Monday, March 31, 2025

Watch Out for This Info-Stealing Malware on Windows

If you're a gamer, beware a new malware that's pretending to be an ASUS utility. CoffeeLoader impersonates Armoury Crate, which manages ASUS and ROG software and peripherals, and infects your Windows machine with an infostealer that's nearly impossible to detect.

How CoffeeLoader malware works

According to an analysis by ZScaler, once on your system, the CoffeeLoader malware delivers the Rhadamanthys infostealer, which can extract credentials from applications like web browsers, email clients, crypto wallets, and even the password manager KeePass.

CoffeeLoader then manages to evade most security tools on your device, including antivirus software and malware detectors, making it especially dangerous and difficult to catch. It does this in part by running on the graphics card (GPU), which security tools aren't as likely to scan, rather than your computer's CPU.

It also uses techniques like Call Stack Spoofing, which changes its trail of function calls to appear harmless, and Sleep Obfuscation, through which it encrypts and locks itself in your computer's memory so it's unreadable to security scanners. CoffeeLoader will also use pathways like Windows Fibers that are less likely to be monitored by security software.

How to protect your machine from CoffeeLoader malware

Malware like CoffeeLoader spreads successfully in part because it often looks like something trustworthy. Hackers may impersonate a brand like ASUS, leading you to believe you're downloading real software, whether from an ad, an online forum, a fake website found in search results, or a phishing attack via email or messenger app.

To prevent a malware infection, use caution when downloading utilities or any type of software to your machine. Always go directly to the official site—rather than clicking through search results or a forum link—to ensure you're getting the real thing. You should also follow basic cybersecurity best practices, like avoiding clicking links or opening attachments in messages that could be malicious.

If you believe your device is infected, there are a few steps you can take to remove malware from your machine. Start by disconnecting your PC from the internet and rebooting in safe mode. Search for and delete temporary files (Settings > System > Storage > Local Disk > Temporary files) and check Task Manager for suspicious activity or processes running on your device. In general, you can use a malware scanner to identify and remove infections.


from Lifehacker https://ift.tt/LB6fCHA

My Favorite Amazon Deal of the Day: The Sonos Arc Soundbar

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

The Sonos brand is well known in the smart speaker and surround sound space. And very much like Apple, people will pay a premium price for their minimalistic, premium quality, and discounts are often hard to come by. But today, the Sonos Arc, which was Sonos' flagship soundbar prior to the launch of the Sonos Arc Ultra, is $599, $300 off its usual $899 price. It's also a record low price for this model, according to price-tracking tools.

Sonos speakers are not for everyone, if only because you'll have to justify paying around two grand for a complete surround sound system when you can get a setup like the Samsung Q990C for about half the price. But audiophiles swear they can hear the difference, so the cost might be worth it to you.

If you pick up this soundbar, you'll want to consider the Sonos 300 rear speakers and the Gen 4 subwoofer to go with it—they're the latest Sonos has to offer, though you can choose Eras 100 or an older or smaller subwoofer to lower the price tag.

As for the Arc, it offers Dolby Atmos, providing immersive three-dimensional sound with height channels that simulate audio coming from above you (you can read the details in PCMag's "excellent" review). It offers enough of a low-end kick that you don't really need a subwoofer if you have a small space. If you already own other Sonos speakers, you can seamlessly connect them through the Sonos app to create a surround sound setup or a multi-room system.


from Lifehacker https://ift.tt/38ZTSWD

The Acer Chromebook Plus 514 Is at Its Lowest Price Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

The Acer Chromebook Plus 514 is $299.99 on Amazon right now, reduced from its usual $399.99.

According to price trackers, this is the lowest it’s been, and if you’re looking for a backup laptop or something for really light tasks, it might be worth a look. But let’s set expectations upfront—this isn’t a high-performance machine. It’s running on an AMD Ryzen 3 7320C processor with 8GB RAM and 128GB of eMMC storage, which puts it squarely in the “basic use only” category. You’ll get by fine with web browsing, emails, video calls, or streaming, but anything heavier than that—editing video, gaming, or multitasking with lots of tabs—is probably going to be a stretch.

What it does have going for it is a 14-inch WUXGA display that has a 1920 x 1200 resolution and supports touch, so navigation feels a little smoother, especially when you’re scrolling through articles or zooming in on images. Additionally, it’s got Wi-Fi 6E and Bluetooth 5.1, which makes it more future-proof on the connectivity front. And even though it’s plastic, it’s rated MIL-STD-810H for durability (according to this PCMag review) and has a spill-resistant keyboard—handy if you’re clumsy with coffee. It also runs on ChromeOS, which means faster boot times and built-in security, plus support for Android apps through the Google Play Store.

The battery life isn’t record-breaking, but it’ll give you a decent chunk of the workday—around 10 hours, depending on what you’re doing. It’s also got two USB-C ports, one USB-A, and a headphone jack, which covers most needs. That said, this is still a budget machine. The Ryzen 3 chip is entry-level, and the eMMC storage is slower than SSDs. You can’t upgrade the storage later either, so you’re stuck with what you get—unless you lean heavily on cloud storage.


from Lifehacker https://ift.tt/WbO3Suz

The Out-of-Touch Adults' Guide to Kid Culture: Incels and the 80/20 Rule

The real 80/20 rule, also known as the Pareto Principle, is a saying that asserts 80% of outcomes come from 20% of all causes. You can use it to organize your to-do list, among other things. But to many young men, 80/20 means something very different.

Young men are not alright. Masculinity is growing more toxic by the day. Online incel communities are growing, and the most receptive audience to poisonous ideas about gender seems to be children. This week's column isn't going to be fun: I'm explaining one of the guiding principles of the incel movement, and discussing a TikToker devoted to changing her red pill son's mind. And I can't talk about toxic masculinity without mentioning Elon Musk!

Spray some deodorizer and let's jump into the dank, upsetting world of incel beliefs.

What is the 80/20 rule?

The Netflix series Adolescence, is currently the buzziest show on streaming, a harrowing exploration of the inner world of an angry young boy accused of murdering one of his classmates, a girl who spurned him. One of the teenage characters mentions the “80/20 rule” as a way of explaining the incel/red pill culture that's central to the murder plot. Put simply, the 80/20 rule is an axiom that states 80% of women are attracted to only 20% of men, and understanding the pervasiveness of this belief is essential to understanding online misogyny.

Different communities of toxic dudes believe different weird things—many "looksmaxxers" think breaking your own facial bones can make you more attractive; red pill dudes believe men have to psychologically manipulate women into liking them—but the 80/20 rule is nearly universally accepted.

The idea seems to have originated in a post on Medium that was written 10 years ago. Taken on its own terms, the article is a fairly interesting, though methodologically flawed, look at the distribution of “likes” on dating site Tinder. Incel types ignored the problems with the research, ignored the context (it’s only about Tinder likes), and accepted the 80/20 Rule as a hard-to-swallow truth that explains how women relate to men. Even though the Medium post concludes that most men who want to meet women would be “better off just going to a bar or joining some coed recreational sports team” than using Tinder, incels decided the 80/20 rule meant something like "all women are shallow," and/or "it's not my fault that no woman wants to spend time with me."

For 10 years, incels and the incel-adjacent have expanded on the theory and repeated it to each other so many times that it’s rarely questioned in those spaces. If anyone you're talking to mentions the 80/20 rule in an affirmative context, you know you’re talking to someone who has a specific set of (wrong) beliefs, and who doesn’t have a large enough social circle to compare what they read on the internet to the way people act in real life. But is there anything you can do about it? Maybe.

Viral video of the week: De-pilling a red pill son

The creator of in this week's viral video, IAmRchlPrkr, is a mother trying to deprogram her teenage son. He has accepted some beliefs of the "red pill" community, a branch of incels, and she is not into it.

She first saw the problem when her child told her "all women are gold-diggers." There's a lot going on with that phrase. Despite bristling and yelling "not all men!" when anyone generalizes their own gender, the toxic male community is dominated by the idea that women are all the same: a Borg-like collective looking for the most attractive 20% of men, or the men with the most gold to dig.

This isn't new. In her 1998 book Intercourse, Andrea Dworkin could have been describing the incels of 2025 when she wrote, "the first tenet of male supremacist ideology is that men have a self and that women must, by definition, lack it." The difference is how sexist ideas that were once relegated to obscure corners of society have infiltrated the mainstream to the extent that literal children are repeating them to their mothers. (As with most of societal ills, we can thank the internet for that.)

Maybe this TikToker mom has the right approach to returning some sanity: When her son tells her, "all women are gold-diggers," she responds with "Which women?" and "name one woman who is a gold-digger." Of course he can't. Because the incel philosophy falls apart in the face of actual relationships with real humans.

What is "serious hat Soyjack?"

A fitting response to me quoting Andrew Dworkin in an earnest post about online masculinity is serious hat Soyjak:

Serious Hat Sojak
Credit: SoyGemVault - Deviant Art

Created by DevianArt user SoyGemArt, Serious Hat is a Wojak posted to comment on people who are, well, too serious online.

(If you're asking "what's a wojak?" I have previously covered the subject.)

Elon musk gamer drama continues

Speaking of toxic men: Elon Musk! If you’re an adult, you probably know Musk best as the CEO of an electric car company or as a dedicated public servant with creative ideas about how forks work. But kids know a different Elon Musk: Gamer Elon. Gamer Elon is seen as the ultimate sweat, and Gamer Elon recently mixed it up on X with the official account of video game Assassin’s Creed and got roasted like a Costco chicken.

The online dust-up started when ex-game developer @grummz made a post about streamer Hasan Piker, who he labeled a terrorist (because that’s what you do on X when you disagree with someone about public policy):

This led Musk, who is a grown adult, to post:

And then:

At this point, the official account of the video game at the center of the fight Assassin’s Creed: Shadows brought gasoline to the flame war.

The Assassin’s Creed post was viewed over 52 million times. It references the all-but-confirmed rumor that Elon Musk, a grown adult with a major position of power within the United States government, pays someone so gamers will think he’s really good at Path of Exile 2, a video game where you pretend to be an elf.

What does "come eat lobster with a monster" mean?

I don't want to leave you with all these toxic men, so let's end with a funny meme.

Back in 2020, then-Twitter user @blanketm9 changed the world forever when they tweeted:

Their post lay dormant until 2023, when a user (whose original post and name has been lost to history) added the context of a text conversation, complete with a "straight man."

Lobster with a monster meme
Credit: iFunny

Things were quiet for a couple years, then, for reasons unknown, the meme started truly taking off this month. I guess the time is right for posts like these:


from Lifehacker https://ift.tt/9KbVP0B

Exegol: Open-source hacking environment

Exegol is a community-driven hacking environment, which helps users deploy hacking setups quickly and securely. It’s made for penetration testers, CTF players, bug bounty hunters, researchers, defenders, and both new and experienced users.

Exegol hacking environment

Exegol offers clean, secure environments. Each project can have its own Docker container, keeping things organized and safe.

Exegol includes a Python wrapper that manages Docker and Git operations for you. Features like GUI apps, Wi-Fi, USB devices, and volume mounting are fully supported.

Docker images come pre-built or can be built locally. They include useful tools, custom configurations, helpful zsh plugins, and ready-to-use history.

Exegol also includes offline tools, so you don’t have to search online for scripts. Popular resources like LinPEAS, WinPEAS, LinEnum, PrivescCheck, SysinternalsSuite, mimikatz, Rubeus, and PowerSploit are easily accessible.

“Exegol’s uniqueness lies in its containerized, modular, and lightweight approach, which contrasts sharply with the more monolithic and resource-intensive designs of Kali, Parrot, BlackArch and similar solutions. It is highly suited for daily offensive engagements, training, and CTFs, where flexibility, operational security and environment consistency are paramount. With Exegol, it’s easy to spin up new containers tailored for specific categories of engagements, CTFs, trainings, etc. Not only Exegol provides the best environment but it’s also highly customizable and offers small feats here and there to make one’s day more comfortable and efficient,” Charlie Bromberg, the creator of Exegol, told Help Net Security.

You can use the tool on Linux, macOS and Windows. The following elements are required before Exegol can be installed:

  • Git (Linux | macOS | Windows).
  • Python3 (Linux | macOS | Windows).
  • Docker (Linux) or Docker Desktop (macOS | Windows).
  • At least 100GB of free storage recommended (a minimum of 20GB could be enough, but only for the light image).
  • Additional dependencies may be required depending on the host OS.

Future plans and download

“In the future, we intend to make more specific images, to update them monthly, and to have an even better choice of tools by setting up something we’ve been trying a few times: a voting system,” Bromberg said.

Exegol is available for free on GitHub.

Must read:


from Help Net Security https://ift.tt/aLNG8Jm

Sunday, March 30, 2025

How to recognize and prevent deepfake scams

Deepfakes are a type of synthetic media created using AI and machine learning. In simple terms, they produce videos, images, audio, or text that look and sound real, even though the events depicted never actually happened.

how to prevent deepfake scams

These altered clips spread across social media, messaging apps, and video-sharing platforms, blurring the line between reality and fiction.

The term “deepfake” was coined in 2017 when a Reddit user created a subreddit with that name. This subreddit was used to share AI-generated videos, often featuring celebrity face-swaps in explicit content.

At first, people used deepfakes for entertainment and fun, but over time, they have become a dangerous tool in the hands of criminals for fraud, identity theft, blackmail, and spreading misinformation.

What’s even more concerning is that you no longer need advanced skills to create one.

The technology behind deepfakes

Deepfakes mostly rely on a technology called Generative Adversarial Networks (GANs). Essentially, GANs involve two algorithms working together.

The first one, the generator, creates the fake content—like a video or image. The second, called the discriminator, tries to figure out if the content is real or fake. These two algorithms keep pushing each other to improve: the generator gets better at making realistic-looking fakes, while the discriminator becomes more skilled at spotting imperfections.

Another technique that’s often used, especially for tasks like face-swapping, is autoencoders. Unlike GANs, autoencoders don’t work with a generator and discriminator. Instead, they focus on compressing a person’s facial features into a small, manageable format and then reconstructing them onto another person’s face. Even though this method doesn’t use GANs, it still creates convincing deepfakes, especially for simpler tasks like swapping faces.

With the availability of various AI tools, ranging from open-source software (DeepFaceLab, Faceswap) to mobile applications (Zao, Reface), making a deepfake now requires little more than a laptop or smartphone and the right software.

Cybercriminals weaponize deepfakes

According to an Entrust report, a deepfake attack occurred every five minutes in 2024. In one case, a deepfake video conference call, combined with social engineering tactics, led to a multinational company losing over $25 million.

These scams have had a significant impact on crypto companies, leading to an average loss of $440,000.

A recent scam that made headlines involved a French woman who was deceived by a scammer posing as actor Brad Pitt. The scammer used AI-generated images to convince her that they were in a romantic relationship. Over the course of 18 months, the woman transferred €830,000 to the fraudster, believing it was for a medical emergency involving Pitt.

Beyond financial harm, such schemes cause emotional distress, undermine trust in digital communication, and disrupt business operations.

Due to the complex geopolitical situation worldwide, this technology has also been used to spread disinformation, particularly in the political arena. These AI-generated videos and audio recordings can falsely depict candidates making controversial statements or engaging in damaging behavior, potentially swaying voters’ decisions. So they can have devastating effect on democracy.

How to spot deepfakes

Although deepfakes are continuously improving, they still have imperfections, allowing you to enhance your ability to detect them.

Facial movements: Look for unnatural blinking patterns or eyes that seem unnaturally static. Subtle delays or mismatched expressions in reaction to events might also be a giveaway.

Lighting and shadows: Check if the lighting on the subject’s face matches the surrounding environment. Inconsistencies—like shifting light or irregular shadows and reflections—may suggest manipulation.

Audio-visual sync: Ensure that mouth movements align naturally with the audio. If the lip-sync appears off or the sound has slight distortions, it could be a sign of editing.

Visual artifacts: Examine the edges where the face meets hair or background. Unusual blurring, warped borders, pixelation, or ghosting effects can indicate that the video has been altered.

How to mitigate deepfake risks

There are some preventative measures we can implement to protect ourselves:

Use deepfake detection tools and software: Take advantage of specialized tools and AI-driven software designed to detect deepfakes. These tools can analyze digital content for anomalies and help verify its authenticity.

Stay updated on deepfake trends and technologies: Keep yourself informed about the latest developments in deepfake technology. Being aware of new techniques and common signs of manipulation can help you spot deepfakes.

Implement MFA to verify identities: This can prevent attackers from gaining access to sensitive accounts, even if they manage to create a convincing deepfake of someone.

Establish code words or verification processes for sensitive communications: This helps ensure that the person you’re communicating with is actually who they claim to be. This is particularly useful when dealing with transactions or sensitive personal matters.

Limit the sharing of personal media online: The more personal media you share online, the more material you provide to threat actors for creating deepfakes. Be careful about what images, videos, and other media you share on social platforms. Adjust privacy settings so that only trusted individuals or groups can view them.

No one knows what the future holds for us, but what was impossible or available only to a select few 20 years ago is now accessible to everyone, and that also means it is accessible to people with bad intentions.

With the advancement of technology, it will become increasingly difficult to distinguish what is real from what is fake, and there is simply no magic wand with which we can protect ourselves. All we can do is exercise caution and take every measure within our power to safeguard ourselves. And, of course, don’t believe everything you see on the internet or social media.


from Help Net Security https://ift.tt/FE37owN

Week in review: Chrome sandbox escape 0-day fixed, Microsoft adds new AI agents to Security Copilot

Week in review

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Microsoft’s new AI agents take on phishing, patching, alert fatigue
Microsoft is rolling out a new generation of AI agents in Security Copilot, built to help with some of the most time-consuming security challenges, such as phishing, data protection, and identity management.

Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783)
Google is in the process of rolling out Chrome v134.0.6998.178 to Windows users to fix CVE-2025-2783, a zero-day vulnerability that allowed attackers to to bypass Chrome sandbox protections.

Cyber insurance isn’t always what it seems
Many companies think cyber insurance will protect them from financial losses after an attack. But many policies have gaps. Some claims get denied. Others cover less than expected. CISOs must understand the risks before an attack happens.

UK NCSC offers security guidance for domain and DNS registrars
The UK National Cyber Security Centre (NCSC) has released security guidance for domain registrars and operators of Domain Name System (DNS) services.

The hidden costs of security tool bloat and how to fix it
In this Help Net Security interview, Shane Buckley, President and CEO at Gigamon, discusses why combating tool bloat is a top priority for CISOs as they face tighter budgets and expanding security stacks.

Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
Google’s fixing of CVE-2025-2783, a Chrome zero-day vulnerability exploited by state-sponsored attackers, has spurred Firefox developers to check whether the browser might have a similar flaw – and they found it.

A closer look at The Ultimate Cybersecurity Careers Guide
In this Help Net Security interview, Kim Crawley, cybersecurity expert and Professor at the Open Institute of Technology, discusses her latest book, The Ultimate Cybersecurity Careers Guide.

CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825)
CrushFTP has fixed a critical vulnerability (CVE-2025-2825) in its enterprise file transfer solution that could be exploited by remote, unauthenticated attackers to access vulnerable internet-facing servers (and likely the data stored on them).

Review: The Developer’s Playbook for Large Language Model Security
With the adoption of large language models (LLMs) across industries, security teams often play catch-up. Many organizations are integrating GenAI into customer interactions, software development, and enterprise decision-making, often without grasping the security implications.

If you think you’re immune to phishing attempts, you’re wrong!
Security consultant Troy Hunt, the creator of the Have I Been Pwned (HIBP) service, has revealed that he got tricked by a clever phishing email, and that the attacker gained access to his Mailchimp account and stole a list of email addresses of his newsletter subscribers.

Malwoverview: First response tool for threat hunting
Malwoverview is an open-source threat hunting tool designed for the initial triage of malware samples, URLs, IP addresses, domains, malware families, IOCs, and hashes.

Ingress-nginx vulnerabilities can lead to Kubernetes cluster takeover
Wiz researchers have unearthed several critical vulnerabilities affecting Ingress NGINX Controller for Kubernetes (ingress-nginx) that may allow attackers to take over Kubernetes clusters.

Finders Keypers: Open-source AWS KMS key usage finder
Finders Keypers is an open-source tool for analyzing the current usage of AWS KMS keys. It supports both AWS customer managed KMS keys and AWS Managed KMS keys.

Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)
A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no have access to (e.g., the web app’s admin panel).

The vCISO Academy: Transforming MSPs and MSSPs into cybersecurity powerhouses
While over 94% of service providers recognize the rising demand for vCISO services, more than 25% of providers report lacking the cybersecurity and compliance expertise needed to offer vCISO services.

Android financial threats: What businesses need to know to protect themselves and their customers
According to ESET research, Android financial threats, targeting banking apps and cryptocurrency wallets, grew by 20% in H2 of 2024 compared to the first half of the year.

Post-quantum cryptography and the future of online safety
In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare.

A CISO’s guide to securing AI models
To safeguard ML models from emerging threats, CISOs should implement a comprehensive and proactive approach that integrates security from their release to ongoing operation.

How AI agents could undermine computing infrastructure security
In this Help Net Security video, Ev Kontsevoy, CEO at Teleport, explores the risks AI agents pose to computing infrastructure, particularly when exposed to social engineering attacks.

Spring clean your security data: The case for cybersecurity data hygiene
Spring cleaning isn’t just for your closets; security teams should take the same approach to their security operations data, where years of unchecked log growth have created a bloated, inefficient and costly mess.

Hottest cybersecurity open-source tools of the month: March 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments.

OT systems are strategic targets in global power struggles
Compared to 2023, 2024 saw a smaller increase in cyberattacks that caused physical consequences on OT organizations, according to Waterfall Security.

Cloud providers aren’t delivering on security promises
Security concerns around cloud environments has prompted 44% of CISOs to change cloud service provider, according to Arctic Wolf.

China-linked FamousSparrow APT group resurfaces with enhanced capabilities
ESET investigated suspicious activity on the network of a trade group in the United States that operates in the financial sector.

Enemies with benefits: RansomHub and rival gangs share EDRKillShifter tool
ESET researchers have published an in-depth analysis highlighting significant shifts within the ransomware landscape, spotlighting the rise of RansomHub.

How does your data end up on the dark web?
The dark web is a hidden corner of the internet where people can remain anonymous. It’s often confused with the deep web, but they’re not quite the same thing.

Protecting your personal information from data brokers
How aware are you that your personal information could be bought and sold without your consent—and that there are companies whose entire business model revolves around this?

How to manage and protect your biometric data
As biometric data becomes an integral part of our lives, we must remain informed and cautious about how this sensitive information is collected.

Cybersecurity jobs available right now: March 25, 2025
We’ve scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now.

Whitepaper: Voice of Security 2025
Discover insights from 900 security leaders across the globe in IDC’s Voice of Security 2025 survey, sponsored by Tines in partnership with AWS.

Report: Fortune 500 employee-linked account exposure
According to data analyzed by the Enzoic research team, over the past three years of 2022, 2023, and 2024, more than three million employee-linked accounts became newly compromised by cybercriminals.

Infosec products of the month: March 2025
Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Alloy, Cloudflare, Cytex, Detectify, GetReal Security, iProov, Keysight Technologies, Outpost24, Palo Alto Networks, Pondurance, Red Canary, SailPoint, SimSpace, Sonatype, Sumsub, and TXOne Networks.


from Help Net Security https://ift.tt/Wj9LJ2q

Friday, March 28, 2025

These Dutch Ovens Are Less Than $70 Right Now (Including My Favorite One)

We may earn a commission from links on this page.

Dutch ovens are heavy duty cast iron behemoths ready to take on your next cooking challenge whether it’s steamed, braised, boiled, or fried. But usually with that much power comes (you guessed it) a ridiculous price tag. It’s important to note, while Staub and Le Creuset can retail for $200 to $500, other brands are just as effective. Here are three good options—well below $100—on sale right now for Amazon’s Big Spring Sale.

For a smaller Dutch oven

I’m a fan of Lodge—I’ve had a 12-inch cast iron skillet that’s been a fabulous helper for nearly a decade—and their 3-quart Dutch oven has been deeply discounted. Normally this petite Lodge Dutch oven retails for over $100, but you can get it for $55.17. (Note that some of the different colors might come up at $60.)

While a 3-quart pot isn’t very large, you can still cook three to four servings of side dishes, stews, and soups in this size pot. Here are some of my favorite things to cook in my Dutch oven. This size is great for smaller storage situations, and considerably lighter if you’re not interested in hoisting a 15-pound hunk of metal onto your stove. This heavy duty piece of cookware can last a generation if you take care of it, and look snazzy while doing it.

Larger options 

Overmont. While I’m not familiar with Overmont, this Dutch oven is a good option if you’re looking for a larger pot. This highly rated Dutch oven is a 5.5-quart pot, which is better for baking loaves of bread or making six to eight servings of soups and stews. It’s also good for braising roasts or thick cuts of meat, and can withstand temperatures up to 500°F, moving seamlessly from stove top to oven for braising, or high-temperature bread baking. It’s $59.49 with a $5 coupon right now. 

Lodge. If there’s a Lodge option for a bigger pot then I’m going to find it—and I have. This is their 6-quart Dutch oven on sale for $67.49. Granted, it’s a few bucks more expensive than the 3-quart above, but with that extra space you can do a whole lot more. 


The Best Amazon Spring Sale Deals You Can Get Now
Apple AirPods Pro 2 Wireless Earbuds $169.99 (List Price $249.00)
Ecobee Smart Thermostat Enhanced $169.00 (List Price $189.99)
Blink Mini 2 (White, 2-Pack) $37.99 (List Price $69.99)
Sonos Era 100 Wireless Speaker - White $199.00 (List Price $249.00)
Deals are selected by our commerce team

from Lifehacker https://ift.tt/xJTK4i1

My Favorite Amazon Deal of the Day: The Dangbei Freedo Portable Projector

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

Amazon's Big Spring Sale is almost over, but there are still deals you can take advantage of, including Lifehacker Associate Tech editor Michelle Ehrhardt's favorite tech deals. One deal you can take advantage of right now is the Dangbei Freedo, a portable projector with an official Netflix license and a 1080p resolution. You can get it for $399 (originally $549), the lowest price it has ever been, according to price-tracking tools.

Portable projectors, obviously, must work independently of an outlet and be easy to carry around. They don't get the best brightness, since they're meant to be light and portable and rely on a limited battery, so keep that in mind. This projector does all of the basics well. It's light, portable, has a 2.5 hours of battery life, which is on par with the competition, has 450 ISO lumens of brightness, which is good for its price, and has Dolby Audio and HDR10, nice perks that not all portable projectors have.

With 450 lumens of brightness, you'll need to keep a room relatively dark to get the best picture. However, it is usable in a backyard with some low ambient light (with some sacrifices in color and contrast). Since it's officially licensed by Netflix, the app comes pre-installed, and it uses the Google TV operating system, which is my favorite because it means you get to cast your phone using Chromecast.

The Dangbei Freedo has a full HD 1080p resolution, but it supports 4K, meaning it'll receive the signal but it will scale it down to 1080p. It's also impressive that it can cast a screen of up to 180 inches. The auto focus and keystone correction automatically kick in and work well, which is important for a portable projector.


from Lifehacker https://ift.tt/3REfCST

Suction Isn't the Only Thing That Matters When Choosing a Robot Vacuum

We may earn a commission from links on this page.

Right before the Consumer Electronics Show (CES) in January, I noticed a trend in robot vacuums. The suction power these robots were reporting were astronomical. Where Pa (suction power is measured in pascals) in 2024 was considered “high” at 8,000 or 10,000, the Ecovacs x8 is 18,000, the Dreame x50 is 20,000, and the Roborock Saros 10 is 22,000. In calls with the marketing reps and engineers of these machines I would routinely ask, “Is there a limit to how much suction is realistically useful?” And on more than one occasion, engineers revealed that the reason Pa levels had gone sky high was primarily because internal studies had revealed suction power was the primary way consumers chose robot vacuums. While I disagree that suction power translates to a good vacuum, I understand why consumers use this basis to choose: What other criteria would be important? 

Suction is only one factor in getting debris off the floor

To understand why suction power isn’t a good determining criteria, you first have to understand how robot vacuums function. Regardless of brand, almost all robots work like a regular vacuum does. On the bottom of the robot are a roller or series of rollers, like a regular vacuum. As the rollers go over debris, the suction from the robot pulls the debris off the rollers and sucks the debris into an internal, bagless chamber. To move debris toward these rollers, most robots have brushes that sweep the debris. In a perfect situation, all debris is picked up by the rollers, suctioned off of them into the chamber, and the floor is left clean. 

Roborock underneath robot
On this Roborock Saros, you can see underneath the robot, the sweep at the front of the robot is designed to move debris towards the rollers. This split design roller is meant to help debris move through the rollers without clogging. Credit: Amanda Blum

The reality is that certain types of debris, such as hair, tie up the rollers, which wraps around the roller and can slice the silicone on it. Larger debris, like a receipt or even a small piece of mulch can get stuck in the roller, requiring a human to dislodge it. Debris can also be sucked up but clog the pipe because it gets stuck on the way to the internal chamber. In some of these cases, more suction might help, but how straight a suction tube is designed, or even how big the flapper is on the internal chamber make a difference, too. In truth, the entire design of the system, and all the parts working in concert is what makes a robot vacuum successful (or not). 

Roborock QRevo
Even on this Roborock QRevo, you can see that the rollers occasionally get stuck with debris like floof, despite having high suction power. Credit: Amanda Blum

For instance, while recently testing the Eureka J15, which has over 16,000Pa, I noticed that even though the sweepers were moving debris directly towards the rollers, the debris wasn’t making it up into the roller, so the robot left the debris behind. The Dyson 360 Vis Nav, which has over 20,000Pa, rides so low to the ground that some debris can’t get to the rollers to be affected by the suction and is instead simply pushed around the floor by the robot.  Meanwhile, the original Switchbot K10+ had only 3,000Pa and did a spectacular job grabbing debris off the floor because it rides a little higher, allowing the rollers to access more debris, and the rollers are designed so that debris doesn’t get stuck as often. My favorite robot vacuum and mop of all time, the Roborock MaxV Ultra Vacuum, has only 10,000Pa but is undeterred by any type of debris and gets floors cleaner than any other vacuum I’ve tried. Roborocks have a very effective roller design that doesn’t seem to suffer from getting beat up by debris, and their sweepers are always being redesigned to be more effective at sweeping debris toward the rollers. 

Navigation, AI and the robots size matter, too

It’s not only the rollers, sweeper, and suction that determines how well it will suction debris off the floor—the robot also has to be able to access the space where the debris is. Robots are now getting slimmer so they can slide under more furniture, but they’re generally still 12-13 inch objects trying to squeeze themselves into spaces, and if you have a lot of floor furniture, the robot will have trouble getting between those objects to effectively clean. Robots do best in big, open spaces, with walls that have no toekicks. The AI on board most robots can sometimes identify debris as obstacles, and tell the robot to avoid the debris altogether. (This is a repercussion of a few robot vacuums accidentally rolling over pet waste years ago and smearing it all over a room; now, robots are overly cautious about anything that could be remotely interpreted as such by AI). 

Debris also has to move through the dock

There’s another point where suction matters, though most product listings don’t discuss it: the robot dock. This is where, in most cases these days, the robot will be auto-emptied into a real vacuum bag that has to be changed every few months. The value of the auto empty is infinite; it’s what makes robot vacuums autonomous. If the dock gets clogged, it’s a lot more work to solve than if the robot does. Recently, I’ve seen mentions of docks like the Narwal Freo Z getting redesigned so there’s less turns in the suction pipe that receives the debris in the dock, since that will translate to less clogs.   

Ultimately, there likely isn’t one “best” robot vacuum, but rather the best robot vacuum for your home, since each house is different. For example, if you have a lot of large debris in your home, you would likely want a Roborock, since they handle that type of debris better than most. If your house has a lot of obstacles, you might consider the Switchbot K10+ Pro, which is much smaller than most robots, and can navigate into smaller spaces. If you have high thresholds in your home, a robot that can navigate those thresholds, like the Dreame x50 or the Roborock Saros line would be important. While suction is a factor of robot success, it shouldn’t be the only or determining factor when making a buying decision.


from Lifehacker https://ift.tt/7QKVUZ1

Thursday, March 27, 2025

This Robot Vacuum and Mop Is Under $200 Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

Roborock is the maker of many fine robot vacuums (and vacuum/mop combos). They are so fine, in fact, that even when they're on sale, as many of them have been for the past few days during Amazon's Big Spring Sale, they can cost you several hundred dollars. One Roborock vacuum-and-mop combo, however, is really discounted right now: The Q7 Max is $189.99 (Amazon lists its regular price as $299.99 and the Roborock website shows the original price as a whopping $599.99).

The Roborock Q7 Max specs

Roborock Q7 Max Robot Vacuum and Mop
Roborock Q7 Max Robot Vacuum and Mop Cleaner, 4200Pa Strong Suction, Lidar Navigation, Multi-Level Mapping, No-Go&No-Mop Zones, 180mins Runtime, Works with Alexa, Perfect for Pet Hair(White)
Roborock Q7 Max Robot Vacuum and Mop Cleaner, 4200Pa Strong Suction, Lidar Navigation, Multi-Level Mapping, No-Go&No-Mop Zones, 180mins Runtime, Works with Alexa, Perfect for Pet Hair(White)

So, what do you get for $189.99? The Q7 Max comes with 4,200Pa of suction, which is modest but powerful. (Some Roborocks ratchet the suction power up to 10,000Pa, but if you're dealing with a standard amount of household dust, this should suffice.) This device also vacuums and mops simultaneously, saving time and effort. Like other models, you get 30 adjustable water flow levels, which means you can customize what the robot does based on your own preferences and flooring materials. It's not self-cleaning when it's in its dock, so you will need to empty the dust and water tanks periodically.

One of the key selling points of this brand's vacuums is its Lidar navigation, which enables the vacuums to create 3D maps of your space over time. From there, the machine will figure out the most efficient cleaning route and learn to avoid obstacles. It detects stairs, automatically returns to its charging dock when it needs to, and comes with a feature that allows you to lock it in using the mobile app so your kids and pets can't mess with it.

It'll run for up to 180 minutes on one charge and can cover over 3,200 square feet in that time. This model uses a rubber brush that stays low to the floor to pick up dirt and hair, both from flat surfaces and out of crevices. All that being said, it only runs on 2.4G wifi, so don't try to connect it to anything heavier-duty.

The Best Amazon Spring Sale Deals You Can Get Now
Apple AirPods Pro 2 Wireless Earbuds $169.99 (List Price $249.00)
Ecobee Smart Thermostat Enhanced $169.00 (List Price $189.99)
Blink Mini 2 (White, 2-Pack) $37.99 (List Price $69.99)
Sonos Era 100 Wireless Speaker - White $199.00 (List Price $249.00)
Deals are selected by our commerce team

from Lifehacker https://ift.tt/6gPRcjv

You Can Get Microsoft Visual Studio Pro for $28 Today

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

If you’re a developer, hobbyist, or just someone trying to keep up with modern programming tools without emptying your wallet, this deal might catch your eye: Microsoft Visual Studio Professional 2022 is currently going for $27.97 on StackSocial—down from its usual $499. That’s a one-time payment for lifetime access. Once you buy, the redemption code gets emailed to you instantly, and you have 30 days to activate it. There are no recurring fees, just a fully loaded development environment with features that make coding faster, cleaner, and less of a headache.

This version of Visual Studio marks a shift—it’s their first 64-bit IDE that handles larger projects without choking. If you’ve ever waited for your code editor to stop freezing while dealing with massive workloads, that’s less of a concern here. It supports cross-platform app development through .NET MAUI, so you're covered whether you’re building for Android, iOS, or desktop. Plus, features like Live Share make collaboration less chaotic. You can co-code in real time, control what collaborators see, and even carry over your custom settings. There’s also IntelliCode, which is basically AI that learns your coding habits and fills in the blanks intelligently. It can finish lines of code or suggest the next logical move based on your style and context. It’s a little eerie, but it works. You can also build, test, and deploy to Azure right from the IDE, which is great if you’re cloud-focused.

There are some things to keep in mind. This is for Windows users only. If you’re working on a Chromebook, iPad, or even a 32-bit system—this won’t work. It’s compatible with Windows 10 and 11, and you’ll need at least 4GB of RAM (though more is better). Depending on how many features you install, it also takes up anywhere from 850MB to 210GB of storage.


from Lifehacker https://ift.tt/yxiubKr

My Favorite Robot Vacuum Is Half Off During Amazon's Big Spring Sale

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

I test and review a lot of robot vacuums and mops. Usually, they're premium or flagship models, which makes the Switchbot K10+ an outlier, but it still impresses me every time I use it—so much that it is one of the few vacuums I've held onto to use myself. When Switchbot upgraded the K10+ to the K10+ Pro, it got even better (they made the vacuum suction more powerful and dropped the mop attachment). Right now, during Amazon's Big Spring Sale, it's $300, which is half off its regular price.

What makes it so special? It's tiny. About 2/3 the size of normal robot vacuums, it can get between and under spaces no other robot can. The radius it makes around chair legs and furniture is tiny, as well. It's quiet, and it doesn't get stuck on larger debris, or trapped in places because it's so small it can escape any spot most robots get stuck in.

Despite having about half the suction of premium robots, it works spectacularly across carpet, hardwood, tile, or rugs. The tower is petite, and is self-emptying. The Switchbot app is simple and easy to navigate, too. You can still create complicated maps and schedules.

While, generally speaking, I think most people should get a combo vacuum and mop these days, I've gifted the K10+ Pro to a number of people for their offices or smaller homes, and they've all raved about the machine. The current sale puts it below $300, and at that price, it is the best robot vacuum deal out there.

The Best Amazon Spring Sale Deals You Can Get Now
Apple AirPods Pro 2 Wireless Earbuds $169.99 (List Price $249.00)
Ecobee Smart Thermostat Enhanced $169.00 (List Price $189.99)
Blink Mini 2 (White, 2-Pack) $37.99 (List Price $69.99)
Sonos Era 100 Wireless Speaker - White $199.00 (List Price $249.00)
Deals are selected by our commerce team

from Lifehacker https://ift.tt/EWjZsDn