list.

There is no one sucker list; many of them are constantly making the rounds on the dark web. They can also get eerily specific. “You can buy details as specific as people who are 80, disabled, live alone, respond to communication and play the Lottery,” Louise Baxter, head of the National Trading Standards scams team, told BCC in one of the first reports about the subject back in 2014.

How do you get on the “sucker list”?

Traditionally, aside from falling for a scam, scammers send blanket emails, texts, calls, and messages on social media and wait to see who responds. Anyone who does gets added to the sucker list.

However, as a CBS News report uncovered, you don’t necessarily need to have fallen for a scam or have even shown signs of life to be added to a sucker list. The same CBS News report also explained there are “tiers” to the list, which they describe more of a “pyramid.” Those who respond to any solicitation are on the bottom of the pyramid. The more information you provided, the higher up the list you move. Those on top of the pyramid are the ones who outright fell for a scams, and are seem as the most “valuable” marks. 

Another, more concerning way people can end up on a list is almost out of our control: Data broker companies collect personal information of millions of people and sell it for profit, sometimes to legit companies and sometimes to shadier types, according to a report from Kaspersky. They can collect your data from your web browsing history, public sources (like voter registration, court records, census data etc.), and commercial sources (like your online purchase history). Often you’ve even granted your consent for this to happen (like when you sign up to loyalty programs).

Your personal data is valuable to many parties: Marketers and businesses buy it from these brokers in order to offer more tailored advertisements. Some businesses buy it to verify that you are who you say you are (like when you get a new job and they run a background check on you). Insurance companies use it to see how risky of a bet you are, and use the information to set your rates. Even individuals can use sites like Spokeo to creep on their exes’ social media accounts.

The concerning part is that there is no federal law that makes it illegal for these companies to profit off of your information. The closest thing is California’s Consumer Privacy Act, which allows consumers to review the data collected about them and opt-out if they want. And this practice makes it susceptible to hacks (like Equifax’s 2017 data breach) and corrupt individuals from these companies who sell the data on the dark web for personal gain.

How do you get off the “sucker list”?

There’s no silver bullet solution to getting off the list or lists you might be on, but there are things you can do to go drop yourself down the tiers and reduce the number of spam communications you receive. With time, you can even drop off the list entirely.

Pay private companies to keep you away from data brokers

Some data brokerage companies offer services to remove you from other data broker lists, if for a fee, DeleteMe being one reliable option. World Privacy Forum provides a list of these services here. Keep in mind that you can do most of this opting out for free, but it’s more thorough and far less time consuming to pay a service like DeleteMe to do it for you. Paying one of these services won’t solve all your spam problems. It’ll help, but the effects will be short lived if you keep doing the things that got you on the sucker list in the first place.

Use a VPN

You can use a Virtual Private Network (VPN) to enhance your online privacy by keeping your IP address hidden as you go about the internet. Your data will also be encrypted.

Ask your charitable donations to be anonymous

If you donate money to charity, they very likely put you on a list to keep sending you donor information, and that list will probably eventually be sold or shared with other charities. Ask them to remove your name next time you donate.

Never respond to spam—even to unsubscribe

FTC Attorney M. Hasan Aijaz tells CBS News you can move down tiers on the list by not responding, clicking on spams, or acknowledging any of their attempts to trick you. Eventually, you will be dropped off the list entirely.

Change your phone number and email address

If you’ve been a victim of fraud, one step you can take is changing your telephone number and email address, notes Jake Moore, a cybersecurity adviser at software company ESET, speaking with The Daily Mail. While this is a hassle, it can make a big difference—especially if you keep your new contact info securely locked down. Use a Google Voice number or other temporary number you can forward to your phone, and use a separate email address for signing up for any mailing lists or deals. 


from Lifehacker https://ift.tt/wakemIY

The Best (and Most Affordable) Way to Store Old Video Games

Photo: robtek (Shutterstock)

If you collect video games, or are holding onto a batch of your childhood favorites, chances are you have more than a few loose carts and discs in your collection. Many retro games came in flimsy cardboard boxes, and I’m willing to bet I wasn’t the only person whose family got rid of game cases in favor of those giant CD binders.

While not every game needs to be stored in a box—SNES carts stack on top of each other just fine—a box is almost always preferable. Not only does a row of crisp game cases look better than a pile of loose carts, they also securely keep small Game Boy or Nintendo DS games secure, and keep disc-based games safe from scratches and sun damage. Unfortunately, it’s tough to find the original box for any game older than the PlayStation 4 era, and the older the game, the rarer—and more expensive—those boxes can be.

The good news is, you don’t need to buy an original box to safely store and display your unboxed video games without resorting to giant bins or ugly CD binders.

The case for repro cases

One of the best ways to store your loose games is with repro boxes. “Repro” is short for reproduction, and simply means the item is a recreation of the original product. You’ll often find repro video game cases, labels, and instruction manuals in the collection scene. Repro copies of game cartridges and discs are even common—but that discussion deserves its own post.

G/O Media may get a commission

Despite the commonality, “Repro” is a bad word in some collector circles and online communities. This aversion usually stems from collectors only wanting the authentic, original pieces, but there are also concerns scammers will try to pass a repro box or game off as the real thing and sell them at high prices.

However, if all you’re after is a box to safely store your game on your shelf—and you’re not trying to pass it off as the real thing—then there’s absolutely nothing wrong with using repros or custom cases. While these aren’t the “authentic” packaging, they are more affordable and readily available than rare and expensive originals, and often more durable, too.

There are many companies and independent sellers making high-quality repro cases and labels. One of the most well-known is Custom Game Cases, which sells affordable boxes for numerous retro consoles and handhelds like the SNES, Sega Genesis, Game Boy Advance, and more, as well as high-resolution labels of the original box art for hundreds of games. Unlike the flimsy cardboard boxes these original games came in, Custom Game Cases sells plastic clamshells that are custom molded to securely hold your games.

That said, you can easily find cardboard repros from highly-rated sellers on Etsy and eBay if you prefer to store your retro games in a more traditional cardboard box.

Repro boxes aren’t just a retro gaming thing, either. It’s pretty easy to find repro cases for newer, disc-based systems on those sites as well, which can be handy if you buy a used PlayStation 4 or 5 game that’s missing its original label.

DIY video game cases and labels

Not only are repro cases more affordable, available, and durable, but they’re also customizable. For example, maybe you prefer the Japanese box art of your favorite RPG over the North American version. Many sellers will offer cases with alternate or custom box art.

How To Print Replacement Game Cases At Home! [DIY] | Nintendrew

Or, if you can’t find the case or art you want, you can create it yourself instead.

Blank game boxes for just about every platform are inexpensive on Amazon, and high-resolution box art is easy to find on sites like Moby Games or through Google Image Search. From there, you can print it yourself. In my case, I made a custom box for my Phantasy Star IV: End of the Millennium cart that uses the (vastly superior) Japanese box art, but with the original English box’s text.

There are other DIY options out there, too, like storing Game Boy or Nintendo DS carts in cassette tape cases, or SNES and N64 games in plastic sleeves with custom end labels. These are obviously even less authentic than repro cases, but it can be fun to display your collection in novel ways like this.


from Lifehacker https://ift.tt/FL9jVKO

Monday, February 27, 2023

Resecurity identified the investment scam network Digital Smoke

Resecurity identified one of the largest investment fraud networks by size and volume of operations created to defraud Internet users from Australia, Canada, China, Colombia, European Union, India, Singapore, Malaysia, United Arab Emirates, Saudi Arabia, Mexico, the U.S. and other regions.

The bad actors operating as an organized crime syndicate developed a massive infrastructure to impersonate popular Fortune 100 corporations from the U.S and the U.K by using their brands and market reputation to defraud consumers. Once payments are collected from the victims, they make previously created resources vanish and set up the next new campaign – this is why investigators named the group “Digital Smoke”.

According to the latest report by FTC released last week called “The Top Scams of 2022” people reported losing $8.8 billion to scams. The total damage from investment fraud including ponzi and pyramid schemes exceeds $5.8 billion in the U.S and over $77 worldwide (2022), with significant rapid growth at the start of Q1 2023. Investment fraud does serious damage to investors – beyond monetary losses.

A FINRA survey points to health, marital and trust problems resulting from financial scams. Businesses experience significant damage in customer loyalty and brand reputation – in the long run negatively affecting sales and market profile.

Notably, the bad actors have chosen high-demand investment areas to impersonate world-known brands including ABRDN (UK), Blackrock (US), Baxter Medical (US), EvGo (US), Ferrari (Italy), ITC Hotels (India), Eaton Corporation (US/UK), Novuna Business Finance (UK), Tata (India), Valesto Oil (Malaysia), Lloyds Bank (UK), and many more. The majority of the identified fraudulent projects were related to financial services (FIs), oil & gas, renewable energy, EV batteries, electric vehicles, healthcare, semiconductors, and world-recognized investment corporations and funds with a global presence.

The information about Digital Smoke along with the identities of key actors has been timely shared with the Indian Cybercrime Coordination Center and the U.S. Law Enforcement in Q4 of 2022. In the result of the coordinated action and numerous domain takedowns, the majority of scam projects have been terminated.

Modus operandi of the group was focused on investment options in non-existing products and investment plans supposedly offered by the Fortune 100 corporations and state-owned entities. The bad actors developed a large network of WEB-resources and related mobile applications hosted on bulletproof hosting providers, and located in jurisdictions not easily reachable for immediate takedowns – the total number of identified hosts in December 2022 alone exceeded 350+ with thousands of related domains used for ‘cloaking’ (Black SEO), hidden redirects and short URLs for protection of the payment gateway used by fraudsters to collect payments from victims leveraging AliPay (China) and Unified Payments Interface (UPI) – an instant real-time payment system developed by National Payments Corporation of India, along with cryptocurrencies. Notably, a combination of these methods enabled fraudsters to process funds with great flexibility – supporting Google Pay (GPay), PhonePe, Paytm, and major online-banking platforms.

The bad actors registered multiple fake domain names which had similar brand spelling then promoted them via social media and instant messenger apps to attract investors. Notably, the links planted by bad actors to register new victims contained a referral code tied to affiliates promoting the scam via Youtube and Whatsup IM. Once the victim registers, the bad actors ask them to make a deposit by sending payment to an account registered in India.

Notably, the cybercriminals were focused on oil markets and renewable energy products. The impersonated Velesto Oil, a Malaysia-based multinational provider of drilling for the upstream sector of the oil and gas industry, along with major oil corporations including Shell, Glencore, Ovintiv and Lukoil. One of the latest brands abused in January 2023 was identified as ACWA Power based in the Kingdom of Saudi Arabia.

This aspect makes the campaign unique due to a strong focus on oil traders which typically is not widely used by investment scammers. In some of the observed scams, the bad actors offered victims the opportunity to invest in new oil fields, construction of petroleum stations, and technologies related to the renewable energy sector.

It’s worth noting, some of the language for this pretext was copied from existing investment programs, typically for entrepreneurs and franchises looking for new business opportunities in the oil and gas sector. This activity is not typical for cybercriminals and may clearly outline the differentiator of the Digital Smoke group. The activity spike was registered during the Christmas and New Year’s period, when online activity skyrocketed, and when both Internet users and financial institutions get overwhelmed with logistics and payments. In Q1, 2023 – the activity continued to involve new impersonated brands from other fields including semiconductors and EV batteries.

Besides enterprises, the fraudsters had no fear when it came to targeting state-owned organizations and used their profiles to defraud users. One of the organizations impersonated by the Digital Smoke fraudsters was the India Brand Equity Foundation, a Trust established by the Government of India – Department of Commerce, Ministry of Commerce and Industry. Following a similar pattern, the bad actors created multiple scams which impersonated government resources in United Arab Emirates by copying the profile of the Minister of State for Foreign Trade.

The Digital Smoke case is somewhat remarkable and may confirm how investment scams have now become more sophisticated than before. Fraudsters are investing large amounts of time and effort to prepare high-quality resources which look almost identical to their well-known investment product counterparts – in the case of Digital Smoke, for each investment scam they ran, they also created a separate mobile app with a unique design.

Digital Smoke has clearly demonstrated how bad actors leverage cross-border payments and various jurisdictions to complicate further investigation and identification of their victims. The investment fraudsters leverage this weakness to blur the origin of the activity as well as distribute payment flows by multiple merchants and money mules located in different countries. Resecurity identified a large network of money mules leveraging accounts in multiple financial institutions based in India who process the payments from victims. The accounts involved in fraudulent activity have been reported to law enforcement.

“Proactive fraud intelligence gathering enables to protect consumers and keep financial institutions aware about merchants used by cybercriminals. Their timely identification along with tracking of involved money mules helps to minimize potential damage caused by illicit activity,” said Christian Lees, CTO at Resecurity.

Notably, legitimate businesses who were impersonated suffer serious damages, both reputationally and from a customer loyalty perspective – that’s why an effective and ongoing brand protection system is one of the must-have solutions to minimize the negative side effects of such scams. Business leaders should consider monitoring the exposure of their brands online including but not limited to social media, mobile marketplaces, and instant messaging services.


from Help Net Security https://ift.tt/x0PnV4c

FTC reveals alarming increase in scam activity, costing consumers billions

Newly released Federal Trade Commission (FTC) data shows that consumers reported losing nearly $8.8 billion to fraud in 2022, an increase of more than 30 percent over the previous year.

consumers fraud FTC

Losing money to investment and imposter scams

Consumers reported losing more money to investment scams – more than $3.8 billion—than any other category in 2022. That amount more than doubles the amount reported lost in 2021.

The second-highest reported loss amount came from imposter scams, with losses of $2.6 billion reported, up from $2.4 billion in 2021.

The FTC received fraud reports from 2.4 million consumers last year, with the most commonly reported being imposter scams, followed by online shopping scams. Prizes, sweepstakes, and lotteries; investment-related reports; and business and job opportunities rounded out the top five fraud categories.

FTC’s Consumer Sentinel Network

The FTC’s Consumer Sentinel Network is a database that receives reports directly from consumers, as well as from federal, state, and local law enforcement agencies, the Better Business Bureau, industry members, and non-profit organizations. Twenty-three states contribute data to Sentinel.

Sentinel received more than 5.1 million reports in 2022; these include the fraud reports detailed above, as well as identity theft reports and complaints related to other consumer issues, such as problems with credit bureaus and banks and lenders. In 2022, there were over 1.1 million reports of identity theft received through the FTC’s IdentityTheft.gov website.

The FTC uses the reports it receives through the Sentinel network as the starting point for many of its law enforcement investigations. The agency also shares these reports with approximately 2,800 federal, state, local, and international law enforcement professionals. While the FTC does not intervene in individual complaints, Sentinel reports are a vital part of the agency’s law enforcement mission.


from Help Net Security https://ift.tt/7gBUEVJ

Sunday, February 26, 2023

Foiling intellectual property theft in a digital-first world

In today’s data-driven world, the expectations and demands faced by many organizations worldwide are reaching unseen levels. To meet the challenge, a data-driven approach is necessary, with effective digital transformation needed to improve operational efficiency, streamline processes, and get more out of legacy technology.

digital-first

But while a digital-first approach can help organizations elevate their performance to new heights, it can also make them more vulnerable to external threats. These dangers range from hostile foreign governments to highly motivated bad actors, all of whom are constantly looking for ways to bypass data security measures and get their hands on sensitive IP, secrets, and technology.

Understanding the risks faced

In a powerful joint speech with the FBI Director, Christopher Wray, earlier this year, MI5 Director General Ken McCallum urged leaders in attendance to ensure they are properly protecting themselves and their sensitive data before it’s too late. As part of this, he listed a series of key questions that every organization should ask itself to properly understand the risks faced. These include:

  • Does the organization know what its “crown jewels” are?
  • Does the organization have a thoughtful security culture at all levels, or does everyone leave it to a security department that’s off to one side, only to be contacted in an emergency?
  • Has the organization put the right controls in place to assess the risks attached to its funding sources and partnerships, and to protect its supply chain?
  • Does the organization have a strategic approach to managing the risks and have those risks been discussed at board level?

Addressing these questions can serve as a best-practice roadmap for organizations aiming to manage risk effectively. One of the biggest obstacles for public sector agencies to meet these challenges is fragmented and siloed data, which prevents them from seeing the full picture of their risk landscape. These pressures—coupled with an increasing pace of organizational decision-making, and the rapid availability and volume of data—are making it harder than ever to run an efficient and resilient agency. So, what are the options available to governments?

The growing role of advanced analytics in risk management

When it comes to risk management, technology is playing a bigger and bigger role for many organizations. Entity resolution and graph analytics are powerful tools to help business leaders better understand all parties that they may be considering doing business with before any commitment is made.

Entity resolution connects a wide range of disparate data to help remove data duplicates from data lakes, warehouses and/or databases, thus improving data quality. Different iterations of names, changes in address, or multiple phone numbers can harm IP theft investigations, which is why it’s vital that organizations can understand and trust their data. There are often inaccuracies and challenges to make accurate decisions with a weaker data infrastructure and currently as many as one in eight customer records are duplicates which is contributing to widespread mistrust through organizations.

Graph analytics uncovers critical information that would otherwise remain unknown. This includes things like existing/prior connections, any past or present financial issues faced, sanctions incurred, unauthorized digital or physical access attempts and many other factors, all of which can be used to make a more informed decision at the outset.

Better information equals better decision-making

Entering any new professional relationship, be it with an employee, customer, partner, or other entity, will always carry an element of risk. The more that is known about this risk beforehand, the less chance there is for nasty surprises down the road.

Of course, there are countless other day-to-day business scenarios, where having a complete picture of customers, partners, employees, suppliers, etc., can lead to better decision-making from a risk avoidance/mitigation perspective.

The beauty of advanced analytics is that it can use commercially available data from a wide range of sources including credit information, public records, corporate filings, social media, sanctions lists, and more, to quickly give organizations all the information they need. This enables contextual decision intelligence in which this connected view of organizational data can reveal the intricate relationships between people and places. This provides the context to turn data into better decisions at scale.

Every year, IP theft costs organizations around the world hundreds of billions of dollars in lost revenues. To mitigate this, public sector leaders need to do a better job of identifying the risks they face before it’s too late. Unfortunately, many of them simply lack the resources or knowledge to do so effectively. Using advanced analytics as part of any risk mitigation strategy saves hundreds of hours of manual risk analysis, enabling leaders to make truly informed business decisions at the outset of any new relationship, when it matters most.


from Help Net Security https://ift.tt/lkyt0O5

Stay one step ahead: Cybersecurity best practices to prevent breaches

In this Help Net Security video, Caroline Wong, Chief Strategy Officer at Cobalt, offers valuable insight into what leaders can do to instill stronger cybersecurity practices from the bottom up and prevent breaches.

The post Stay one step ahead: Cybersecurity best practices to prevent breaches appeared first on Help Net Security.


from Help Net Security https://ift.tt/YjFGk2R

Wiper malware goes global, destructive attacks surge

The threat landscape and organizations’ attack surface are constantly transforming, and cybercriminals’ ability to design and adapt their techniques to suit this evolving environment continues to pose significant risk to businesses of all sizes, regardless of industry or geography.

destructive wiper malware

Destructive APT-like wiper malware spreads wide

Analyzing wiper malware data reveals a trend of cyber adversaries consistently using destructive attack techniques against their targets. It also shows that with the lack of borders on the internet, cyber adversaries can easily scale these types of attacks, which have been largely enabled by the Cybercrime-as-a-Service (CaaS) model.

In early 2022, FortiGuard Labs reported the presence of several new wipers in parallel with the Russia-Ukraine war. Later in the year, wiper malware expanded into other countries, fueling a 53% increase in wiper activity from Q3 to Q4 alone.

While some of this activity was enabled by wiper malware that may have been initially developed and deployed by nation-state actors surrounding the war, it is being picked up by cybercriminal groups and is spreading beyond just Europe.

Unfortunately, the trajectory of wiper malware does not appear to be slowing any time soon based on the activity volume seen in Q4, which means any organization remains a potential target, not just organizations based in the Ukraine or surrounding countries.

“For cyber adversaries, maintaining access and evading detection is no small feat as cyber defenses continue to advance to protect organizations today. To counter, adversaries are augmenting with more reconnaissance techniques and deploying more sophisticated attack alternatives to enable their destructive attempts with APT-like threat methods such as wiper malware or other advanced payloads,” said Derek Manky, Chief Security Strategist & Global VP Threat Intelligence, FortiGuard Labs.

“To protect against these advanced persistent cybercrime tactics, organizations need to focus on enabling machine learning–driven coordinated and actionable threat intelligence in real time across all security devices to detect suspicious actions and initiate coordinated mitigation across the extended attack surface,” Manky continued.

Mapping CVEs

Exploit trends help show what cybercriminals are interested in attacking, probing for future attacks, and are actively targeting. FortiGuard Labs has an archive of known vulnerabilities, and through data enrichment was able to identify actively exploited vulnerabilities in real time and map zones of active risk across the attack surface.

In the second half of 2022, less than 1% of the total observed vulnerabilities discovered in an enterprise-size organization were on endpoints and actively under attack, giving CISOs a clear view of the Red Zone through intelligence of the active attack surface that they should prioritize efforts to minimize their risk and where to focus patching efforts.

Financially motivated cybercrime

FortiGuard Labs Incident Response (IR) engagements found that financially motivated cybercrime resulted in the highest volume of incidents (73.9%), with a distant second attributed to espionage (13%).

In all of 2022, 82% of financially motivated cybercrime involved the employment of ransomware or malicious scripts, showing that the global ransomware threat remains in full force with no evidence of slowing down thanks to the growing popularity of Ransomware-as-a-Service (RaaS) on the dark web.

In fact, ransomware volume increased 16% from the first half of 2022. Out of a total of 99 observed ransomware families, the top five families accounted for roughly 37% of all ransomware activity during the second half of 2022.

GandCrab, a RaaS malware that emerged in 2018, was at the top of the list. Although the criminals behind GandCrab announced that they were retiring after making over $2 billion in profits, there were many iterations of GandCrab during its active time.

It is possible that the long-tail legacy of this criminal group is still perpetuating, or the code has simply been built upon, changed, and re-released, demonstrating the importance of global partnerships across all types of organizations to permanently dismantle criminal operations.

Effectively disrupting cybercriminal supply chains requires a global group effort with strong, trusted relationships and collaboration among cybersecurity stakeholders across public and private organizations and industries.

The resourceful nature of adversaries

Cyber adversaries are enterprising in nature and always looking to maximize existing investments and knowledge to make their attack efforts more effective and profitable. Code reuse is an efficient and lucrative way for cybercriminals to build upon successful outcomes while making iterative changes to fine-tune their attacks and overcome defensive obstacles.

When FortiGuard Labs analyzed the most prevalent malware for the second half of 2022, the majority of the top spots were held by malware that was more than one year old.

FortiGuard Labs further examined a collection of different Emotet variants to analyze their tendency to borrow and reuse code. The research showed that Emotet has gone through significant speciation with variants breaking into roughly six different “species” of malware.

Cyber adversaries are not just automating threats but actively retrofitting code to make it even more effective.

The resiliency of adversarial supply chains

In addition to code reuse, adversaries are also leveraging existing infrastructure and older threats to maximize opportunity. When examining botnet threats by prevalence, FortiGuard Labs discover that many of the top botnets are not new.

For example, the Morto botnet, which was first observed in 2011, surged in late 2022. And others like Mirai and Gh0st.Rat continue to be prevalent across all regions. Surprisingly, out of the top five observed botnets, only RotaJakiro is from this decade.

Although it may be tempting to write off older threats as past history, organizations across any sector must continue to stay vigilant.

These “vintage” botnets are still pervasive for a reason: They are still very effective. Resourceful cybercriminals will continue to leverage existing botnet infrastructure and evolve it into increasingly persistent versions with highly specialized techniques because the ROI is there.

Specifically, in the second half of 2022, significant targets of Mirai included managed security service providers (MSSPs), the telco/carrier sector, and the manufacturing sector, which is known for its pervasive operational technology (OT).

Cybercriminals are making a concerted effort to target those industries with proven methods.

Log4j remains widespread

Even with all the publicity that Log4j received in 2021 and the early parts of 2022, a significant number of organizations still have not patched or applied the appropriate security controls to protect their organizations against one of the most notable vulnerabilities in history.

In the second half of 2022, Log4j was still heavily active in all regions and was second. In fact and FortiGuard Labs found that 41% of organizations detected Log4j activity, showing just how widespread the threat remains.

Log4j IPS activity was most prevalent across tech, government, and educational sectors, which should come as no surprise, given Apache Log4j’s popularity as open-source software.

Delivery shifts demonstrate urgency for user awareness

Analyzing adversarial strategies gives us valuable insights into how attack techniques and tactics are evolving to better protect against future attack scenarios. FortiGuard Labs looked at the functionality of detected malware based on sandbox data to track the most common delivery approaches. It is important to note that this only looks at detonated samples.

In reviewing the top eight tactics and techniques viewed in sandboxing, drive-by-compromise was the most popular tactic used by cybercriminals to gain access into organizations’ systems across all regions globally.

Adversaries are primarily gaining access to victims’ systems when the unsuspecting user browses the internet and unintentionally downloads a malicious payload by visiting a compromised website, opening a malicious email attachment, or even clicking a link or deceptive pop-up window.

The challenge with the drive-by tactic is that once a malicious payload is accessed and downloaded, it is often too late for the user to escape compromise unless they have a holistic approach to security.


from Help Net Security https://ift.tt/ItCM4dr

Third-party risks overwhelm traditional ERM setups

Enterprise risk management (ERM) teams are struggling to effectively mitigate third-party risk in an increasingly interconnected business environment, according to Gartner.

third-party risks ERM

ERM struggles to elevate the right issues

In a Gartner survey of 100 executive risk committee members in September 2022, 84% of respondents said that third-party risk “misses” resulted in operations disruptions.

“Most organizations have seen an increase in the number of third parties under contract in recent years,” said Chris Matlock, VP, research in the Gartner Legal Risk & Compliance Practice. “Moreover, a majority of organizations are also using third parties for new-in-kind-services and have become more reliant on them to conduct their operations. While increased use of third parties can improve business operations in many ways, it also introduces risks that are causing notable impacts on organizations.”

“ERM involvement in third-party risk management activities has increased across the board since 2016,” said Matlock. “However, just doing more isn’t enough because the characteristics of third-party risk undermine the effectiveness of a typical ERM setup.”

ERM is struggling to elevate the right issues because it is generally failing to limit its focus to a manageable set of issues. ERM leaders are not clearly defining which issues must be acted on first, and they are not typically preparing their audiences well to take tangible steps on the issues they surface.

Managing third-party risk in a large organization

There are three aspects that ERM must do differently to improve effectiveness in managing third-party risk in a large organization, an approach Gartner calls enterprise third-party risk management.

Essentially, this is an approach to help ERM teams manage the information overload that is being created by the exponential increase in risk volume and variability brought about by the rapid growth of third parties use.

1. Third-party risks tend to be high volume, heterogeneous in nature, and vary greatly in importance across the business. It is hard, therefore, to identify and prioritize what matters most. ERM must first isolate and combine only those inputs that matter most at the enterprise level, enabling them to focus on aggregating the most important inputs and addressing the most critical enterprise third-party risks.

2. ERM must work to enable alignment across a diverse set of risk owners to obtain a holistic view and create opportunities for them to work towards consensus. In practice, this means facilitating direct thought-partnership between risk co-owners with ERM adding expertise and aligning actions, as opposed to ERM acting as a central co-ordinator of all risk information and mitigation.

3. ERM’s role as a trend spotter is also undermined by the expanding third-party landscape because the potential issues are too numerous and available data is often point-in-time and lagged. Again, the solution is to narrow down the scope of what is being monitored, limiting focus to the most critical emerging issues and proactively tracking them with a set of easily monitored forward-looking indicators that enables ERM to reliably spot critical enterprise risk trends.

“With third-party risk exposure elevated and a multitude of incoming threats on the horizon, risk committees are expecting ERM to play a greater role in managing third-party risk,” said Matlock. “Yet traditional ERM posture is struggling to provide a concise, actionable view of third-party risk at the enterprise level. That’s why ERM must focus on enterprise third-party risk management, which involves defining enterprise-level priorities, enabling cross-functional alignment, and monitoring forward-looking indicators.


from Help Net Security https://ift.tt/SUEj154

Contrast Security adds Microsoft Azure Functions support to evaluate serverless risks

Contrast Security expands Contrast Serverless Application Security offering to support Microsoft Azure Functions and enable customers to scan for security vulnerabilities on multi-cloud environments.

Organizations are rapidly adopting serverless and cloud-native development due to their inherent benefits. However, companies struggle to understand what applications are fully secured due to public cloud providers’ “shared responsibility security model,” especially if they’re leveraging multi-cloud IT strategies.

According to the Forrester Avoid The Security Inconsistency Pitfalls Transitioning To Serverless 2022 report, “data shows 74% of infrastructure decision-makers at firms that are adopting public cloud use two or more public clouds and 17% are using five or more. Therefore, it’s no surprise that 82% of cloud users have experienced security events due to confusion over shared responsibility security models.”

Contrast Serverless meets the demands of organizations requiring a new security tooling purposely built to evaluate serverless risks while protecting against common vulnerabilities (CVEs), detecting misconfigurations and uncovering user privilege issues within a single interface.

“With the tremendous adoption of Microsoft Azure Functions by customers around the globe, we’re glad to see a partner like Contrast Security deliver a modern approach to help those organizations optimize their serverless security,” said Tony Surma, CTO, US Partners, Microsoft. “Supporting proper permissions settings and uncovering vulnerable code with suggested remediation is an essential part of a secure modern application platform.”

With the addition of Microsoft Azure Functions support, organizations will be able to evaluate their serverless application risk on both Amazon Web Services (AWS) and Microsoft platforms from a single offering, as well as other benefits including:

  • Complete visibility of cloud-native serverless functions within the application to enable AppSec team to monitor the organization’s serverless posture at all times.
  • Statically scan for vulnerabilities in open source dependencies used within applications and custom code.
  • Detect misconfigurations.
  • Uncover least privilege issues based on Microsoft Azure function policy roles and active directory configurations.
  • Generate a contextual Microsoft Azure Functions risk score based on the above methods enabling teams to address the highest risk issues first.
  • Ability to apply remediation on function code both in AWS and/or Microsoft Azure environments.

“The ability to analyze access permissions, evaluate the security posture of open source components and identify attack surfaces together provides organizations with the context and precision needed to assess serverless application security risks. This combined with the added benefit of uncovering high-priority issues during the development process – and not after the fact when the application has already been made publicly available – is a unique value delivered by Contrast,” said Steven Phillips, VP of Product Marketing at Contrast Security. “Developers can now efficiently secure cloud-native applications and take advantage of best-of-breed offerings from multiple hyper-scale cloud providers.”


from Help Net Security https://ift.tt/WhGdQK9

Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!

Even in Apple's and Google's "walled gardens", there are plenty of 2FA apps that are either dangerously incompetent, or unrepentantly malicious. (Or perhaps both.)
from Naked Security https://ift.tt/8WC9ijv

How to Clean Unsealed Concrete Floors in Your Basement or Garage

Photo: Phillip Foster (Shutterstock)

Out of all the usual household tasks, washing the floors is one of the easiest to put off (repeatedly). It’s a lot of hassle to go through only to have people walk on the clean floors as soon as they dry.

And if you happen to have unsealed concrete floors in your basement or garage, you probably have better things to do than wash them on a regular basis (if ever). But let’s say that you find yourself in a situation where you really need to clean these hard, unfinished floors. Here’s what to do.

How to clean unsealed concrete floors

Because unsealed concrete is naturally porous, when a basement or garage floods or something spills, floors made of the material tend to absorb the liquid, which, if given a chance to soak in, can result in stains. But even if liquid isn’t involved, any grooves, cracks, or unevenness in the floor give dirt and dust a place to settle.

Flood clean-up is a topic for a different day, so today we’re going to focus on cleaning unsealed concrete floors when they’re dry. Let’s go:

Clear debris

If you don’t have a shop vac, use a broom and dustpan to sweep up any larger pieces of debris that has accumulated on the floor—things that might damage a regular vacuum.

G/O Media may get a commission

Thoroughly sweep

Now that the bigger pieces are gone, go over the floor again with your shop vac or regular vacuum, taking the time to suck up as the remaining dust and dirt. Break out the attachments, if necessary.

Tackle the stains

If you come across any stains that you’d like to remove, now’s the time to do that. A few of your options include using:

  • Baking soda and hydrogen peroxide: Make a paste out of both ingredients, apply some to the stain, then scrub with firm-bristled brush. If it doesn’t work right away, apply more of the paste and this time, let it sit for 30 minutes before scrubbing.
  • Tide (or a similar powdered) detergent: Mix the detergent with a little water to make a paste. Wipe the floor with a wet cloth first, apply the paste, then use a brush to scrub. Rinse the area with clean water.
  • White vinegar: Pour white vinegar over rust stains, let it penetrate for at least 30 minutes, then scrub it with a stiff-bristled brush, and rinse the area with clean water.
  • Liquid dish soap: Apply to stains either directly or mixed with warm water, scrub, then rinse.

Wash the floor

Grab a mop and a bucket and mix up one of the following solutions:

  • Baking soda (1/2 cup) mixed into a large bucket of warm water
  • Liquid dish soap (2 tsp) + white vinegar (1 cup) mixed into one gallon of warm
  • Tide [or other powdered laundry detergent] (1/3 cup) mixed into one gallon of warm water

Mop the floor once with the cleaning solution, and then a second time with clean, warm water. Use a towel to dry any areas where water has pooled. Otherwise, let the floors air dry.


from Lifehacker https://ift.tt/MPp05Tw

The Best American Cities for Remote Workers Right Now

Photo: RodClementPhotography (Shutterstock)

Within the span of only a few years, remote office work went from being considered a perk—or something that wasn’t feasible for most people—to a necessity during the early days of the COVID-19 pandemic, and then back to being largely thought of as some type of benefit or luxury.

That said, there are still many people working remotely (in some cases, because their company closed its offices), as well as those who started prior to 2020—including full-time digital nomads.

If you’re among them, and happen to be looking for a change of scenery, you may be interested in a new report featuring a list of the top-100 metro areas in the U.S. for remote workers. Here’s what to know.

How were these cities ranked?

In order to determine which American cities made the list, and how they rank, the team at Reviews.org took the following factors into consideration:

G/O Media may get a commission

  • Average WiFi download speed
  • Number of free WiFi hotspots
  • Percentage of available remote-friendly jobs within a 25 mile radius
  • Average monthly rent cost per square foot
  • Distance (in miles) from the nearest airport
  • Distance (in miles) from the nearest national park
  • Average annual temperature
  • Number of state recreation areas

The best U.S. cities for remote workers

Based on the criteria mentioned above, these are the top-10 U.S. metro areas for remote workers, according to Reviews.org:

  1. Atlanta, GA
  2. Portland, OR
  3. Austin, TX
  4. Seattle, WA
  5. Phoenix, AZ
  6. Houston, TX
  7. Dallas, TX
  8. Chicago, IL
  9. Las Vegas, NV
  10. San Francisco, CA

The report goes through the specifics of what sets these 10 cities apart, and includes the full list of the top-100 metro areas, as well as additional details about the methodology used to identify and rank the cities.


from Lifehacker https://ift.tt/Z7DyuEh

Week in review: ChatGPT and cybersecurity, hidden vulnerabilities in Docker containers

The week in security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Google Protected Computing: Ensuring privacy and safety of data regardless of location
In this Help Net Security interview, Royal Hansen, VP of Engineering for Privacy, Safety, and Security at Google, talks about Protected Computing, the impact of data protection regulations, and privacy in general.

Users looking for ChatGPT apps get malware instead
The massive popularity of OpenAI’s chatbot ChatGPT has not gone unnoticed by cyber criminals: they are exploiting the public’s eagerness to experiment with it to trick users into downloading Windows and Android malware and visit phishing pages.

Defenders on high alert as backdoor attacks become more common
Although ransomware‘s share of incidents declined only slightly from 2021 to 2022, defenders were more successful detecting and preventing ransomware, according to IBM.

Cybersecurity layoffs in 2023: What to expect?
The economic downturn predicted for 2023 will lead to layoffs but cybersecurity workers will be least affected, says the latest (ISC)² report. Also, as soon as things get better, they will likely be the first ones to get (re)hired.

VMware patches critical injection flaw in Carbon Black App Control (CVE-2023-20858)
VMware has fixed a critical vulnerability (CVE-2023-20858) in Carbon Black App Control, its enterprise solution for preventing untrusted software from executing on critical systems and endpoints.

PoC exploit, IoCs for Fortinet FortiNAC RCE released (CVE-2022-39952)
Horizon3.ai’s Attack Team has released a PoC exploit for CVE-2022-39952, a critical vulnerability affecting FortiNAC, Fortinet’s network access control solution.

What can we learn from the latest Coinbase cyberattack?
Cryptocurrency exchange Coinbase has fended off a cyberattack that might have been mounted by the same attackers that targeted Twillio, Cloudflare and many other companies last year.

Twitter will start charging users for SMS-based 2FA option
Twitter has announced that starting with March 20, users who don’t pay the Twitter Blue subscription will no longer be able to use the SMS-based two-factor authentication (2FA) option.

Four steps SMBs can take to close SaaS security gaps
Despite economic volatility and tighter budgets, adoption of software as a service (SaaS) continues to increase.

Cybersecurity takes a leap forward with AI tools and techniques
Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks.

ChatGPT is bringing advancements and challenges for cybersecurity
As with any new technology, ChatGPT can be used for both good and bad – and this has major implications for the world of cybersecurity.

Researchers find hidden vulnerabilities in hundreds of Docker containers
Rezilion uncovered the presence of hundreds of Docker container images containing vulnerabilities that are not detected by most standard vulnerability scanners and SCA tools.

Why people-driven remediation is the key to strong API security
In this Help Net Security video, Matias Madou, CTO at Secure Code Warrior, discusses how pursuing the latest and greatest security tools can distract developer teams from where attention to detail is still needed: people-driven remediation.

Healthcare data breaches still higher than pre-pandemic levels
The number of data breaches affecting healthcare providers declined in the second half of 2022, consistent with a downward trend over the past two years, according to Critical Insight.

The top security threats to GraphQL APIs and how to address them
Enterprises looking to modernize their APIs are increasingly switching from the REST architecture to the open-source data query and manipulation language GraphQL.

How advancing cyber education can help fill workforce gaps
In this Help Net Security video, José-Marie Griffiths, President of Dakota State University, discusses how this shortage is not just a mere inconvenience but a major threat compromising the safety and security of companies and putting the sensitive information of their clients and customers at risk.

Complexity, volume of cyber attacks lead to burnout in security teams
The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential regulatory risk, according to Magnet Forensics.

Are your IoT devices at risk? Cybersecurity concerns for 2023
In this Help Net Security video, J.R. Cunningham, CSO at Nuspire, discusses IoT cybersecurity concerns for 2023.

Most vulnerabilities associated with ransomware are old
Researchers identified 56 new vulnerabilities associated with ransomware threats among a total of 344 threats identified in 2022 – marking a 19% increase year-over-year.

Insider threats must be top-of-mind for organizations facing layoffs
In this Help Net Security video, Nick Tausek, Lead Security Automation Architect at Swimlane, talks about how with the stress, anxiety, frustration, and unknown of what lies ahead for these suddenly unemployed workers, organizations need to prepare themselves for insider threats.

Resecurity warns about cyber-attacks on data center service providers
Resecurity warns about the increase of malicious cyber activity targeting data center service providers globally.

What to expect at BSidesNYC 2023
In this Help Net Security video interview, Huxley Barbee, lead organizer of BSidesNYC 2023, talks about the upcoming event.

New infosec products of the week: February 24, 2023
Here’s a look at the most interesting products from the past week, featuring releases from CyberGRX, Lacework, Malwarebytes, Netography, Nudge Security, and Xcitium.


from Help Net Security https://ift.tt/WmnOvE9

Saturday, February 25, 2023

The Best Way to Stop Subvocalizing and Read Faster

Photo: Ollyy (Shutterstock)

With an almost infinite amount of information constantly at our fingertips, it helps to be able to read quickly—or at least at a decent clip. Although we may not think of what we do as “reading” in a traditional sense, many TikTok videos and Instagram reels have subtitles and captions, so even if you don’t actually pick up a book, you’re still reading something.

If you’ve never been the fastest reader, you may still find yourself struggling to keep up. But, as we’ve pointed out in a previous Lifehacker article, there are ways to pick up a bit of speed, like cutting down on subvocalization. And, as it turns out, there are a few ways to do that. Here’s what to know.

What is subvocalization?

So what exactly is subvocalization? Basically, it means that when you’re reading silently, you say each full word in your head as you go. And while subvocalizing does tend to slow you down as you read, it also has some benefits, too, including improving reading comprehension, and leaving a stronger impression of what you just read in your short-term memory.

How to stop subvocalizing

Benefits aside, if your primary goal is to read faster, cutting back on subvocalization may help with that. Here are three methods you can try, courtesy of Melissa Baron of Book Riot:

  1. Scan the page before reading it carefully: It’s natural to subvocalize when we come across unfamiliar words, so keep an eye out for them in a quick initial scan of the page so you can sound them out—or look them up—without it slowing you down.
  2. Distract yourself: Chew gum or snack on something to keep your mouth busy, which should help stop yourself from mouthing words as you read. Or, listen to instrumental music so you concentrate on that, and not sounding out the words you read in your head.
  3. Keep your eyes focused: Skipping around the page—as we tend to do when we encounter a word we don’t know—not only slows us down in general, but also often leads to subvocalizing. Instead, place your finger, a ruler, or piece of paper directly under the line you’re reading to help keep your place.

from Lifehacker https://ift.tt/B6PIESg

Friday, February 24, 2023

The Trick to Fixing a Broken Buttercream Frosting

Photo: Oleksandra Naumenko (Shutterstock)

It might look like fluff, but buttercream frostings are delicate emulsions. When chilly temperatures interfere with this fine balance, buttercream can break. The “break” could refer to the state of the emulsion or to your heart, because the look of broken buttercream is, oh, so sad (and gross). Luckily, fixing a broken buttercream can be simple.

Buttercream most commonly breaks during the initial mix, or while reheating frosting you had stored in the fridge or freezer. When it happens, you’ll know. Best case scenario, it will look mealy, greasy, or watery. Some call this “split.” At its worst, it will have hundreds of white chunks surfing around in a clear, syrupy liquid. This happens most commonly with marshmallowy meringue buttercream, rendering it decidedly un-marshmallowy. It’s not pretty. The buttercream isn’t fully emulsified and, barring a mistake in the recipe, the butter is your problem and solution.

You need to heat up that butter, along with the rest of the mixture. Those of us who, in our delirium, have reached down to poke at broken buttercream have felt that the white clumps are firm, maybe even hard. This indicates that fats are cold and have separated from the rest of the mixture. In order to have a soft, spreadable frosting, your main ingredient needs to be soft and spreadable. That means warm-ish butter. This could be an “I told you so” moment for the room-temperature-ingredients-crew, but broken buttercream can happen even if you started with softened butter. Forgive yourself. It’s easy to fix. You just need to bring the frosting up to temperature. The following methods can fix a stubborn frosting that refuses to emulsify, and quickly reheat a frosting you had stored in the fridge to a spreadable consistency.

Use flames

The most fun way to heat up the frosting is with a blowtorch. This only works if your mixer has a metal bowl. Do not do this with a glass bowl. Turn on the mixer with the broken frosting, and run the torch’s flame along the bottom and sides of the bowl while it mixes. Stop every 10-20 seconds or so (depending on the size and power of your torch it might be less time). The mixture against the metal will melt. Let the hot stuff blend in, and it will begin to take the rest of the mixture up to temperature. The broken globules of fat will become fewer, and larger, until it is one homogenous mixture. Alternatively, you can take the metal bowl and hold it over the flame of a gas burner for a few seconds to melt some of the mixture. Return it to the mixer to blend.

G/O Media may get a commission

Melt some in the microwave

Not everyone has a torch stashed in their kitchen, but odds are good that you have a microwave. Remove about a cup of the broken frosting and put it in a microwave safe measuring cup. Heat up the frosting in the microwave until melted, this won’t take long, maybe 15-20 seconds. Pour the hot, melted frosting back into the rest of the batch, and mix until fluffy. This can be repeated if needed.

Mix and wait

Although it can take a while, you can set your mixer on and walk away. No flames required. Set your mixer speed to high or medium, but I usually go with the fastest speed the frosting can handle without flying out of the bowl. (Slower speeds will take a little longer to warm up.) The buttercream will eventually come up to room temperature no matter what, and the mixer will help expedite this. The caveat is that emulsification won’t happen if your ambient temperature is below 65°F degrees (the lowest temperature for softened butter). If the weather is chilly, try one of the other two methods, and you’ll be ready to frost a cake in no time.


from Lifehacker https://ift.tt/tWB459j

How Rising Interest Rates Will Affect Your Finances the Rest of the Year

Photo: Rawpixel.com (Shutterstock)

In ongoing efforts to combat inflation, the Federal Reserve announced early February that it’s raising interest rates by 0.25% up to a target range 4.5 to 4.75%. This is the eighth meeting in a row to result in increased rates, and the Fed says they expect to continue rising.

When the Fed raises interest rates, they increase what’s known as the federal funds rate. Although this is not the same rate consumers pay, the federal funds rate still affects us regular consumers in our everyday life. Here’s what to know about increasing interest rates, and what you can do as a borrower and saver.

How the new interest rate impacts your life

The federal funds rate is designed to set what banks charge each other, but it trickles down to everything from mortgages to student loans. If you’re planning on applying for a credit card, a home, or a car loan any time soon, here’s how the latest interest rate hike will impact your life.

Credit card rates

Although many of us are not vigilant about our credit card’s interest rate, those numbers are at a decade high and will continue to rise. Most credit cards have a variable rate, and they directly follow the direction of the federal funds rate.

G/O Media may get a commission

When your credit card’s interest rate rises, make sure you have a plan pay down any credit card debt. And perhaps the easiest way to lower your credit card’s interest rate? Just ask.

Mortgage rates

The higher the mortgage rate, the lower your purchasing power as a homebuyer—impacting how much home you can afford and how high your monthly payments will be.

We explain what a high mortgage rate means for your monthly payment here. For more, you can find out how much the current rate will impact your monthly payments with an online mortgage calculator.

Most types of loans

Auto, student, and many private loans are often fixed. Unfortunately, they’re not immune to the Fed’s latest benchmark. Rising interest rates still lead to a higher average interest rate and even bigger payments down the line.

If you’re planning on buying a car or taking out a student loan any time soon, your best hope is to use a high credit score to hopefully access a lower rate. Check out our guides to boosting a low credit score and maintaining a high one.

The bottom line

While inflation seems to be coming down since its peak this past summer, it sure has been persistent the last couple of years. While the Fed raised interest rates in an attempt to keep easing inflation, it’s important to be a conscientious borrower and saver. This might mean holding off on taking out a loan on large purchases for the time being, as well as boosting your power as a borrower with a high credit score.


from Lifehacker https://ift.tt/iZWmO3c

You Can Get Peacock Premium for 50% Off Right Now

Photo: monticello (Reuters)

It seemed like streaming services started with a revolutionary idea—only paying for what you want and cutting out the rest. It worked for a while, but now it seems to have come full circle, with some services like Netflix turning their attention to an ads revenue strategy to sustain themselves. Peacock—which you can get for 50% off for a year right now—is the epitome of the full circle “new-wave” of TV streaming. So what does it get you?

What is Peacock Premium?

Peacock is NBCUniversal’s streaming service that offers on-demand shows and movies, including Peacock original content. Peacock Premium is the basic tier of the plan, which is usually $50 for a yearly plan, or $5 a month. You get live sports and events, including Premier League, WWE, Sunday Night Football, and MLB Sunday Leadoff; more than 50 channels (see the full list here); Spanish channels like Telemundo; and access to their original shows like Poker Face, Sick, Bel Air, and Love Island USA.

What you don’t get with Peacock Premium that you do get with the Plus plan (which costs $10 a month) is the ability to download and watch certain content offline; 24/7 access to your local NBC channel; and probably most importantly, an ad-free streaming experience.

How to get Peacock Premium for a year for 50% off

To get Peacock Premium for 50% off, or $2.50 per month for a year, go to their check-out where you will have to create an account. Once you do, click on “Have a promo code?” and type “UMRWKXQECB. You should then see your monthly total drop to $2.50.

G/O Media may get a commission

It’s not clear how long the code will be good for, so if you plan to use it, do it sooner than later. Keep in mind that your subscription will go back to $5 per month after the year is up and will auto-renew until you cancel it. You can also cancel at any time by visiting your account. You can read Peacock’s terms of use here.


from Lifehacker https://ift.tt/RI60oyH

Pirating Final Cut Pro Is More Dangerous Than You Think

Most professional software these days has switched to expensive subscription-based models, but not Apple: Final Cut Pro still costs the same $299 it did when the app launched in 2011. Still, three hundred bucks ain’t cheap, leading some to seek, let’s say, “alternative” markets for the app. However, if you’re tempted to pirate Final Cut Pro for a free edit session, don’t: It’s too dangerous.

As reported by 9to5Mac, cybersecurity company Jamf Threat Labs recently discovered malware within pirated copies of Final Cut Pro. This in and of itself isn’t necessarily a shock. Pirated software doesn’t come with the same security or protections you expect when downloading an app through an official outlet like the Mac App Store. Bad actors, then, take advantage of the situation, packing malware into popular apps to infect users looking for a free app.

However, the malware Jamf Threat Labs discovered in pirated copies of Final Cut Pro isn’t necessarily designed to steal your information or break into your accounts. Rather, it’s crypto-mining (or crypto-jacking) malware, which can turn your power-efficient Mac into a chore to use.

How crypto-jacking impacts your Mac

Mining for cryptocurrency demands a lot of resources, forcing miners to invest in both the equipment and the energy costs. Some, instead, choose to invest in other people for both: Once installed, crypto-mining malware hijacks your Mac’s processing power to mine cryptocurrency for the hacker’s benefit. That way, the hacker doesn’t need to invest any of their resources into crypto-mining rigs, and can outsource those tasks to their victims.

G/O Media may get a commission

Good for them, bad for you. This type of malware, like all crypto-mining software, is demanding on your system, especially on your GPU, the chip that processes graphics on your computer. In fact, because so many crypto-miners were purchasing GPUs for their rigs, the price of GPUs shot up. There’s an incentive for bad actors to push the practices onto you, where you’ll experience all the system slow-downs and energy costs of the practice.

Of course, the impact on your system isn’t the only motivation to avoid this situation. Unwittingly installing malware on your Mac is always bad. Nobody wants strange software on their machine—it’s the definition of an invasion of privacy, whether or not you notice the effects of it.

This crypto-mining malware is particularly sneaky

Even more concerning in this specific case, Jamf Threat Labs found that macOS’ usual defenses weren’t catching the crypto-mining malware when it was installed on the user’s computer. That’s likely due to a clever trick by hackers, who have written a malicious version of Final Cut Pro that runs the open-source XMRig crypto-mining software in secret.

Previous versions of this malware were less sneaky, first needing the user to enter their system password, and next requiring them to keep the app running for the malware to work. With this latest version, once the malicious Final Cut Pro runs, the crypto-mining malware gets to work in the background, and doesn’t need Final Cut Pro opened to mine going forward.

It knows you’re going to be concerned about your Mac slowing down, too: If you open Activity Monitor to investigate the program taking up so many resources, the malware shuts down until you quit Activity Monitor. Creepy, but perhaps keeping Activity Monitor running at all times is the best new anti-malware solution on the market.

Final Cut Pro is just the latest pirated app found with this type of crypto-jacking malware, as Jamf Threat Labs discovered similar issues with pirated versions of Photoshop and Logic Pro. For Apple’s part, the company claims this malware family does not bypass their malware protections.

Still, the news serves as a reminder that the internet still has a “Wild West” side, even in 2023. The safest way to install apps like Final Cut Pro on your Mac is to obtain them from the Mac App Store, which has protocols in place to sharply reduce the risk of malware.


from Lifehacker https://ift.tt/3w7SRG0

Yes, Any Drink Can Be Cake Icing

Treat your icing as a flavor opportunity—don’t squander it with water or milk.


from Lifehacker https://ift.tt/eRfoXtI

Make Your Own Red Lobster Cheddar Bay Biscuit Loaf

Portland was covered in ten inches of snow on Wednesday, which is a lot of snow for a city full of people who don’t know how to drive in snow. This means I’ll be staying home until it melts, and playing a fun game of Chopped with my pantry and chest freezer. I hope to unearth many treasures. Seeing as I’ve already found a box of Red Lobster Cheddar Bay Biscuit mix, I’d say I’m off to a pretty good start.

If you’re not familiar with this particular mix, I’m happy to tell you it’s pretty good, and close to the biscuits you get at the mid-range seafood chain. (Though I have not been to a Red Lobster in a long time, the box mix biscuits taste pretty much exactly how I remember them tasting in the restaurant.)

One of the nice things about making things at home is that you can play around with the format. I didn’t feel like portioning the dough into biscuits so instead, I scraped it all into a loaf pan, then baked as usual, adding about 10 minutes to the bake time.

It turned out beautifully, if you consider a giant, sliceable biscuit to be a thing of beauty. (And I do.) Being a biscuit, it did not rise as much as a loaf of yeasted bread, but you could always double the recipe (and double the cook time) to make a taller sliceable biscuit, but I find the slim slices to be quite charming.

G/O Media may get a commission

Once sliced, you can lay down a few pieces and slide a fried egg on top, or fry the slices in butter for further crispiness (and then slide a fried egg on top). You could also lay down a thin slice of cold cream cheese, a few slices of ham, or anything else you think would be good on a cheesy, buttery biscuit plank. If you get bored with the flavor, you can always switch out the cheddar for a different cheese. I made mine with Jarlsberg (because I am snowed in and out of cheddar), and it was pleasantly sweet and nutty, but I can’t wait to try it with aged gouda, or Dubliner.

Cheddar Bay Loaf

Ingredients:

  • 1 box Red Lobster Cheddar Bay Biscuit mix
  • 1/2 shredded cheese, such as sharp cheddar, gouda, or Dubliner
  • 3/4 cup cold water
  • 1/4 cup butter
  • Seasoning packet

Mix the cheese into the dry mix, then add the water and stir until a dough forms. Press into a greased standard loaf pan and bake in a 350℉ oven for 25-35 minutes, until the top is golden brown. Melt the butter in the microwave, mix the seasoning packet into the butter, then brush butter on loaf. Let cool until you can touch the loaf pan, then run a butter knife around the edge before turning out the loaf onto a cutting board. Slice and serve.


from Lifehacker https://ift.tt/j24Okef

These Airlines Don't Charge Extra for Families to Sit Together

Photo: Friends Stock (Shutterstock)

In the State of the Union earlier this month, President Joe Biden called out the service industry’s practice of charging “junk fees.”

“We’re making airlines show you the full ticket price upfront and refund your money if your flight is canceled or delayed,” Biden said. “And we’ll prohibit airlines from charging up to $50 roundtrip for families just to sit together. Baggage fees are bad enough—they can’t just treat your child like a piece of luggage.”

In response, the Department of Transportation has proposed a new rule that requires airlines and online booking platforms to show the total price of a ticket upfront, including baggage and other fees. Additionally, one of the biggest changes in the rule is no longer needing to pay extra to sit with your kids. You can expect more airlines to become more family friendly in the near future.

Which airlines allow passengers to seat with their kids for free?

G/O Media may get a commission

Every airline has their own rules and fees. Before the State of the Union, more airlines charged non-frequent flyers fees to choose their seats in economy class, among other things—especially low-cost carriers like Frontier and Spirit. Here are the airlines that have changed their rules recently:

United Airlines

Starting in March, travelers booking with United will be able to sit their children next to them if they are under the age of 12. If there aren’t any adjacent seats available, passengers can rebook their flights for free. United’s chief customer office said customers can expect more family-friendly features to roll out this year.

Frontier Airlines

Frontier has also changed their policies on charging family’s fees to sit together: They now allow seating children with a parent at no additional charge. The new policy will allow children under the age of 14 to be seated automatically with at least one parent or guardian for free. The process will automatically happen before the check-in window opens.

Breeze Airways

Breeze Airways allowed families to sit together at no extra charge even before it was cool. The low-cost carrier airline also doesn’t charge fees for changing flights or cancelling. “Allowing families with young children to select seats together at no additional charge, even when they book our ‘Nice’ bundle, is something that sets us apart and demonstrates how much we care about our Guests,” Lukas Johnson, Breeze’s Chief Commercial Officer, told Yahoo.

Southwest Airlines

Southwest Airlines’ unique boarding process gives every passenger an A, B, or C group. Once on board, you choose any available seat. They have a “Family Boarding” program that helps children under 13 board with their parents.


from Lifehacker https://ift.tt/NCBYZsw