Monday, September 30, 2024

How to Watch the Vice Presidential Debate Without Cable

Vice presidential candidates Gov. Tim Walz and Sen. J.D. Vance are heading into their first (and only) debate stage meeting ahead of the 2024 election. Here's where to watch live on Oct. 1.

When is the vice presidential debate?

The vice presidential debate is scheduled for Tuesday, Oct. 1 at 9 p.m. ET and is expected to last 90 minutes plus two four-minute breaks. The event is being held at the CBS Broadcast Center in New York City and will be moderated by "CBS Evening News" anchor Norah O'Donnell and "Face the Nation" moderator Margaret Brennan.

Where can I watch the vice presidential debate?

As the debate host, CBS News will be streaming the event for free online via CBS News Live and its YouTube channel for those who don't have a cable subscription. The debate will also air on CBS and be available on any cable replacement streaming service that carries the channel (such as YouTube TV) as well as on Paramount+.

Other media outlets, such as C-SPAN and PBS News, will also carry the live stream.

Will there be another debate?

This is likely the last debate before the Nov. 5 election. Vice President Kamala Harris and former President Donald Trump faced off on Sept. 10 and floated the possibility of additional meetings, but as of this writing, there are no more debates scheduled for any of the candidates.


from LifeHacker https://ift.tt/ibhJXcE

The Biggest New Camera Features in iOS 18

The iPhone 16 series of phones got some great camera upgrades, but even if you don't plan to upgrade, iOS 18 still gives all iPhone users who can download it access to a bunch of fancy new camera features. Sure, the iPhone 16's Camera Control button is hogging the limelight, but older iPhones still get new Portrait Mode features, improved camera timers, the ability to pause a video recording, and many more features. Here are the best new camera features shipping with iOS 18.

iPhone 16's new Camera Control button

The Camera Control button in iPhone 16.
Credit: Apple

When Apple launched the iPhone X without a home button in 2017, many thought that it marked the end of buttons on the iPhone. Seven years on, that has proved to be false. Last year, the iPhone 15 Pro series got the Action Button, and now all iPhone 16 series phones have that same button and a new Camera Control button. As its name suggests, Camera Control lets you quickly launch the Camera app and take photos or videos, plus adjust the zoom, exposure, and other settings. It's a significant addition that underpins the importance of the camera on your iPhone, and it's been seamlessly integrated into iOS 18. This Apple Support page explains how to make the most of this button.

Pause videos while recording

The pause button in the iOS 18 Camera app, which shows up in the bottom-left corner when you're recording videos.
Credit: Pranay Parab

Yes, iOS 18 finally lets you pause videos while recording. This makes recording videos a lot more convenient. When recording a video in iOS 18, you'll now see a pause button in the bottom-left corner of the Camera app. Hit this button to pause recording and resume it when you're ready. This makes recording vlogs, TikTok videos, and Instagram Reels much easier. I can't believe it took this long for this feature to arrive!

Play music while recording a video

Enabling music playback while recording videos in iOS 18.
Credit: Pranay Parab

Speaking of video recording improvements, iOS 18 also lets you listen to music while recording videos. Previously, the moment you switched to the Video tab in the Camera app, your iPhone would pause the music. To enable this feature, go to Settings > Camera > Record Sound, then turn on the toggle for Allow Audio Playback.

Try the new camera timer

The camera timer in iOS 18.
Credit: Pranay Parab

I love using the camera timer to take group photos, but I've always felt that the default options are a bit limiting. You could only set a timer for three or 10 seconds up until iOS 17. The former was too short and the latter forced everyone to wait a bit too long. iOS 18 solves that by adding a five-second timer, which you can use with the front and rear cameras.

Lighting modes in Night Mode portraits

Night Mode portrait lighting effects in iOS 18.
Credit: Pranay Parab

When you take a Portrait Mode photo in low-light, your iPhone will automatically enable Night Mode to enhance the picture. With iOS 18, you'll be able to choose from a bunch of lighting effects, even for Night Mode portraits. These effects have always been available in Portrait Mode, but not in low-light conditions.

Touch and hold to tweak camera flash

Adjusting camera flash modes in iOS 18.
Credit: Pranay Parab

When you're taking a photo on your iPhone, you'll see a lightning icon in the top-left corner of the screen. This is the flash button. You can tap it to toggle between three modes—on, off, and auto. With iOS 18, you can touch and hold the lightning icon to reveal all three options. This makes it easier to select the right option.


from LifeHacker https://ift.tt/ya03mK1

Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts

Storm-0501, an affiliate of several high-profile ransomware-as-a-service outfits, has been spotted comprimising targets’ cloud environments as well as their on-premises systems.

“Storm-0501 is the latest threat actor observed to exploit weak credentials and over-privileged accounts to move from organizations’ on-premises environment to cloud environments. They stole credentials and used them to gain control of the network, eventually creating persistent backdoor access to the cloud environment and deploying ransomware to the on-premises,” Microsoft shared last week.

Common tactics and techniques

Storm-0501 is a threat actor that has been active for over three years (at least), saddling target organizations with ransomware provided by the Hive, BlackHat, LockBit and Hunters International gangs. More recently, they’ve begun dropping the Embargo ransomware.

Ransomware cloud

Storm-0501 attack chain (Source: Microsoft)

Most of the tactics and techniques they use are well known and leveraged by various attackers:

  • They achieve initiall access by leveraging stolen credentials or n-day exploits against unpatched public-facing applications or devices (e.g., Zoho ManageEngine ServiceDesk Plus, Citrix NetScaler ADC and Gateway, etc.)
  • They perform network reconnissance to pinpoint high-value assets and general domain information like Domain Administrator users and domain forest trust via native Windows tools and commands and open source tools
  • Thet deploy a number of remote monitoring and management tools (e.g., AnyDesk, NinjaOne, etc.)
  • They engage in a concerted effort to compromise as many credentials they can, by using Impacket, gathering KeePass secrets from the compromised devices, and possibly via brute force
  • They use Cobalt Strike (and compromised credentials) to “move” to additional endpoints and servers, including domain controllers
  • They interfere with endpoint security solutions, use the Rclone tool to exfiltrate data, and they deploy the Embargo ransomware through scheduled tasks and Group Policy Object (GPO) policies.

Gaining access to cloud enviroments

But the group has also started to leverage Microsoft Entra ID (formerly Azure AD) credentials to access the target’s cloud environment.

They do it by compromising Microsoft Entra Connect Sync accounts (by pilfering it from the server’s disk or remote SQL server), or by hijacking an on-premises user account that has a respective user account in the cloud (i.e., Microsoft Entra ID).

“Microsoft Entra Connect Sync is a component of Microsoft Entra Connect that synchronizes identity data between on-premises environments and Microsoft Entra ID,” Microsoft explained.

“We can assess with high confidence that in the recent Storm-0501 campaign, the threat actor specifically located Microsoft Entra Connect Sync servers and managed to extract the plain text credentials of the Microsoft Entra Connect cloud and on-premises sync accounts. The compromise of the Microsoft Entra Connect Sync account presents a high risk to the target, as it can allow the threat actor to set or change Microsoft Entra ID passwords of any hybrid account (on-premises account that is synced to Microsoft Entra ID).”

The second approach – hijacking a Domain Admin user account that has a respective user account in Microsoft Entra ID – is also possible.

“In some of the Storm-0501 cases we investigated, at least one of the Domain Admin accounts that was compromised had a respective account in Microsoft Entra ID, with multifactor authentication (MFA) disabled, and assigned with a Global Administrator role,” Microsoft’s threat analysts shared.

While the aforementioned sync service is unavailable for administrative accounts in Microsoft Entra, “if the passwords for both accounts are the same, or obtainable by on-premises credential theft techniques (i.e. web browsers passwords store), then the pivot is possible.”

While MFA enabled on those accounts can stymie attackers, the possibility of compromise still exists, if the attacker can “tamper with the MFA or gain control of a device owned by the user and subsequently hijack its cloud session or extract its Microsoft Entra access tokens along with their MFA claims.”

Once in, Storm-0501 used this access to create a persisting backdoor by creating a new federated domain in the tenant.

“Once a backdoor domain is available for use, the threat actor creates a federation trust between the compromised tenant and their own tenant. The threat actor uses the AADInternals commands that enable the creation of Security Assertion Markup Language (SAML or SAML2) tokens, which can be used to impersonate any user in the organization and bypass MFA to sign in to any application. Microsoft observed the actor using the SAML token sign in to Office 365,” the threat analysts concluded, and provided mitigation and protection guidance, detenctions, hunting queries, and indicators of compromise.


from Help Net Security https://ift.tt/UufoQmC

Sunday, September 29, 2024

SCCMSecrets: Open-source SCCM policies exploitation tool

SCCMSecrets is an open-source tool that exploits SCCM policies, offering more than just NAA credential extraction. SCCM policies are a key target for attackers in Active Directory environments, as they can expose sensitive technical information, including account credentials. Attackers may retrieve these credentials by impersonating a registered device with authenticated access or, in some cases, even from an unauthenticated position by exploiting misconfigurations in policy distribution. SCCMSecrets provides a thorough approach to identifying and exploiting … More

The post SCCMSecrets: Open-source SCCM policies exploitation tool appeared first on Help Net Security.


from Help Net Security https://ift.tt/3tbC7YZ

Open source maintainers: Key to software health and security

Open source has become the foundation of modern application development, with up to 98% of applications incorporating open-source components and open-source code accounting for 70% or more of the typical application. In this Help Net Security video, Donald Fischer, CEO at Tidelift, discusses the 2024 State of the Open Source Maintainer report, which provides insights into the work and mindset of open source maintainers. The study showed that paid maintainers are 55% more likely than … More

The post Open source maintainers: Key to software health and security appeared first on Help Net Security.


from Help Net Security https://ift.tt/FyR7EWd

The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico.

least secure authentication method

The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the extensive underutilization of multi-factor authentication (MFA) and a generally reactive approach to addressing cyber threats.

While organizations often try their best to implement stringent security protocols at work, employees are falling behind in maintaining their own cybersecurity practices at home. This gap leaves not only individuals’ personal data at risk but also exposes employers to potential vulnerabilities.

Despite being the least secure form of authentication, the most common method of authentication is username and password. 58% use username and password to login to personal accounts, and 54% use username and password to login to work accounts.

AI advances fuel sophisticated online scams

With the rapid advancements of AI, respondents said that online scams and phishing attacks have become more sophisticated (72%) and successful (66%).

39% think username and password are the most secure and 37% think mobile SMS based authentication is the most secure, both of which are highly susceptible to phishing attacks.

40% don’t think or aren’t sure if the online apps and services they are using are doing enough from a security standpoint to protect their data, accounts and personal information. Even with this uncertainty, 22% have never done a personal cybersecurity audit (e.g., removing personal data from the internet, installing or updating cybersecurity software on their devices, changing compromised passwords, etc.) to better protect themselves online.

Respondents report the most commonly compromised passwords are on the apps and services that hold their most confidential, financial and personal information. These include:

  • Social media account – 44%
  • Payment app – 24%
  • Online retailer account – 21%
  • Messaging app – 17%
  • Banking app – 13%

For employees, even with security breaches increasing every year, 40% of respondents have never received cybersecurity training from the organization they work for and only a small fraction (27%) believe the security options that their organization has in place are very secure.

Many employees lack guidance on securing work accounts

When looking at the security aspect of onboarding employees, 34% said they did not receive instructions to secure their work accounts with more than just a username and password when they first started at the company they work for.

Despite the fact that every employee in an organization is a potential target, 41% said security measures and requirements differ based on role and title at their company, leaving room for bad actors to infiltrate within several levels of an organization.

“The findings highlight the need for a holistic cybersecurity strategy that encompasses both home and work environments,” said Derek Hanson, VP standards and alliances at Yubico. “This includes adopting stronger authentication methods to become phishing-resistant, fostering a culture of security awareness through consistent employee training, and more. Ultimately, building a unified front against cyber threats requires a concerted effort to bridge the gap between perceived and actual security. By integrating advanced security measures into all aspects of our digital lives, we can better protect ourselves, our data, and our organizations.”

Cybersecurity breaches and phishing schemes aren’t solely a worry for IT departments or tech-savvy individuals; they also pose serious risks to the general public, especially in the era of AI. As cyber attacks and online scams become increasingly sophisticated, it is more important than ever for everyone to stay vigilant in both their personal and professional lives.

“When individuals fail to secure their personal accounts, they also put their workplaces at risk. This is why it’s crucial for enterprises to adopt a holistic approach to cybersecurity that considers the security of both work and personal environments,” Hanson continued.


from Help Net Security https://ift.tt/lmCfkMa

Week in review: Windows Server 2025 gets hotpatching option, PoC for SolarWinds WHD flaw released

Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Windows Server 2025 gets hotpatching option, without reboots
Organizations that plan to upgrade to Windows Server 2025 once it becomes generally available will be able to implement some security updates by hotpatching running processes.

PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987)
Details about and proof-of-concept (PoC) exploit code for CVE-2024-28987, a recently patched SolarWinds Web Help Desk (WHD) vulnerability that could be exploited by unauthenticated attackers to remotely read and modify all help desk ticket details, are now public.

MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud.

Developing an effective cyberwarfare response plan
In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication.

Active Directory compromise: Cybersecurity agencies provide guidance
Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions.

Compliance management strategies for protecting data in complex regulatory environments
In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance management and ensure they meet regulatory requirements.

The number of Android memory safety vulnerabilities has tumbled, and here’s why
Google’s decision to write new code into Android’s codebase in Rust, a memory-safe programming language, has resulted in a significant drop in memory safety vulnerabilities, despite old code (written in C/C++) not having been rewritten.

Securing non-human identities: Why fragmented strategies fail
In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs).

Ivanti vTM auth bypass flaw exploited in attacks, CISA warns (CVE-2024-7593)
CVE-2024-7593, a critical authentication bypass vulnerability affecting Ivanti Virtual Traffic Manager (vTM) appliances, is actively exploited by attackers.

Future-proofing cybersecurity: Why talent development is key
In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth.

Transportation, logistics companies targeted with lures impersonating fleet management software
Financially motivated threat actors are targeting North American companies in the transportation and logistics sector with tailored lures, info-stealing malware, and a clever new trick.

Offensive cyber operations are more than just attacks
In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations.

US-based Kaspersky users startled by unexpected UltraAV installation
A poorly executed “handover” of US-based Kaspersky customers has led some users to panic when software named UltraAV popped up on their computers without any action on their part.

Tosint: Open-source Telegram OSINT tool
Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security researchers, investigators, and others who want to gather insights from Telegram sources.

Telegram will share IP addresses, phone numbers of criminal suspects with cops
Telegram will start handing over the IP addresses and phone numbers of users who violate their Terms of Service “to relevant authorities in response to valid legal requests”, Telegram founder and CEO Pavel Durov has announced on Monday.

NetAlertX: Open-source Wi-Fi intruder detector
NetAlertX is an open-source Wi-Fi/LAN intruder detection tool that scans your network for connected devices and alerts you when new or unknown devices are detected.

Organizations are changing cybersecurity providers in wake of Crowdstrike outage
More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers.

Certainly: Open-source offensive security toolkit
Certainly is an open-source offensive security toolkit designed to capture extensive traffic across various network protocols in bit-flip and typosquatting scenarios.

CUPS vulnerabilities affecting Linux, Unix systems can lead to RCE
After much hyping and following prematurely leaked information by a third party, security researcher Simone Margaritelli has released details about four zero-day vulnerabilities in the Common UNIX Printing System (CUPS) that can be abused by remote, unauthenticated attackers to achieve code execution on vulnerable Linux and Unix-like sistems.

3 tips for securing IoT devices in a connected world
An effective, comprehensive approach to IoT security requires organizations to have complete visibility into all connected devices within their network, addressing common vulnerabilities such as built-in backdoors and outdated firmware, alongside ensuring secure deployment practices.

Rethinking privacy: A tech expert’s perspective
In this Help Net Security video, Dr. Micah Altman, lead co-author of the TechBrief on Data Privacy Protection and Research Scientist at the Center for Research on Equitable and Open Scholarship at MIT, discusses protecting data privacy.

How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses.

AI use: 3 essential questions every CISO must ask
While AI has driven significant investment and optimism, there is growing concern that its capabilities may have been overhyped.

The surge in cyber insurance and what it means for your business
The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats.

65% of websites are unprotected against simple bot attacks
Companies across industries are seeing more bot-driven attacks, both basic and advanced, according to DataDome.

How to lock and hide iPhone apps in iOS 18
iOS 18 allows you to lock and hide apps to protect the information within them by requiring Face ID, Touch ID, or your passcode for access, while also concealing the content from searches, notifications, and various areas throughout the system.

Cybersecurity jobs available right now: September 25, 2024
We’ve scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now.

Discover how online fraud can impact your business
Recent reports underscore increased fraud losses driven by both old methods and new technologies.

New infosec products of the week: September 27, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Absolute, ArmorCode, Bitdefender, Guardsquare, Malwarebytes, NETGEAR, and Nudge Security.


from Help Net Security https://ift.tt/wL2NfdW

Saturday, September 28, 2024

Today’s Wordle Hints (and Answer) for Sunday, September 29, 2024

If you’re looking for the Wordle answer for September 29, 2024 read on. We’ll share some clues, tips, and strategies, and finally the solution. Today’s puzzle is medium difficult; I got it in four. Beware, there are spoilers below for September 29, Wordle #1,198! Keep scrolling if you want some hints (and then the answer) to today’s Wordle game.

How to play Wordle

Wordle lives here on the New York Times website. A new puzzle goes live every day at midnight, your local time.

Start by guessing a five-letter word. The letters of the word will turn green if they’re correct, yellow if you have the right letter in the wrong place, or gray if the letter isn’t in the day’s secret word at all. For more, check out our guide to playing Wordle here, and my strategy guide here for more advanced tips. (We also have more information at the bottom of this post, after the hints and answers.)

Ready for the hints? Let’s go!


Does today’s Wordle have any unusual letters?

We’ll define common letters as those that appear in the old typesetters’ phrase ETAOIN SHRDLU. (Memorize this! Pronounce it “Edwin Shirdloo,” like a name, and pretend he’s a friend of yours.)

They're all common letters from our mnemonic today.

Can you give me a hint for today’s Wordle?

Of a bike or a motorcycle, for example.

Does today’s Wordle have any double or repeated letters?

There is one repeated letter today. 

How many vowels are in today’s Wordle?

There are two vowels.

What letter does today’s Wordle start with?

Today’s word starts with R. 

What letter does today’s Wordle end with?

Today’s word ends with R. 

What is the solution to today’s Wordle?

Ready? Today’s word is RIDER.

How I solved today’s Wordle

I started with RAISE then tried PLANT, assuming I wasn't looking for additional vowels and wanted to eliminate possible consonants. Next I tried GAMED, which left RIDER as the best solution.

Wordle 1,198 4/6

🟩⬛🟨⬛🟨
⬛⬛⬛⬛⬛
⬛⬛⬛🟩🟨
🟩🟩🟩🟩🟩

Yesterday’s Wordle answer

Yesterday’s Wordle was easier. The hint was "this is an essential organ” and the answer contained four common letters and one fairly common letter.

The answer to yesterday’s Wordle was BRAIN.

A primer on Wordle basics

The idea of Wordle is to guess the day’s secret word. When you first open the Wordle game, you’ll see an empty grid of letters. It’s up to you to make the first move: type in any five-letter word. 

Now, you can use the colors that are revealed to get clues about the word: Green means you correctly guessed a letter, and it’s in the correct position. (For example, if you guess PARTY, and the word is actually PURSE, the P and R will be green.)

  • Yellow means the letter is somewhere in the word, but not in the position you guessed it. (For example, if you guessed PARTY, but the word is actually ROAST, the R, A and T will all be yellow.)

  • Gray means the letter is not in the solution word at all. (If you guessed PARTY and everything is gray, then the solution cannot be PURSE or ROAST.)

With all that in mind, guess another word, and then another, trying to land on the correct word before you run out of chances. You get six guesses, and then it’s game over.

The best starter words for Wordle

What should you play for that first guess? The best starters tend to contain common letters, to increase the chances of getting yellow and green squares to guide your guessing. (And if you get all grays when guessing common letters, that’s still excellent information to help you rule out possibilities.) There isn’t a single “best” starting word, but the New York Times’s Wordle analysis bot has suggested starting with one of these:

  • CRANE

  • TRACE

  • SLANT

  • CRATE

  • CARTE

Meanwhile, an MIT analysis found that you’ll eliminate the most possibilities in the first round by starting with one of these:

  • SALET

  • REAST

  • TRACE

  • CRATE

  • SLATE

Other good picks might be ARISE or ROUND. Words like ADIEU and AUDIO get more vowels in play, but you could argue that it’s better to start with an emphasis on consonants, using a starter like RENTS or CLAMP. Choose your strategy, and see how it plays out.

How to win at Wordle

We have a few guides to Wordle strategy, which you might like to read over if you’re a serious student of the game. This one covers how to use consonants to your advantage, while this one focuses on a strategy that uses the most common letters. In this advanced guide, we detail a three-pronged approach for fishing for hints while maximizing your chances of winning quickly.

The biggest thing that separates Wordle winners from Wordle losers is that winners use their guesses to gather information about what letters are in the word. If you know that the word must end in -OUND, don’t waste four guesses on MOUND, ROUND, SOUND, and HOUND; combine those consonants and guess MARSH. If the H lights up in yellow, you know the solution.

One more note on strategy: the original Wordle used a list of about 2,300 solution words, but after the game was bought by the NYT, the game now has an editor who hand-picks the solutions. Sometimes they are slightly tricky words that wouldn’t have made the original list, and sometimes they are topical. For example, FEAST was the solution one Thanksgiving. So keep in mind that there may be a theme.

Wordle alternatives

If you can’t get enough of five-letter guessing games and their kin, the best Wordle alternatives, ranked by difficulty, include:


from LifeHacker https://ift.tt/xgHsJnN

Razer Is Making a Gaming Haptic Pad for Your Chair

Following Razer’s wide release of its controversial Snap Tap feature earlier this week, which arguably gives owners of its keyboards such an advantage in some games that Valve has banned it from Counter-Strike 2, the company is now announcing even more pro-level hardware. This includes the expected pro update to its Kraken V4 headset, but more interestingly, there’s also new tech like a laptop cooling stand and what I can only describe as a gaming massage pad. 

Kraken V4 Pro

Kraken V4 Pro
Credit: Razer

The Kraken V4 Pro is the most obvious announcement here, giving the existing Kraken V4 headset an OLED control hub that puts it in closer competition with the likes of other premium headsets like the SteelSeries Arctis Nova Pro. There’s also 9-zone RGB, as is typical of Razer, and conveniently, the option to connect via Bluetooth, USB, a 3.5mm cable, or Razer’s 2.4 GHz Hyperspeed wireless dongle. Active noise canceling is absent, and in its place are the same vibrational motors that give the headset rumble features akin to a controller. Razer makes a big deal of the immersion these provide, but at $399, that price tag is still a big ask for a headset without ANC.

Razer laptop cooling pad

Razer Laptop Cooling Pad
Credit: Razer

Also a somewhat big ask is the new, $149 laptop cooling pad, which is essentially a laptop riser with fans built in and a USB hub included along its backside. Razer’s rendition aims to be more premium than the $30 versions you can buy from generic brands on Amazon, also coming equipped with a dust filter and three magnetic frames to ensure a tighter air seal with various sizes of laptops, plus adjustable motors with “smart cooling” that automatically changes fan speeds to balance noise with cooling.

Razer promises the cooling pad can lower temperatures by as much as 16 degrees and that noise is low thanks to a “vacuum tight” air seal, although time will tell—this type of device needs testing more than most, especially with such a premium attached to it.

Razer Freyja

Razer Freyja
Credit: Razer

Razer’s most exciting announcement, surprisingly, is more reasonably priced for what you get. Finally, Razer’s taking one of its more promising CES concepts and making it real. Originally teased earlier this year as Project Esther, the Razer Freyja bills itself as “the world’s first HD haptics gaming cushion,” and while there have been a small handful of similar products before, it does offer a lot for its $299 price point.

Rather than needing you to buy a whole haptic gaming chair, the Freyja is more like a massage pad, so you can lay it out over a chair you already own. Straps are adjustable to help it fit different chairs, and there are six haptic motors around the device, plus a control panel to adjust the intensity of the haptics.

I actually got to try the Freyja out when it was still the Esther, where I was impressed by its versatility. In Street Fighter 6, I felt hadoukens as they flew across the screen, and each punch genuinely made an impact on me. It wasn’t as simple as a binary on/off, too, as the direction and position of attacks and characters played into what I felt.

Razer Freyja in use in Final Fantasy XVI
Credit: Razer

This works thanks to audio haptics, which means the pad can automatically generate vibrations based on the game’s audio, so you don’t have to worry about whether your game specifically supports the Freyja. Instead, the pad will use factors like bass intensity and which channel sound is coming out of to decide how to use its motors. It’s similar to how the vibration on the Kraken V4 Pro works, and this also means you can use the Freyja with music and movies, too. Still, Razer said it’s working with the devs of games like Hogwarts Legacy to design haptic experiences specifically for the Freyja, which is where its “HD” claims come in.

The Freyja connects over either Bluetooth or a Razer Hyperspeed 2.4 GHz wireless dongle, although it does need a cable for power. For safety, the cable is quick-release, so you won’t trip over it if you need to quickly get up.

Both the Freyja and the Kraken V4 Pro are available starting today, although a release date for the laptop cooling pad still has yet to be decided.


from LifeHacker https://ift.tt/xsTlwfm

Friday, September 27, 2024

The Best iOS 18 Features for Parents

Apple's latest iPhone update launched last week, with plenty of new features to make life easier for you and your family. Here are a few changes that parents should know about to help with any privacy or screen time concerns as well as communicating with each other.

Lock and hide your apps using Face ID

It happens every time I'm with my kids in a waiting room: I loan them my phone to play Angry Birds, and they'll open another app. 

One of the most useful updates to iOS 18 is the ability to lock specific apps with Face ID. The easiest way to implement this feature is to press and hold the app until a menu appears. Then select "Require Face ID." 

Another pop-up will appear that allows you to confirm your decision or to "Hide and Require Face ID." If you choose the latter, the app will move from your home screen to the App Library under the "Hidden" category, which you can only open with Face ID. Thus, the app where your holiday shopping list is stored is now safe from prying eyes.

Improved messaging between iPhones and Androids

The green bubbles aren't going away, but if your kids have Android phones, they can't say they didn't get that text you sent from your iPhone. When you select "RCS Messaging" in your Messages app settings, you get features like read receipts, typing indicators, and location settings, so they can no longer say they didn't get that text about their curfew.

That said, the feature only works if the Android phone is also using RCS. Otherwise, you'll see an "SMS" tag in the text field, and your messaging experience will be the same as it used to be.

Satellite iMessage

We've all experienced those tense moments when wifi and cellular service are unavailable. With iOS 18, Apple has expanded its Emergency SOS via Satellite feature to allow users with iPhone 14 and newer to send messages via satellite. To see how it works, select the "Satellite Connection Demo" option in your Messages app settings. You don't need to know how to use the feature when push comes to shove, either: When you do run out of service, you'll simply be prompted to send your messages over satellite. It works for SMS, too, so you can message both iPhones and Androids.

You'll also be able to use this feature in the "Find My" app, and to request Roadside Assistance.

Apple Cash

Before this recent update, if you wanted to send money with your iPhone, you had to have the recipient's contact info or phone number to start the process. Now, if someone in your family needs a few bucks for a movie, you just have to tap each other's iPhones to send money with Apple Pay.

Schedule a text

If you don't want to forget to remind your child that it's time to head home, you can use the Send Later feature on the iMessage app to let them know curfew is imminent. Just hit the "+" symbol in the bottom left corner of the Messages app and tap "Send Later." A default send time will appear, but simply tap on it to select the date and time you want the message to send.

Once you send the message, it appears as a clear chat bubble with a dotted outline. You can adjust the send time by tapping "Edit" next to the chat bubble, or choose "Delete Message" if you no longer want to send it.

SharePlay on FaceTime

With iOS 18, you can interact with another person's device during a FaceTime call, which will be helpful when, say, showing grandparents how to use their iPhones. 

When you start a FaceTime call, press the SharePlay button, then tap "Ask to Share." Once the other person approves the request, their screen will appear as a window on your display, so you can walk them through any issues. If you want to take control, tap the hand icon in the corner of your display. When they approve the request, you'll be able to remotely control their iPhone's display. You can learn more about this feature from our guide here.

Passwords app

All the passwords saved on your iCloud Keychain have moved to a new app called Passwords. In the app, you can share specific passwords with shared groups, including other family members, so if your kids want to log on to Disney+, they don't have to call you at work—they can just look it up on the app.


from LifeHacker https://ift.tt/6uYpa7k

My Favorite Cordless Outdoor Gear for Fall Entertaining

Fall means it’s time for fire pits, tailgating, and cozy backyard movie nights. Setting up your outdoor get-together as the temperature begins to drop means cordless power for portability and comfort. Setting yourself up with some cozy gear can extend your backyard time well into fall—here are some of my favorite cordless essentials.

Log splitters

Cutting firewood to fuel your fire pit is easier with a log splitter. If you got your wood from chip drop, chances are it needs to be split. To cut firewood without access to an outlet, you can use a cordless log splitter. There are gas-powered models as well, but the battery-powered electric ones are quieter and often lighter. The downside of a battery-powered one is just that you’ll have to recharge the battery between uses.

Powered coolers

To keep beverages cold for longer when you’re tailgating, a cordless powered cooler is the best option. You can use one that goes with tool batteries you already have, like a Ryobi iceless cooler, or you can opt for a standalone version that has a built-in rechargeable battery. A cooler that uses removable batteries has the added bonus of making the batteries interchangeable with anything else that uses that battery system, while the standalone version can only power your cooler.

Portable heaters

Battery-powered heaters are trickier than other types of electric gear because they use a lot more power. However, you can use rechargeable battery-powered hand warmers for your pockets or you can try a neck warmer for portable heat. Ryobi also makes an 18-volt hybrid propane heater that can be used outdoors. You’ll need propane as well as some charged 18-volt Ryobi batteries for the portable propane heaters to work.

Heated seats

Thanks to tailgating ingenuity, there are a variety of options for portable heated seats, from cushions to camp chairs. There are also cordless seat cushions with a back cushion for more coverage. These heated seats are just as good for a backyard movie night as they are for a tailgating party or a game, and you can outfit patio furniture with heated cushions to make them more comfortable for group activities.

Power stations and inverters

Cordless power stations that work with tool batteries can allow you to charge devices and other small electronics. Larger power stations will run for about eight hours, depending on what you plug into them while smaller ones have fewer outlets and can run for about six hours, but with a smaller total output. The advantage of a smaller inverter for a tool battery is that they’re usually less expensive—about $100 each—while larger power stations can cost as much as $1,200, depending on the size and accessories.

Cordless speakers

Cordless speakers for your outdoor event are essential. There are a variety of cordless tool brands that make speakers for their battery sets, so you can try a Ryobi 18-volt speaker for those batteries, a Makita 18-volt speaker if you have a Makita set, or a DeWalt 20-volt speaker if you have a DeWalt set. These are usually referred to as “job site speakers,” but you can use them wherever you like. They operate on Bluetooth as well as phone-jack inputs.

Battery-powered projectors

Portable mini projectors are gaining popularity, as engineering breakthroughs for lenses and batteries have allowed them to get smaller and lighter. Batteries for an LED projector will also last about ten times as long as their conventional filament light bulb counterparts. A tiny battery-powered projector that can project up to a 100” display onto any surface and fits in the palm of your hand is around $180. These projectors will work better with a speaker, as the built-in speakers aren’t very large, so they don’t have a long-range sound output for outdoors.


from LifeHacker https://ift.tt/ZfQLXC3

The Best RSS Reader Apps for iPhone and Mac

Apple's platforms are the land of thoughtfully designed apps and utilities, and it's not limited to official apps. An indie app like GoodLinks helps you research better, and an app like Almighty will make you a Mac God.

My favorite, though, are RSS reader apps. Yes, you can download apps that come with RSS services like Feedly and Inoreader, but you're missing out on most of the fun with these. These apps are built to be cross-platform, are heavy, slow, and don't have any customization options.

Instead, if you're on Mac or iPhone, try specialized RSS readers built by passionate indie developers, and a whole new reading experience will open up for you. Your content can still come from Feedly (or you can sync your feeds using iCloud), and you can enjoy features like fast, native, full-text feeds. But there's also options for custom typography, themes, keyboard shortcuts, sharing options, and even additional sources like YouTube, Reddit, and Mastodon.

Reeder (and Reeder Classic)

Reeder app for Mac.
Credit: Khamosh Pathak

For more than a decade, Reeder has been a staple of the RSS apps market for Apple devices. It provides a fast and sleek RSS reader that's actually a delight to read. The minimalist app puts the reading experience first, and I like that a lot.

Now, the app has been split into two. The original Reeder app is called Reeder Classic, and it still offers the same, traditional RSS experience where you can connect couple of RSS syncing services and read all the latest articles. Reeder Classic is a one-time purchase from the App Store ($4.99 for iPhone and iPad, $9.99 for the Mac).

The new Reeder app is now more of a social reader. It does away with traditional RSS features like keeping an unread count and being able to connect to different RSS syncing services. The Reeder app syncs only using iCloud, which allows it to create social-media like timeline syncing, where the read position is synced automatically across all your devices.

Being a social reader, the Reeder app goes beyond articles and lets you add YouTube channels, Podcasts, subreddits, and entire feeds from Mastodon, Bluesky, or Micro.blog.

Once you've set everything up, Reeder can be the only place you need to go to read, listen, and watch content online. Reeder also has quite an interesting take on shared feeds. You can turn any tag into a shared news feed, and you can use it to curate articles to share with your friends, or followers online.

The downside is that the new Reeder app is still not fully finished. For example, at launch there's no way to create folders (a staple of RSS readers) or change the font size or style in the reader. Both features, thankfully, will be added in future updates. The premium version of the Reeder app is now subscription-based, running $1/month or $10/year (the free version is restricted to 10 feeds, and lacks features like connecting to Social media accounts and feeds).

NetNewsWire

NetNewsWire RSS reader for Mac.
Credit: Khamosh Pathak

If all you want is an incredibly simple, fast RSS reader that's designed natively for Apple devices and that's also free, check out NetNewsWire. This is a free and open-source project that's community supported and is in active development.

You can sync using popular services like Feedly, Feedbin, Inoreader, and more. You can customize the article themes, there's a dedicated Reader view, dark mode, keyboard shortcuts, folders, and all the basic features you'd expect from an RSS reader app.

Fast, simple, and no frills is the way I would describe NetNewsWire.

Lire

Lire RSS reader for iPhone.
Credit: Khamosh Pathak

Lire is an RSS app for iPhone ($9.99) and Mac ($9.99), and it specializes in one thing—full-text feeds. Many sites only show a portion of the article you're trying to read in RSS feeds. That means you either have to click through to open the website, or you need to use a built-in reader mode to load the article content, which takes a bit of time.

Lire, instead, downloads and parses the text from the website straight to your device. Before you even start reading, it will download text for hundreds of articles together, and all that content will be ready to read, even when you go offline. Lire is great for catching up on content, or skimming through news sites, without any kind of waiting time.

Other than that, Lire is a regular app. You can use it as a standalone RSS app, or you can sync using popular RSS services like Feedly, Inoreader, and more.

Unread

Unread RSS reading app for Mac.
Credit: Khamosh Pathak

Unread is all about style. I remember using it almost 10 years ago on my first generation iPad mini. It just looked so cool. The combination of beautiful typography and colorful themes was genuinely a sight to behold. But that's not enough for me, at least these days. Unread has gone through many updates, but retains its characteristic style.

The downside is that there's no way to change the app's default font, Whitney. If you don't like it, you should look at other apps on this list.

If you like the font, though, you'll enjoy using Unread. The app is native and wickedly fast at loading up dozens of feeds. If you choose to pay for Unread Premium ($4.99/month or $49.99/year), you get extra perks like automatic caching of text and images ahead of time, custom Dock icons, widget customizations, Safari share extension, and article actions.

But even without paying, Unread works out to be a great RSS reader. Like Lire, it too can automatically load full-text from RSS feeds, though you have to expressly enable it for each site, which is a bit of a hassle.

Feeed

Feeeed RSS and Social reading app for iPhone.
Credit: Khamosh Pathak

Feeeed is a social reader app that's built around an RSS framework. Feeeed is completely free and works only on iPhone, so there's no Mac version. It's also quite an opinionated app and will bunch up related stories from all your feeds together, plus it will default to an algorithmic feed (you are free to change that to a traditional timeline if you want).

Feeeed, being a social reader, lets you add YouTube channels and Subreddits in addition to articles, but unlike Reeder, doesn't let you sync your entire Mastodon feed, which is a bummer (you need to follow each Mastodon user individually). All that aside, Feeeed makes for a lightweight and fun reader for iPhone. Check out our previous coverage of the Feeeed app to find out more.


from LifeHacker https://ift.tt/BtDYPHI

This Google Nest Doorbell Is $100 Right Now

If you're looking for a video doorbell that can reliably distinguish between people, animals, and other objects, the Google Nest Doorbell might be worth a look, especially with the current sale price of $99.99 (down from $179.99). This wireless model comes with a built-in rechargeable battery that reportedly lasts up to two and a half months on a single charge and stores up to an hour of recorded events if there's a power outage and your wifi goes down. That said, to hear a chime, you’ll need to pair it with a Nest Mini (sold separately, which will add to your cost)—or you have the option to wire it to your existing doorbell.

The Nest Doorbell has a 145-degree field of view and records HD video in a vertical 3:4 aspect ratio, giving you a top-to-bottom view of everything at your door—even at night, with up to 10 feet of night vision supported by four infrared LEDs, as noted in this PCMag review. You can use its two-way audio to talk to visitors or select a quick response from its preset menu. It automatically starts recording when motion is detected or the button is pressed, and these recordings are stored in the cloud for free, though only for three hours. If you want a longer video history, you'll need a Nest Aware subscription ($12/month), which also sends you Familiar Face alerts when it recognizes someone from your library.

This device doesn’t work with Apple HomeKit or other smart home systems, relying solely on the Google Home app (and Google Assistant for voice commands). If you're after broader compatibility across different platforms, the Arlo Essential Video Doorbell might be a better option, and it's also more affordable at $76.44.


from LifeHacker https://ift.tt/Zq3eck5

Thursday, September 26, 2024

What's New on Netflix in October 2024

There's a lot on Netflix's October release schedule, but it's easy to pinpoint the one that will have the biggest impact on my social media feeds: Super queer teen romance series Heartstopper, based on the graphic novel series, returns for its third season on Oct. 3.

If your taste skews a little older (but not so old that you didn't watch Felicity in college), you may also be excited about The Diplomat season two (Oct. 31). Remember, that show where Keri Russell is, uh, a diplomat? I definitely remember when that was released and people talked about it for, like, three days. Fact I just learned: The show is from one of the producers of Homeland, which also cast an icon on teen TV (Claire Danes) as a government agent. Coming soon: A show build arount Katie Holmes as an elite sniper, probably.

From shows I forgot existed to shows I never knew existed: Netflix is also launching an animated adaptation of the Tomb Raider games, and I'll say this: There's no chance Tomb Raider: The Legend of Lara Croft (Oct. 10) is worse than the three Tomb Raider movies.

Other highlights: A few intriguing comedy specials from the likes of Ali Wong (Oct. 8) and Rachel Bloom (Oct. 15) and the two-season run of Detroiters, starring a pre-I Think You Should Leave Tim Robinson (Oct. 15).

Here's everything on tap for October, and everything that's leaving.

What's coming to Netflix in October 2024

Available in October (date TBA)

  • Children of the Church Steps (BR) — Netflix Series

  • Don’t Come Home (TH) — Netflix Series

Available October 1

  • 22 Jump Street

  • 8 Mile

  • As Above, So Below

  • The Birds

  • Boyz n the Hood

  • Bridesmaids

  • Brüno

  • Cinderella Man

  • Couples Retreat

  • Elysium

  • Escape Plan

  • Get Him to the Greek

  • The Girl Next Door

  • Halloween (2018)

  • It Chapter Two

  • Jarhead

  • Judy

  • The Karate Kid

  • The Karate Kid Part II

  • The Karate Kid Part III

  • Kung Fu Panda

  • Kung Fu Panda 3

  • Legion

  • Marnie

  • Psycho

  • Psycho II

  • Red Dragon

  • Robin Hood (2010)

  • Robin Hood (2018)

  • Salt

  • Scarface

  • The Sentinel

  • Till Death

  • Two Weeks Notice

  • Unfriended

  • Wipeout: Batch 4

  • Yellowjackets: Season 1

  • You're Next

Available October 2

Available October 3

Available October 4

Available October 5

Available October 7

Available October 8

Available October 9

Available October 10

Available October 11

Available October 12

  • A Quiet Place Part II

  • A Virtuous Business (KR) — Netflix Series

  • Clifford the Big Red Dog

Available October  14

Available October 15

Available October 16

Available October 17

Available October 18

Available October 19

  • American Ninja Warrior: Ninja vs. Ninja: Season 3

  • American Ninja Warrior: Season 14

Available October 21

  • Book Club

  • Kung Fu Panda 4

Available October 22

Available October 23

Available October 24

  • Tyler Perry’s Beauty in Black — Netflix Series

  • Territory (AU) — Netflix Series

Available October 25

Available October 28

  • Blippi's Ultimate Bounce House Challenges: Season 1

  • Blippi's Wonderful Talent Show

Available October 29

Available October 30

Available October 31

What's leaving Netflix in October 2024

Leaving October 2

  • The Super Mario Bros. Movie

Leaving October 5

  • Crazy Rich Asians

Leaving October 10

  • It Follows

Leaving October 21

  • Whitney Houston: I Wanna Dance with Somebody

Leaving October 26

  • Wentworth: Seasons 1-8

Leaving October 31

  • Bride of Chucky

  • Child's Play 2

  • Child's Play 3

  • Cult of Chucky

  • Curse of Chucky

  • Dark Waters

  • Dr. Seuss' The Cat in the Hat

  • Dr. Seuss' The Lorax

  • Eat Pray Love

  • Hellboy

  • Identity Thief

  • Jack Reacher

  • Jack Reacher: Never Go Back

  • Jumanji

  • Key & Peele: Seasons 1-3

  • La La Land

  • Magic Mike

  • Magic Mike XXL

  • Monty Python and the Holy Grail

  • Mr. Deeds

  • Save the Last Dance

  • Seed of Chucky 

  • Sonic the Hedgehog

  • The Expendables

  • The Expendables 2 

  • The Expendables 3

  • The Wedding Planner 

  • The Young Victoria 

  • World War Z


from LifeHacker https://ift.tt/LyrgkER