Sunday, June 30, 2024

Product showcase: Protect digital identities with Swissbit’s iShield Key Pro

In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. Let’s delve into how the iShield Key Pro turns a typical office workday into a secure, efficient, and versatile experience.

iShield Key Pro

Imagine a workday where security and convenience go hand-in-hand. The iShield Key Pro series makes this a reality, offering a powerful hardware security token designed to simplify your daily tasks while significantly enhancing your digital security posture.

Streamlined security throughout your day

The iShield Key Pro seamlessly integrates into your workflow. It starts from the moment you arrive at the office. Gain effortless entry through secure access panels using NFC technology. This same key can even charge your electric car at compatible charging stations.

Access

Beyond logins: Unparalleled versatility

The iShield Key Pro goes far beyond basic logins. With a simple tap, you can securely access a wide range of essential online services, from cloud storage platforms like Dropbox to business applications like Salesforce. This versatility extends to everyday tasks – securely authenticate yourself at the office printer before releasing confidential documents.

Enhanced protection for sensitive data

For users handling sensitive information, the iShield Key Pro offers an additional layer of security. Imagine a developer using the key to digitally sign program code, guaranteeing its authenticity and preventing unauthorized modifications. This functionality extends to signing PDFs and other critical documents, ensuring data integrity.

iShield Key Pro

Collaboration with confidence

The iShield Key Pro fosters a work environment built on trust. With robust protection for digital identities, you can collaborate seamlessly with colleagues, knowing your online accounts and sensitive information remain secure. The key’s compact design, available in both USB-A and USB-C versions, ensures portability and convenience.

Swissbit

Strongest hardware authentication

The iShield Key Pro series prioritizes three key aspects: simplicity, security, and flexibility.

  • Simple: Effortlessly integrate the iShield Key Pro into your workflow. Compatible with FIDO2-compliant websites and services like Google, Microsoft, and countless others, the key offers intuitive logins via both NFC and USB connectivity.
  • Secure: Empower zero-trust strategies by ensuring only authorized users can access your systems. The iShield Key Pro safeguards against phishing attacks and facilitates secure document signing and encryption, keeping your data safe.
  • Flexible: Adapt the iShield Key Pro to your specific needs. It supports multiple authentication options, including standard FIDO and on-premises solutions, seamlessly integrating with existing access control systems.

Beyond FIDO: Unmatched functionality

The iShield Key Pro goes beyond a standard FIDO key. It features Personal Identity Verification (PIV) for document signing and encryption, ensuring the authenticity and integrity of your data. Additionally, it supports legacy systems with HOTP (offline one-time passwords) and TOTP (time-based one-time passwords), offering up to 42 TOTP slots for added versatility. For configuration, the free iShield Key Manager software is available for Windows, macOS, and Linux.

The iShield Key Pro series is manufactured at Swissbit’s own semiconductor manufacturing facility in Berlin, Germany, in industrial quality. Its capability to double as a physical access control tool makes it unique in the market, especially with the impending adoption of FIPS 140-3 standards, thus ensuring the highest level of cryptographic security. It’s also suitable for implementing security guidelines such as NIS-2 in the EU, which requires multifactor authentication (MFA) in connection with IT systems for access control, or the US’s OMB zero-trust strategy.

Experience the iShield Key Pro difference.


from Help Net Security https://ift.tt/gDGNoxl

Infosec products of the month: June 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Acronis, Appdome, ARMO, Atsign, Cofense, Datadog, Diligent, Entrust, eSentire, KELA, Metomic, NinjaOne, Plainsea, SailPoint, SentinelOne, Tines,Trend Micro, Verimatrix, Veritas Technologies, and Zyxel.

infosec products June 2024

Plainsea: Cybersecurity platform that enables continuous service delivery

Designed with managed security service providers in mind, Plainsea offers a comprehensive cybersecurity platform that streamlines service delivery, enhances collaboration, and provides unparalleled visibility into the threat landscape. By leveraging automation and strategic AI applications, Plainsea empowers security teams to tackle complex challenges more effectively, freeing up valuable time and resources for proactive threat mitigation.

Plainsea allows for adopting a continuous service model, reducing the time for remediation validation requests to a minimum and ensuring security measures are always up-to-date and responsive to emerging threats.

infosec products June 2024

Zyxel Networks USG LITE 60AX improves network security

Zyxel Networks launched USG LITE 60AX–an AX6000 WiFi 6 Security Router designed for small businesses, teleworkers, and MSPs. The USG LITE 60AX gives small businesses peace of mind thanks to subscription-free, threat management capabilities. This in-built offering protects organizations against common cyber threats such as ransomware and malware, as well as other intrusions.

infosec products June 2024

Trend Micro Inline NDR enhances threat detection and response

Inline NDR is the latest innovation from Trend Vision One, the full-spectrum SOC platform designed to accelerate investigations by surfacing the highest priority alerts and automating complex response actions. This empowers SOC analysts with near real-time actions – empowering teams to react faster to contain threats before they can cause the organization lasting damage.

infosec products February June

SailPoint Risk Connectors helps organizations identify and act on risks

As part of its Atlas platform, SailPoint Risk Connectors makes it easier for organizations to make informed access decisions based on an identity’s third-party risk scores. With the third-party risk score assigned to identities, organizations can use automation to adapt access according to risk, ensure least-privilege access, and enhance their overall security posture.

infosec products June 2024

Appdome SDKProtect reduces third-party mobile supply chain risk

Appdome SDKProtect is designed to end third-party, mobile supply chain risk and democratize mobile threat intelligence and telemetry data among mobile SDK developers. The new service enables mobile SDK developers to create protected and threat-aware versions of their mobile SDKs, reducing fraud and ensuring compliance.

infosec products June 2024

Verimatrix XTD Accessibility Abuse Detector identifies Android mobile app threats

Verimatrix XTD and its suite of cybersecurity solutions have been helping customers identify Android mobile app threats such as tampering and abuse of Android’s accessibility feature for many years.

infosec products June 2024

Tines’ AI features enhance workflow automation for security and IT teams

Tines’ new AI features enhance existing benefits within its workflow automation platform by addressing key challenges security and IT teams consistently face. These benefits include optimized workload management, enhanced tool connectivity, improved error reduction, alert management and data accuracy, and smarter collaboration.

infosec products June 2024

Entrust Citizen Identity Orchestration enhances citizen adoption of digital public services

Key capabilities of the Citizen Identity Orchestration include digital onboarding with AI-powered fraud detection for identity verification, seamless issuance of digital credentials, identity lifecycle management, and self-service digital channels on the web or mobile with multi-factor authentication to access government services.

infosec products June 2024

KELA’s TPRM module identifies software supply chain risks

The TPRM module employs an advanced scoring algorithm that synthesizes data from KELA’s cyber threat intelligence and attack surface monitoring solutions. This method utilizes current and impending, factual threat data enabling dynamic risk scoring that adjusts as new information surfaces. As a result, organizations receive risk assessments that are not only precise but also actionable, providing pinpointed insights and prioritized remediation measures.

infosec products June 2024

Acronis XDR enhances EDR with comprehensive cybersecurity for MSPs

Acronis has introduced Acronis Advanced Security + XDR the newest addition to the company’s security solution portfolio. Acronis XDR expands on the current endpoint detection and response (EDR) offering and delivers complete natively integrated, efficient cybersecurity with data protection, endpoint management, and automated recovery specifically built for MSPs.

infosec products June 2024

SentinelOne strengthens cloud security for AWS customers

Singularity Cloud Workload Security for Serverless Containers is AI-powered runtime protection that leverages five autonomous detection engines to detect runtime threats like ransomware, zero-days, and fileless exploits in real time and streamline machine-speed response actions. AWS customers can now protect their containerized workloads however they are launched, from Amazon EC2 to AWS Fargate.

infosec products June 2024

Diligent AI enables leaders to better manage and respond to risk

Diligent AI helps leaders amplify critical insights while working together across the organization, using risk as a shared language. Leaders can expand resources and achieve greater results through integrated automation, enhance stakeholder communication by tailoring information to board members, chief financial officers, chief risk officers and other executives, and enhance decision making by breaking down information silos across governance, risk and compliance (GRC) functions.

infosec products June 2024

Datadog App Builder helps accelerate issue remediation

Datadog App Builder enables the integration of customized, secure and scalable apps directly into teams’ monitoring stacks, empowering organizations to take action on observability insights. Teams can also create self-service apps so anyone in the organization can perform remediation tasks quickly and without context switching.

infosec products June 2024

Metomic’s Google User Groups feature alerts users when sensitive data might be at risk

With Metomic’s Google User Groups integration, IT and security teams can create workflows that allow them to govern data across the group, manage admin permissions, and modify access controls with ease. The Google Drive Labels feature makes it possible to view all Google Drive Labels within the Metomic dashboard, vastly improving visibility, enhancing compliance and security, and offering more efficient management capabilities.

infosec products June 2024

NinjaOne MDM provides visibility and control over mobile devices

NinjaOne MDM empowers MSPs and IT teams to automate, control, and implement policies across a range of mobile devices (smartphones, tablets, IoT devices, etc.) at scale, giving organizations consistency and efficiency in their endpoint management and an improved security posture.

infosec products June 2024

Atsign NoPorts establishes an encrypted IP tunnel directly between devices

NoPorts establishes an encrypted IP tunnel directly between devices, eliminating the need for exposed ports and creating a zero-trust environment. This approach empowers organizations to leverage the benefits of existing protocols like RDP, Citrix, and VPN while mitigating the inherent security risks associated with them.

infosec products June 2024

Veritas Data Insight classifies and controls unstructured data

Veritas Data Insight offers in-depth data visibility, context and analysis across multi-cloud infrastructures to help resolve the cost, compliance and security risks associated with unstructured, dark and sensitive data.

infosec products June 2024

eSentire introduces MDR for GenAI Visibility

Leveraging security telemetry across an organization’s log and network data sources, eSentire’s MDR for GenAI Visibility solution provides daily insights into an organization’s use of GenAI technology, including the most frequently used AI applications, the users of the technology, the prompts, and the files shared.

infosec products June 2024

ARMO launches behavioral-based cloud detection and response

ARMO Cloud Detection & Response addresses the residual threats that may persist during runtime, even after thorough scanning during development and deployment. The solution builds on Kubescape’s open-source threat detection capabilities by adding observed application behavior with context from Kubernetes, cloud environment, security policies, and workload characteristics.

infosec products June 2024

Cofense enhances PhishMe to identify engagement and resilience gaps across all employee levels

PhishMe’s Employee Engagement Index leverages over a decade of Cofense curated threat intelligence and combines those data with current employee behavioral patterns. The EEI then generates a continuously updated proficiency score, displaying a personalized metric that assesses individuals, cohorts, groups, and departments, allowing organizations to quickly pinpoint areas needing improvement and allows for immediate, targeted remediation efforts.

infosec products June 2024


from Help Net Security https://ift.tt/rne2yX8

Today’s Wordle Hints (and Answer) for Sunday, June 30, 2024

If you’re looking for the Wordle answer for June 30, 2024 read on. We’ll share some clues, tips, and strategies, and finally the solution. Today’s puzzle is harder; I got it in five. Beware, there are spoilers below for June 30, Wordle #1,107! Keep scrolling if you want some hints (and then the answer) to today’s Wordle game.

How to play Wordle

Wordle lives here on the New York Times website. A new puzzle goes live every day at midnight, your local time.

Start by guessing a five-letter word. The letters of the word will turn green if they’re correct, yellow if you have the right letter in the wrong place, or gray if the letter isn’t in the day’s secret word at all. For more, check out our guide to playing Wordle here, and my strategy guide here for more advanced tips. (We also have more information at the bottom of this post, after the hints and answers.)

Ready for the hints? Let’s go!


Does today’s Wordle have any unusual letters?

We’ll define common letters as those that appear in the old typesetters’ phrase ETAOIN SHRDLU. (Memorize this! Pronounce it “Edwin Shirdloo,” like a name, and pretend he’s a friend of yours.)

Three of today's letters are from our mnemonic. One is fairly common, and one is uncommon.

Can you give me a hint for today’s Wordle?

As a proper noun, the name of an elf.

Does today’s Wordle have any double or repeated letters?

There is one repeated letter today. 

How many vowels are in today’s Wordle?

There is one vowel and one "sometimes" vowel.

What letter does today’s Wordle start with?

Today’s word starts with B. 

What letter does today’s Wordle end with?

Today’s word ends with Y. 

What is the solution to today’s Wordle?

Ready? Today’s word is BUDDY.

How I solved today’s Wordle

I started with RAISE and TOUCH, which yielded only one letter. I went with PYLON next, then tried GAMED to eliminate consonants that were common in possible solutions. This left only a few words, of which BUDDY was the most common.

Wordle 1,107 5/6

⬛⬛⬛⬛⬛
⬛⬛🟨⬛⬛
⬛🟨⬛⬛⬛
⬛⬛⬛⬛🟨
🟩🟩🟩🟩🟩

Yesterday’s Wordle answer

Yesterday’s Wordle was medium difficult. The hint was “like a horse, but always black and white” and the answer contained three common letters, one fairly common letter, and one uncommon letter.

The answer to yesterday’s Wordle was ZEBRA.

A primer on Wordle basics

The idea of Wordle is to guess the day’s secret word. When you first open the Wordle game, you’ll see an empty grid of letters. It’s up to you to make the first move: type in any five-letter word. 

Now, you can use the colors that are revealed to get clues about the word: Green means you correctly guessed a letter, and it’s in the correct position. (For example, if you guess PARTY, and the word is actually PURSE, the P and R will be green.)

  • Yellow means the letter is somewhere in the word, but not in the position you guessed it. (For example, if you guessed PARTY, but the word is actually ROAST, the R, A and T will all be yellow.)

  • Gray means the letter is not in the solution word at all. (If you guessed PARTY and everything is gray, then the solution cannot be PURSE or ROAST.)

With all that in mind, guess another word, and then another, trying to land on the correct word before you run out of chances. You get six guesses, and then it’s game over.

The best starter words for Wordle

What should you play for that first guess? The best starters tend to contain common letters, to increase the chances of getting yellow and green squares to guide your guessing. (And if you get all grays when guessing common letters, that’s still excellent information to help you rule out possibilities.) There isn’t a single “best” starting word, but the New York Times’s Wordle analysis bot has suggested starting with one of these:

  • CRANE

  • TRACE

  • SLANT

  • CRATE

  • CARTE

Meanwhile, an MIT analysis found that you’ll eliminate the most possibilities in the first round by starting with one of these:

  • SALET

  • REAST

  • TRACE

  • CRATE

  • SLATE

Other good picks might be ARISE or ROUND. Words like ADIEU and AUDIO get more vowels in play, but you could argue that it’s better to start with an emphasis on consonants, using a starter like RENTS or CLAMP. Choose your strategy, and see how it plays out.

How to win at Wordle

We have a few guides to Wordle strategy, which you might like to read over if you’re a serious student of the game. This one covers how to use consonants to your advantage, while this one focuses on a strategy that uses the most common letters. In this advanced guide, we detail a three-pronged approach for fishing for hints while maximizing your chances of winning quickly.

The biggest thing that separates Wordle winners from Wordle losers is that winners use their guesses to gather information about what letters are in the word. If you know that the word must end in -OUND, don’t waste four guesses on MOUND, ROUND, SOUND, and HOUND; combine those consonants and guess MARSH. If the H lights up in yellow, you know the solution.

One more note on strategy: the original Wordle used a list of about 2,300 solution words, but after the game was bought by the NYT, the game now has an editor who hand-picks the solutions. Sometimes they are slightly tricky words that wouldn’t have made the original list, and sometimes they are topical. For example, FEAST was the solution one Thanksgiving. So keep in mind that there may be a theme.

Wordle alternatives

If you can’t get enough of five-letter guessing games and their kin, the best Wordle alternatives, ranked by difficulty, include:


from LifeHacker https://ift.tt/6UixT5Z

Friday, June 28, 2024

Three Ways to Identify a 'Ghost' Job Posting

Job hunting is a process full of so many lows that when you come across a position that matches your skillset and sounds interesting, it feels like a minor victory before you even apply. But that feeling usually doesn't last very long, after days and eventually weeks pass, and you haven't heard a peep from the company—not even a rejection.

Perhaps a friend tries to console you, saying that, in all likelihood, it was always going to be an internal hire, but they were required to post the job. And while that may have been the case, it's also possible that the opening—or even the role itself—never existed in the first place. Also known as "ghost" jobs, a recent survey from Resume Builder found that 40% of companies posted a fake job listing this year so far. Here's how to spot ads for nonexistent jobs, and why companies post them in the first place.

How to identify fake job postings

To be clear, when I say "ghost" job postings, I'm not talking about postings that are actually scams aimed at getting jobseekers to fork over money and/or their personal data. (But if you're looking for tips for spotting those, you can find them in previous Lifehacker articles.) Instead, I'm focusing on postings for nonexistent jobs with legitimate companies. Here's how to identify them.

1. Look for details

Sometimes companies post ads for jobs that don't exist in order to become more familiar with the talent that's out there, and identify potential candidates in the event that there will be actual roles to fill in the future. For this reason, ghost job listings are usually pretty vague, both as far as the specific qualifications they're looking for, and the responsibilities associated with the role. When in doubt, contact the company's HR department and ask for additional details about the position to help you determine whether you'd be a good fit.

2. Check the date

As a general rule, it's best to apply for the job within a week of it being posted. Of course, re-listing a job—so the post gets a new date—takes little effort, so a recent date isn't a guarantee that a role is real. However, if a position has been posted for more than a month or two, it's typically not a good sign.

According to a 2023 report, it takes an average of 44 days to fill an open role, so if you find one that's been advertised for that length of time or more, you may want to contact the hiring manager or HR department and ask if the job is still available. Another possibility is that at one point, the posting was for a real job, and—intentionally or not—it wasn't taken down after it was filled.

3. Look for duplicates

In an attempt to attract a broad pool of talent, some companies create two (or more) slightly different listings for one open position, career coach and former hiring manager Mandi Woodruff-Santos told CNBC earlier this year. To avoid wasting time applying for both—and having more realistic expectations about the opportunities with the company—check their full list of openings and look for potential duplicates.

Why companies post fake jobs

So, why are companies messing with job seekers in the first place? One reason, it turns out, is to boost morale among current employees by tricking them into thinking that new hires will be joining their team soon to help alleviate their workload. Along the same lines, according to the 649 hiring managers who participated in Resume Builder's recent survey, posting fake jobs also helps convince employees that they're replaceable and should be grateful for having a job at all. Other times, it's to stockpile resumes for potential future openings. Finally, it could be for optics: In other words, the company wants it to make it look like it's growing and thriving, and someone decided posting fake jobs was the best way to do that.


from LifeHacker https://ift.tt/HoGCIqQ

This App Lets You Make Custom Apple Music Playlist Covers

When you make playlists in Apple Music, the service lets you use a custom cover. You can either choose a photo from your library or pick one of the covers it generates. I tend to pick the latter, but over the past few months, I've become bored with Apple's playlist cover options—choosing from the same six templates gets boring after a certain point. That's when I discovered Denim, an app that lets you make custom Apple Music playlist covers.

Denim's been around for a couple years, and it recently got a big update that added a many more cover art options. Its developer also made Hezel, which lets you back up all of your Apple Music playlists.

How to use Denim to make custom Apple Music playlist covers

When you open Denim, the app will ask for access to your Apple Music data. This is required for the app to see your playlists and help you generate cover art for them. Once you grant this permission, the app shows you all your playlists in helpful sections. One of these highlights all the playlists that have one of Apple's default covers and the other shows you the ones with a custom cover.

This makes it easy to find the playlists with stale cover art. It's also good that the app only shows custom playlists you've created. That saved me a lot of trouble because I have around 200 playlists on my Apple Music account, including around 50 that I've created. To get started with creating a cover, tap any of your playlists and Denim will generate a whole bunch of covers. There is a good variety of basic covers with a solid background color, and some with gradients and textures in the background. 

A screenshot of the Denim app for iPhone.
Credit: Pranay Parab

I like the Denim covers that prominently display an artist from your playlist. Another personal favorite is the emoji cover, which looks at the region and genre of music, and picks emoji for the cover based on those factors. You may see the flag of the country that songs are from and some instruments commonly used in the songs. But the real fun begins when you tap the Browse More Covers button. This lets you see covers that are based on moods, scenes, genres, activities, seasons, and much more.

Denim is a free download and it has a $5 in-app purchase that unlocks editing options to let you personalize the covers to your liking, including changing the font, the background, and the text on the cover.


from LifeHacker https://ift.tt/ix8Gndw

You Can Finally Use Reminders in Apple Calendar

Apple's Calendar and Reminders apps are so closely related, it's baffling that the company never tried to bridge the gap. On any given day, you might have your meetings and events scheduled in the Calendar app, while the actual tasks you need to get done for those events live in the Reminders app.

But after upgrading to iOS 18 and macOS Sequoia updates (which you can currently try out in Developer beta), you won't need to jump between two apps anymore—your reminders will automatically show up in the Calendar app. Here's how it works.

How to see your reminders in the Calendar app

Apple's implementation of this feature is quite simple. Any reminder or event that you create in the Reminders app that has a due date and time will automatically show up in the Calendar app. You don't have to do anything else, and the feature is even enabled by default, provided you're running iOS 18 and macOS Sequoia. This works for all your reminders—the Calendar app will even show the relevant color of your list in the checkbox icon.

Reminders showing up in the Calendar app automatically.
Credit: Khamosh Pathak

The integration is well done: The reminder shows up with a checkbox, so you can mak it complete from the Calendar app itself! You can see your reminders in the day view, and even the new Month view, if you use the new pinch-to-zoom feature to zoom into a particular week.

Once a reminder shows up in Calendar, you can move it around to change the time (just like you can with an event), and the change will be instantly reflected in the Reminders app.

Creating a reminder in the Calendar app on iOS 18.
Credit: Khamosh Pathak

Conversely, you can also create a reminder from inside the Calendar app, thought the interface is a bit clunky. Click the Plus button from the top, and switch to the Reminder tab to create a reminder instead of an event. Here, you can give it a name, set a date and time, and add it to your overall Reminders list.

Third-party tools are still an option

There are already a couple of interesting third-party options that can help integrate reminders with the Calendar app, but they can't integrate a checkbox for reminders in the Calendar app, like Apple can. However, they do offer customization options.

The ReminderCal app serves as a way to automatically share reminders to the Calendar, but the reminders show up as events, not tasks. Still, the app gives you more control over which reminders show up in Calendar (something Apple doesn't offer yet). On the other hand, being a third-party app, it suffers from sync and connectivity issues that aren't an issue for Apple's feature.

Another thoroughly different option is to use a day planner app like Structured that can combine both tasks and the calendar events into one app, helping you check off events and related tasks in a single pane. This is something that Apple still doesn't do, as despite finally working together in iOS 18, the Reminders and Calendar apps remain separate apps. If you want to create and control reminders and subtasks right from the Calendar app, the Structured app is still your best bet.


from LifeHacker https://ift.tt/IgrBRm5

Thursday, June 27, 2024

27 of the Best Introspective Movies to Watch All by Yourself

I’ve always been perfectly content to watch movies by myself. Seeing a movie with a crowd is all well and good if it’s an action flick or a comedy, but there are movies that demand more focus and reward careful attention—and having kids, partners, and even friends in the room with you can frankly be very distracting.

What follows are 27 of the best movies to watch solo and get quietly lost in. They’re all relatively quiet and generally thoughtful, which isn’t to say boring—not that there's anything wrong with a slightly boring movie.

(Note: There are a lot of American films here, in part because quiet introspection is a bit more novel in Hollywood; a list of introspective Swedish films, for example, would be a heck of a lot longer.)

Synecdoche, New York (2008)

Charlie Kaufman’s film about a theater director (Philip Seymour Hoffman) who lives his life within the context of a theatrical mock-up is seen as either assertively pretentious or utterly life-changing. Much of the film’s appeal is in the desire, made real here, to pull ourselves out of our own miserable lives and view them from a more objective place.

Where to stream: Digital rental


Waking Life (2001)

I’m not sure that Waking Life’s experimental animation style is strictly necessary, especially given the rotoscoping that required the bodily presence of actors—but there’s enough in the film’s discussions of free will and existentialism to make for an enjoyably thoughtful film about a man on the verge of a full-scale existential crisis. The ambitious visual style, though, does add a dreamlike quality that makes it harder to see as some sort of cinematic bull session.

Where to stream: Digital rental


Arrival (2016)

There have been quiet, contemplative alien invasion movies before—but it’s not exactly the style we’ve come to associate with the form. The movie that solidified Denis Villeneuve’s reputation as a maker of smart, heady genre films deals with the universal challenges and rewards of communication, topped with a unique sci-fi twist.

Where to stream: Paramount+, digital rental


The Man from Earth (2007)

Written by sci-fi legend Jerome Bixby while on his deathbed, an appropriate mournfulness hangs over this (very) low-budget movie abut a man who might or might not be 14,000 years old. David Lee Smith plays John Oldman (*wink*), a professor having some friends over for a going-away party. Over the course of the gathering, he lets his secret slip, prompting an evening of conversation during which his fellow professors grill him about his life from their own academic perspectives. Heady stuff.

Where to stream: Tubi, digital rental


Eyes Wide Shut (1999)

Marketed as the sexiest movie you’d ever see in major movie theaters, Eyes Wide Shut is, instead, a dreamlike walk through a twilight world of joyless, mechanistic sex: the message being not “sex is bad,” but, instead, that sexual obsession can be as dehumanizing as anything else in a Stanley Kubrick movie.

Where to stream: Digital rental


Pi (1998)

A bit more intense than some others here, Darren Aronofsky’s feature directorial debut involves a mathematician who becomes obsessed with the idea that math can entirely elucidate the world’s underlying meaning, even as his own mental health struggles as an imperfect and irreducible human make that quest increasingly quixotic.

Where to stream: Digital rental


Paterson (2016)

Idiosyncratic indie director Jim Jarmusch takes "contemplative" to new levels with this film following a week in the life of a New Jersey transit driver played by Adam Driver (hmmm). During breaks from work, Paterson writes small poems with encouragement from his wife (Golshifteh Farahani), but his dreams of publishing them go out the window when a dog gnaws his notebook. With impressive performances from the two leads, this quiet and rather moving film turns on the seemingly minor occurrences that can upend our own small universes.

Where to stream: Prime Video


My Dinner with Andre (1981)

Louis Malle’s My Dinner with Andre has a fanbase to rival many more obvious cult classics in American film history; fascinating in that it’s a movie about two actors playing themselves (they share names, anyway) chatting at a cafe for nearly two hours. Yet people watch it over and over. The material veers from funny to despairing, but it’s always surprising, with the two actors selling their stories at least as well as any special effects could.

Where to stream: Max, The Criterion Channel, digital rental


An Elephant Sitting Still (2018)

There's very little consolation to be found in the first and only film from novelist Hu Bo, which turns on an anecdote about an elephant in a circus in Manzhouli that remains absolutely still under any provocation: perhaps feeling peaceful, perhaps just surviving without living. The film's characters determine to visit the elephant, their stories cumulatively speaking of disconnection from and disaffection for life.

Where to stream: Digital rental


Werckmeister Harmonies (2000)

Directed by Béla Tarr and Ágnes Hranitzky, Werckmeister Harmonies might be the most approachable of Tarr's film projects. Which admittedly isn't saying much, given that his previous film, Satan's Tango, is over seven hours long. Here, we take a long, languid, and beautifully shot tour of a small village in Hungary, following its residents through their lives as a slightly sinister circus comes to town. The film isn't much interested in plot or incident, preferring instead to languidly observe its characters.

Where to stream: The Criterion Channel, digital rental


George Washinton (2000)

On one level, George Washington is the story of an unintentional murder by a school kid and the efforts to hide the evidence...but that synopsis doesn’t in any way capture the feel of this deliberately-paced and beautifully shot tone poem.

Where to stream: The Criterion Channel, digital rental


The Lobster (2015)

As offbeat dark comedies go, they don’t get much more offbeat than this: in Yorgos Lanthimos’ dystopian dark comedy, single people get exactly 45 days to find romantic partners—otherwise they’re turned into animals. It’s definitely weird, but no weirder than the modern courtship rituals it satirizes.

Where to stream: Max, digital rental


Being There (1979)

Hal Ashby’s film is, on one level, a particularly biting satire involving a (very) simpleminded gardener (Peter Sellers) whose every banal, plant-related utterance comes to be seen as a piece of wisdom by a world desperate for meaning. While it mocks our willingness to see what we want to see, it centers the gentle presence of Chance the gardener, and invites us to ask whether his innocent view of the world is really such a bad thing.

Where to stream: Digital rental


Uncle Boonmee Who Can Recall His Past Lives (2010)

Slow and sometimes baffling, Uncle Boonmee is also a funny and beautifully meditative story about a man’s final days, and about the literal and figurative ghosts that haunt our lives.

Where to stream: Digital rental


Stalker (1979)

After the apocalypse, a guide sets out with a writer and a scientist across a distinctive and highly stylized wasteland in search of The Room, the one place left on earth where someone’s desires might still be fulfilled. There are elements of political and religious metaphor, but no one meaning really satisfies here, and it’s precisely that slipperiness that makes it so haunting.

Where to stream: Max, The Criterion Channel, digital rental


Valhalla Rising (2009)

Our leading man here is a non-speaking, one-eyed former prisoner (played by Mads Mikkelsen), who begins a long, hypnotic journey over the sea when the Norseman falls in with Christian Crusaders in the nasty, brutish middle ages. There’s blood and battle here, but the idiosyncratic director is more interested in the silences in between.

Where to stream: Shudder, AMC+, digital purchase


Only Yesterday (1991)

Not many of the films on this list topped the box office when they were released, but director Isao Takahata's anime (from Studio Ghibli) was the highest grossing film of its year in Japan. Twenty-seven-year-old Taeko Okajima works in the city but takes a train trip into the country side to visit relatives and escape from the hectic pace of Tokyo. The journey conjures memories of her life, some good, some less so, forcing her to reconcile her present with everything she has left behind.

Where to stream: Max, digital rental


A Ghost Story (2017)

A ghost (Casey Affleck) returns to the home he shared with his wife (Rooney Mara), only to discover that he’s untethered in both time and space, forced to view events in seemingly random order. Desperate to connect, all he can do is observe.

Where to stream: Max, digital rental


Nomadland (2020)

After Frances McDormand's Fern loses her job at a gypsum plant, she sells everything and buys a van to live and travel in while she hunts for work (including at an Amazon warehouse). Attachments come and go during her travels, as writer/director Chloé Zhao's funny, elegiac film considers life within America's increasingly precarious capitalist system, while also exploring more general themes of permanence and impermanence.

Where to stream: Hulu, digital rental


The Whales of August (1987)

A grace note at or near the end of the careers of Lillian Gish, Bette Davis, Ann Sothern, and Vincent Price, Whales of August finds two elderly and very different sisters spending yet another summer in the same seaside house in Maine that they've visited since childhood. Davis' bitter Libby is ready to give up on life, while Gish's Sarah is tired of being a caretaker and is increasingly delighted by the prospect of a romance with local widower Price. The gentle film explores the potential for dignity and liveliness among these octogenarians.

Where to stream: Prime Video


The Tree of Life (2011)

Though early reviewers saw it as pretentious, there’s no mistaking the quiet ambition of Terence Malick’s gorgeously rendered exploration of the meaning of life itself, with a stopover in 1950s Texas. It’s probably the closest any director has come to the scale and scope of 2001 since that movie’s 1968 release.

Where to stream: Digital rental


Russian Ark (2002)

What starts out as a novelty gradually builds to something breathtaking as director Alexander Sokurov’s follows a mysterious narrator through the walls of the Winter Palace in St. Petersburg, encountering different moments and historical characters from the building’s history as he goes. It’s mostly a film about philosophical conversation, but Sokurov filmed the movie in one continuous cut, with no false cuts, choreographing a cast that, by the end, is in the thousands.

Where to stream: Hoopla, Kanopy, Plex


Wild Strawberries (1957)

Ingmar Bergman’s Wild Strawberries has some of his most nightmarish imagery, but ultimately it’s the most humane of all his works. Its story of an old man recalling his past is as sad as it is sweet, but builds toward something very nearly celebratory.

Where to stream: Max, The Criterion Channel, digital rental


Pariah (2011)

There are some big emotions in Dee Rees’ semi-autobiographical coming-out story Pariah, and so, in that sense, it’s not the most quietest of quiet dramas. In its performances and visual style, though, it’s utterly hypnotic, conjuring a world that, for all its turmoil, I could get lost in forever.

Where to stream: Prime Video


Under the Skin (2013)

An alien seduces men by the side of the road in this languid and elusive study of sex and power relationships. With a stroking visual style that evokes Blade Runner (just a bit), Under the Skin is as haunting as it is tough to pin down.

Where to stream: Max, digital rental


Last Year at Marienbad (1961)

Bafflingly dreamlike—but so beautiful that it’s hard to care—Alain Resnais’ masterpiece takes place at a luxury hotel and involves two lead characters who seem to have become completely untethered in time and space, and who might have met at Marienbad once before. It plays much like a ghost story, minus the horror-movie trappings.

Where to stream: The Criterion Channel, digital purchase


Spring, Summer, Fall, Winter...and Spring (2003)

Kim Ki-duk’s story follows a Buddhist monk (O Yeong-su) from young apprentice to old age, with the different seasons representing phases of life and the circular nature of existence. It’s appropriately meditative, without extraneous or excessive drama, and not even much dialogue. It’s (nearly) as quiet as filmmaking gets, but rather lovely and rewarding.

Where to stream: Digital rental


from LifeHacker https://ift.tt/FZqO0y3

How to Store All Your Passwords in Your Mac's Menu Bar

With the launch of the Passwords app in macOS Sequoia and iOS 18 (currently in Developer beta), Apple has made it easy to find and access all your passwords, Passkeys, and even two-factor authentication codes with ease. What used to take a trip through various Settings app menus is now just a click away.

But as good as the Passwords app is, it's little more than an app wrapper for the iCloud Keychain. While that itself is a huge improvement, we can make your Mac's Passwords app even better by enabling a menu bar list that's hidden by default.

How to enable the hidden Passwords menu bar list on macOS Sequoia

Before we start, you'll need to install the macOS Sequoia beta. I recommend doing this on a backup device if possible, as it could introduce instability to your main device. First, back up your Mac. Then open System Settings, navigate to General > Software Update and click Beta updates. Select the latest macOS Sequoia developer beta.

Now, open the Passwords app and authenticate with your Mac password or Touch ID. From the menu bar, go to Passwords > Settings. Here, enable the Show Passwords in Menu Bar option.

Enabling the menu bar app in Passwords app
Credit: Khamosh Pathak

You will see a key icon in the menu bar. That's your Passwords app. Click the icon to see a drop-down menu. Authenticate using Touch ID or your Mac password, and you will see a list of all your passwords.

The really neat thing about this menu bar app is that it's context aware. So it will automatically find a login that corresponds to the app that you have open. This works for desktop apps, and also for websites in third-party browsers like Chrome, Arc, and more.

If you're trying to log in to Discord, for example, your Discord login will be at the top of the list, where you'll be easily able to copy your password to your clipboard.

Suggested website logins using Passwords app in Chrome browser.
Credit: Khamosh Pathak

It's no secret that I'm a fan of menu bar utilities. And seeing a useful little utility from Apple itself is quite refreshing. The Passwords utility will definitely be helpful for people who use third-party browsers, but don't want to save passwords in Chrome or provide access to third-party browser extensions.  

The biggest downside, though, is that the menu bar list doesn't yet support autofill. If you're used to just authenticating passwords using Touch ID in Safari, you'll find this an odd adjustment.


from LifeHacker https://ift.tt/Qhvu6we