Friday, May 30, 2025

I Trained My YouTube Algorithm, and You Should Too

If Nielsen stats are to be believed, we collectively spend more time in front of YouTube than any other streaming service—including Disney+ and Netflix. That's a lot of watch hours, especially for an app that demands a great deal of trust when it comes to its algorithmic recommendations, which can easily steer you into strange, inflammatory, or downright dark directions. If you'd like a little more control over what you see, allow me to share with you the steps I took to finally tame my own YouTube algorithm.

Despite how much time we devote to watching YouTube, the app doesn't behave quite like most other streamers. Rather than loading up the hub page for a show or movie you want to watch, you often have to hope that if there's a new episode of a thing you like, YouTube will show it to you. (As someone who dabbles as a YouTube creator myself, I would love if the app offered show-specific landing pages, instead of a collection of playlists.)

And since the content on YouTube is so varied, it's easy to get your algorithm off track. Maybe you're in the habit habit of watching long-form content on YouTube, only to see that disrupted by one errant cat video—suddenly, YouTube seems to think you want to see only cat videos, and nothing more.

As YouTube has yet to answer my pleas for context-specific browsing profiles, I've had to make do with learning every trick I can to direct the algorithm myself.

The basics: Likes, Dislikes, Subscriptions, and the Bell

You can't spend 20 minutes on the app without a YouTuber preaching the gospel of like, share, and subscribe. You know by now how those actions help your favorite creators, but how do they help you? Unfortunately, there's no way to know exactly what effect your engagement has on the algorithm (even YouTube can't know for sure), but there are a few useful things to keep in mind:

  • Use Likes and Dislikes to nudge your recommendations, not to express approval or disapproval. The thumbs up/down buttons are the most direct way to express your interest (or lack thereof) to YouTube. They're also one of the most widely misunderstood tools. Don't think of them as a way to communicate with the creator about the substance of their content. In general, it's best to think of them as nudges for your personal recommendations. Likes are pretty strong indicators that you want to see more similar content, but Dislikes won't necessarily block a particular creator or topic from appearing in your feeds.

  • Subscribing is good, but not a guarantee. You can think of subscribing to a channel as sort of a super-like for the channel as a whole. This tells YouTube you want to see what they make next (or see more of their backlog). The downside is, subscribing doesn't guarantee you'll see anything. YouTube tends to favor more recent subs in your recommendations. If you want to see everything all the people you subscribe to make, you actually need to seek out your Subscriptions tab.

  • Clicking the bell really is the best thing you can do. Creators often like to remind you to "click the bell," and they do it for a reason: This will send you a push notification (assuming you allow notifications from your YouTube app) whenever one of your subs uploads a new video. Not only does that increase the likelihood you'll see new videos you care about, but it gives those creators important metrics they can use to understand their audience.

These are all extremely basic tools for refining your suggestions, but it's also important to understand them in context. YouTube doesn't just look at what you say you want, it watches how you actually behave on the app. If you like a video, subscribe to the channel, and hit the bell, but then you never watch a video from that creator again, YouTube will eventually stop recommending them.

That's neither a good nor bad thing on its own, and contrary to some paranoia among creators, it's not even bad for the channels themselves. The YouTube algorithm's goal is to put something in front of you that you're likely to spend time watching. If the videos it suggests aren't meeting that goal—no matter how much you've told the algorithm to show those videos to you—it will move on to something else. Understanding that gives us some context for moving on to some next-level algorithm taming.

Intermediate algorithm training: Refine your history and reject videos you don't want to see

The "Remove from watch history" button next to YouTube watch history
Credit: Eric Ravenscraft

If likes, subscriptions, and the bell are all small nudges to the algorithm, are there big nudges you can use? I'm so glad you asked. Watch time is the most obvious, but that's just using YouTube. And no, there's not much benefit in trying to manipulate this. Just keep watching things you like and stop watching things you dislike, and YouTube will try to follow your patterns.

"Try to" being the operative word. Anyone who's ever fixed a door knows that YouTube can be a bit over-eager to show you hours of content about something you spent five minutes watching. One quick way to fix this is to head to your History, find the video in question, and click "Remove from watch history." In addition to not showing up in your previously-watched videos list, YouTube also won't consider it something you spent time on when recommending new videos.

This trick only works for individual videos you've previously watched, though. If you're getting recommendations based on broad topics you don't like, you can ask not to see those recommendations before you even click on the video. Tap the menu button on a video's thumbnail to find options labeled "Not interested" (good for indicating you don't like this particular video suggestion) and "Don't recommend channel," which is the closest thing YouTube has to completely blocking a channel.

Frustratingly, if you allow YouTube to autoplay videos from the thumbnail before you ever click on a video—a feature you can and arguably should turn off—then that can count as a "view" in your watch history. I've lost track of how often I've set my phone down and accidentally "watched" a video for a few minutes. Even if you select "not interested" before clicking on a video, if it has autoplayed, you might need to remove it from your history as well.

Advanced algorithm mastery: Use playlists and multiple accounts to get recommendations silos

YouTube recommends more color grading tutorials from a playlist of color grading videos.
Credit: Eric Ravenscraft

I will die on the hill of my belief that YouTube should have a mode switcher. I want to be able to have a profile for watching in-depth video essays on niche topics and another profile for dumb cat videos. YouTube has come sort of close with the introduction of category tags. In some places, like YouTube on the web or certain views in apps, you'll see a list of tags for things like "Gaming" or "News" that will filter suggestions. In my opinion these are useful, but inadequate.

I'd rather have something that lets me train my personal recommendations in different buckets directly. And over the years I've developed two main strategies for accomplishing this: playlists and account switching.

Playlists

For the playlists approach, I save videos that I liked on a particular topic to a specific list. Then, if I want to see more videos on that topic, I'll open up the playlist and look through the sidebar. This usually gives me more specific video recommendations to that topic (interspersed with the usual recommendation buckshot), as well as more specific genre filters for me to drill deeper. The only downside to this approach is that it all happens in the sidebar of another video. It's a little nicer on mobile, but it can feel a little hacky at times.

Account switching

The account switching workaround feels more natural while browsing, but it's a bit more cumbersome to change modes. YouTube has gotten much better at account switching, with a simple "Switch accounts" dropdown in most of its apps. Of course, each one requires an entire Google account, but there's a decent chance you already have at least five of these by now, anyway.

There's nothing special about filtering videos this way, but it gives you a few different blank slates to work from, instead of one giant one. For example, I have a Gmail account that I only use as a throwaway for junk where I don't want to give my real email address. On YouTube, if I decide I want to indulge in junk video compilations, I'll switch accounts first. That way, any garbage I watch won't affect my primary account's recommendations. (This is also helpful if you want to have guests over but don't want them to poison your well with videos they pull up.) The only downside? If you use YouTube Premium to avoid ads, then that won't carry over to all your other accounts.

All of this tinkering will result in a streaming experience that is still less ideal than how apps like Netflix and Disney+ work. On those services, you can set up multiple profiles within your a single account, and pretend it's actually your aunt that's watching all that garbage TV when she comes to visit. Until YouTube makes that an official feature, the tricks outlined above will hopefully help you get better suggestions.


from Lifehacker https://ift.tt/NP9tCKu

You Can Get This iPhone 12 on Sale for $230 Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

If you're set on iOS but also don't want to spend flagship money, this refurbished iPhone 12 is worth considering, on sale for $229.99 at StackSocial. Available in black, it's a Grade “A” refurbished unit, meaning it shows little to no signs of wear—basically a solid used phone that doesn't look like it went through a blender. It’s also unlocked, so you can add any SIM and get going, whether you're on Verizon, AT&T, T-Mobile, or a smaller carrier.

The iPhone 12 runs on Apple’s A14 Bionic chip, which still performs well for day-to-day use. The 6.1-inch OLED display is sharp and bright, and the dual camera system (wide and ultra-wide) performs well in good lighting and doesn’t embarrass itself at night. You’re not getting cinematic mode or high-end zoom like the newer models, but it’s more than enough for social media, quick videos, and everyday use. Read this PCMag review to learn more about the iPhone 12.

That said, it’s not perfect. You’re limited to 64GB of storage, so if you shoot a lot of video or keep your entire photo library on-device, you’ll need to manage space or use cloud backups. Battery life is decent, though heavy users might need to recharge before the day’s over. And while it won't match newer budget Androids spec-for-spec, it makes up for it with long-term software support, solid build quality, and a clean interface free of bloat. For someone looking to stay in the Apple ecosystem, this deal makes sense.


from Lifehacker https://ift.tt/E4Ujl8F

Thursday, May 29, 2025

Google Photos' New Editor Has an 'AI Enhance' Mode

Google Photos has announced a redesigned editor for tweaking your images. Predictably, the new editor adds a few new AI features aimed at helping you choose the right effects and edit photos faster. It also includes out a couple of previously Pixel exclusive editing tools—Auto Frame and Reimagine—although it'll take a bit for everyone to see these updates. 

The redesigned Google Photos editor

With the redesigned Google Photos editor, tapping the Edit button below any photo will show all your editing tools in one place. Freshly, when you're editing a photo, Google Photos will also now offer AI-powered editing suggestions for you. To try this feature, tap to select the background or subject of the photo you're editing, after which the app will show you a few editing suggestions. You'll be able to quickly select your preferred editing tool and make your tweaks without having to navigate to the tool yourself. If even that's too much work, you can also just select the new AI Enhance tool instead, which has Google automatically combine various tools together and give you three results to choose from.

Google says the redesign is rolling out to Google Photos for Android starting next month, and it'll be coming to iOS later this year.

Share albums with a QR code

In the meantime, Google Photos has begun rolling out another new feature that makes it easier to share photo albums with others. The company says you can now generate QR codes for your albums to send to your friends, family, or even to a print shop, in case you want hard copies of your pictures. Anyone can use a generated QR code to access its linked album, but there are sharing controls in place to help you limit who can see or add pictures to it.


from Lifehacker https://ift.tt/ptjf1V8

You Can Get a Subscription of Microsoft 365 for $20 Less Right Now

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

When you’re juggling work on your laptop, managing your calendar on your phone, and storing family vacation photos somewhere in the cloud, it helps to have one service that actually talks to all your devices. That’s what Microsoft 365 Personal aims to do. Right now, StackSocial has a 1-year subscription for $79.99 instead of $99.99, which isn’t massive, but it’s a solid $20 off for something most of us end up using daily. You get access to premium versions of Word, Excel, PowerPoint, and OneNote, which means no more stripped-down online versions when you’re trying to format a resume or budget spreadsheet. It works across five devices at once—PCs, Macs, iPhones, iPads, and Androids—so it’s flexible if you bounce between gadgets.

What’s new here is Microsoft Copilot, the company’s AI add-on baked right into the apps. It helps speed up tasks like summarizing documents or generating ideas in Word and PowerPoint. In practice, it feels a bit like having ChatGPT inside your Microsoft apps—handy if you do a lot of writing, data analysis, or just want to save time. The 1TB of OneDrive storage is enough to store everything from work docs to your personal photo archive, and it syncs across devices. You also get security perks like ransomware detection, file recovery for up to 30 days, and a personal vault for sensitive files. For users in the U.S., there’s also identity theft monitoring through Microsoft Defender.

This subscription is designed for one person, and the apps are tied to a single Microsoft account. So if you're looking to share it with family, this isn’t the right plan (look at the Family version instead). It’s also only valid for purchases and use in North America, so international buyers should skip this one. But for someone who wants everything under one umbrella—secure cloud storage, powerful productivity tools, and now AI help baked in—it’s a pretty cohesive package. The value adds up, especially if you’re already deep in the Microsoft ecosystem.


from Lifehacker https://ift.tt/n1024Bc

The Best Heat-Resistant Vegetables to Grow in Your Summer Garden

This summer is predicted to be another scorcher, with record breaking temperatures across the U.S. beginning in June. While traditional summer crops do require heat, which is why we wait for summer to grow them, extreme heat waves or heat domes are a different thing altogether.

Plants have a series of behaviors they'll display when under heat pressure. They can wilt, which is what it sounds like, due to water stress. Leaves will droop, and the solution isn't necessarily more water, but letting the plant ride out the wave with some shade, if you can provide it. Plants may bolt, which is when they stop growing leaves or fruit and instead, thinking they are at the end of their life, send up a flower, which will quickly go to seed. Once this flower is present, which the plant focuses all its energy on, the fruit and leaves will become bitter. Unfortunately, there's nothing you can do to "solve" bolting, except pull the plant and start over.

And heat isn't the only threat: Fruit and leaves can also experience sun scald, which is basically a sunburn. You can see these spots on your tomatoes and pumpkins, which appear white, rather than red like they would on human skin. In most cases, plants will survive sunburn, but it puts the plant under additional stress and makes it more susceptible to other garden threats like disease.

The best solution is to choose plants that will tolerate heat spikes, and then provide some support to your plants by watering evenly, giving shade when you can in the afternoon sun, and not planting, transplanting, or fertilizing during these spikes, all of which are stressful for plants.

Greens that will survive a heat spike

While there are bolt-resistant lettuces you can grow, a true heat dome is simply too much stress, and most lettuce will go to seed. For heat-resistant greens, consider kale, which is hardy in both extreme cold and heat. Collards, known for the greens they produce, are also going to survive a heat wave without wilting, which is why they're popular across the south. The crop you might not have heard of yet is malabar spinach. While traditional spinach is a spring and shoulder season crop and won't do well even in an average summer, malabar (which is not actually related to real spinach) is a vining plant from India that tastes remarkably similar and has become popular for its resilience.

Okra and corn are at home in the heat

Considering crops that have been popular in geographies that experience more heat than we're used to is a good strategy for finding vegetables that'll survive extreme temperatures. Okra is from Ethiopia, so heat resistance is part of the plant's DNA. Okra sometimes gets a bad rap for becoming slimy in recipes, but I urge you to consider growing it. There are two varieties of okra: I recommend only planting the spineless variety. The "spines" are spikes that can make touching and harvesting okra painful.

corn growing
Credit: Amanda Blum

Corn may be a resource hog in your garden, requiring a lot of additional nitrogen to be productive, but it is also highly tolerant. Corn can survive in over 110 degree temperatures and still produce crops reliably, so long as those temperature spikes aren't extended. A true summer crop, corn needs 70 degree weather to grow, which is why you wait until June to plant corn seed.

Vining plants like luffa, tepary beans, and yardlong beans

To be fair, most people don't eat luffa (though you can); they know it instead as loofah, a sponge-like material used in "natural" scrubbing. But truly, luffa is a form of vining squash, which will grow prolifically, adores the sun, and thrives in prolonged heat. When the fruit is allowed to dry on the vine, the flesh can be stripped off, leaving behind the luffa, which looks precisely like loofah you purchase, and can be used immediately.

There are plenty of pole beans (beans that climb, as opposed to bush beans, which do not) that originated in hot climates and will do well in a heat wave. Tepary beans, for instance: These beans are native to the Southwest U.S. and Mexico, and will spend the summer climbing and producing pods. Harvest them in the fall before the rain starts, and store them as dry beans.

Yardlong beans are closer to a green bean. Still a vining bean, they can produce beans that are well over a foot long, as their name suggests. These summer stars prefer less water, and they will thrive anywhere they have support, like a trellis.

Soybeans need the heat

While not a vining bean, but a bush bean, soybeans are an easy crop to grow if you've got enough heat. These sun-tolerant plants will produce a limited amount of pods per plant, so they need to be grown in groups, but they require almost no support except watering. Harvest the pods and eat the beans steamed fresh, as you would in your favorite Japanese restaurant, or dry them to make soy milk or tofu.

Squash and melons love the heat

There are two kinds of squash: summer and winter. Summer squash includes crops like zucchini, yellow squash, and pumpkins. Winter squash includes crops like acorn squash, butternut, spaghetti, and others. Both kinds of squash are traditionally grown in summer, and both are surprisingly resilient in heat. While you might experience sunburn on some fruit, squash is famous for providing shade due to the large leaves, and they will not only take care of most fruit, shielding it, but will also protect nearby plants by shading them, as well.

So long as you keep your melons apart from your cucumbers and squash so they don't cross pollinate, your vining melons are likely to survive a heat wave with the same caveats as squash: Look for fruit that is exposed and cover it from sunburn, but the plant will mostly take care of that on its own.

Sweet potatoes are built for high temps

Originally from Polynesia, sweet potatoes are an excellent crop for beginning gardeners. They're easy to cultivate seedlings (called slips) from any sweet potato you bring home from the store. Once planted, they produce prolific above-ground vines that are showy with flowers, while below ground the potatoes grow over 120 days. These plants not only tolerate but thrive in heat.


from Lifehacker https://ift.tt/RirzZu7

Wednesday, May 28, 2025

This Business Method Can Help You Set a Home Renovation Budget

While updating, upgrading, and reimagining your home can transform it into your dream home, the logistics involved can be daunting, even if you have a general contractor managing the project for you. One of the biggest challenges is setting your budget—unless you have an unlimited budget (lucky you!), determining what a home renovation will involve based on what you can afford is a key aspect of your plan.

It’s also one of the most confusing. When budgeting reality bumps up against your dream home fantasy, figuring out what to remove from the project can be difficult because of the emotional aspects involved—everything can seem equally necessary when you’re imagining your future life in the home. In order to pare things down in a coherent and rational way, take a page from business school experts and use the time-tested MoSCoW Method.

What is the MoSCoW method?

The MoSCoW method was innovated by software developer Dai Clegg in the 1990s as a way to prioritize components of a project in order to stay on schedule and within budget. Although it was initially envisioned as a software development tool (and more widely as a tool for managing business projects in general), it’s malleable enough that it can be ideal for varied circumstances—including getting control of a home renovation project.

The method involves breaking all the aspects of your project into four buckets, represented by the letters M, S, C, and W (the Os are just there to make the name more readable). The categories are:

  • Must-haves. These are aspects of the project that are non-negotiable and mandatory.

  • Should-haves. These are parts of the project that aren’t absolutely necessary, but are relatively important.

  • Could-haves. These are smaller details that can easily be removed from the project or added in later if budget allows.

  • Won’t haves. These are aspects of the project that aren’t under consideration at all.

The simplicity of the MoSCoW method is its main strength—it’s easy to whip your home reno budget into shape in a short time by plopping everything into the relevant bucket.

Using MoSCoW to plan a home renovation project

When you’re planning out your home renovation, start dropping each aspect into a bucket as you go:

  • Things that absolutely have to be done are Must Haves. For example, if part of your renovation is replacing a leaking roof, that’s a Must Have—you have no choice, so that cost is baked into your budget from the get-go.

  • Major components of the project that aren’t absolutely necessary fall into the Should Have bucket. If your old hardwood floors are worn but serviceable, replacing them is a big part of what you want to get out of the renovation—but you could leave them in place, or try to refinish them instead of replacing them. These would be the last parts of your project that you remove or downgrade.

  • Grace notes and luxuries go into the Could Have bucket and held there pending how the budget plays out. For example, maybe you’d like your new flooring to have radiant heating. That’s nice, but not an absolute necessity. If money opens up later in the planning, you can toss it in.

  • Finally, there’s the Won’t Have bucket. This might seem like an unnecessary step, since anything not already sorted into a bucket could be considered a Won’t Have. But the exercise of specifically labeling it as a Won’t Have is useful because it brings clarity to your priorities. If you find more budget later, you’ve already prioritized the Could Haves as more deserving of rescue. Won’t Haves aren’t necessarily things you’ll never do—they’re just things you’re not doing now. For example, maybe your HVAC system is a little old and you’re thinking it will need to be replaced in the next few years—but not at this moment, because you’re spending your money on all these other projects. So you put that into the Won’t Have bucket because you know you’ll be returning to it in the future.

Once you’ve done an initial categorization of your home renovation, you can start crunching numbers to see if changes are necessary or desired. Maybe you decide, on reflection, that a Should Have is really a Must Have, or vice versa. And if your budget can’t deliver on every priority, you can shift some things into the Could Have bucket and hold them in reserve for the future.

Any successful home renovation is as much about planning and prioritization as it is about budget and schedule management, and the MoSCoW Method can help ensure your project is on track before anyone touches a power tool.


from Lifehacker https://ift.tt/a7dl2jm

My Favorite Amazon Deal of the Day: The Samsung Galaxy S25

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

Samsung announced the new Galaxy S25 Series back in January, a three-phone lineup with a fourth variation that was teased a month later, which you can preorder right now with a $50 Amazon gift card before its May 30 release. Out of those four, the Galaxy S25 is the most basic model with the lowest price, and currently, it's hitting a new record low price of $624.99 (originally $799.99), according to price-tracking tools.

The S25 has some upgrades from the S24 lineup: The best features in the OS are shared by all four phones, so you can still enjoy the best features from One UI 7, including exclusive media and notifications features from the cheapest option. Two of the best are Now Bar and Now Brief, which show you brief alerts or notifications personalized to your feed and activities.

The Galaxy S25 runs on the Snapdragon 8 Elite for Galaxy, has three rear lenses, including a 50MP wide-angle lens, and a 6.2-inch and 120Hz OLED display. The RAM is a generous 12GB, with the storage options starting at 128 GB. Currently, the mint color is the cheapest available.

PCMag gave the Galaxy S25 an "excellent" review for its useful AI features, a bright screen, good battery life, and excellent build quality. You can expect about 14 hours of juice from this phone. Keep in mind it does not support the S Pen stylus. Given its small size of 5.78 by 2.78 by 0.28 inches, it's a great option for those who prefer smaller phones.


from Lifehacker https://ift.tt/ZH12QPW

Firefox’s New Link Previews Are Actually a Good Example of AI Search

If it seems like every tech company is trying shove AI into all of their products and services, that's because they are. And as someone who rarely (if ever) uses AI, it's a lot: I don't need AI to write my emails, nor do I want it to generate realistic videos that might trick viewers into thinking they're human-made. I certainly don't need it to serve up incorrect information when I try to search the internet.

But Firefox's latest AI feature seems genuinely useful, likely because it isn't "making" anything for me. Instead its new AI-powered link previews simply show a small summary of the content on a webpage hidden behind a URL, so you'll have a better idea whether or not it's worth clicking on.

Mozilla first announced these AI-generated link previews last month, before rolling them out as part of Firefox 139. The feature is currently in the "experimental" phase, and Mozilla is open to user feedback on how to adjust it. Here's how it works in its current iteration: When you hover your cursor over a URL and hit the corresponding keyboard shortcut, Firefox retrieves and analyzes the webpage's HTML without actually loading the page. It then looks for metadata that can help inform the page's title, description, and cover image. Once it has the data it needs, it displays whatever it has pulled up in a pop-out window.

Like what you see? Go ahead and click through to see the full page. Not what you're looking for? Move on to the next link. Assuming the summaries are accurate, I can actually see this being something I rely on to give me an idea of whether or not a particular link is relevant to my current query—especially once Mozilla irons out some of the bugs.

How to test out Firefox's AI-generated link previews

In order to try AI link previews for yourself, you need to be running Firefox 139 (or newer). (If you're not sure which version you're on, open Firefox, head to Settings > General, then scroll to Firefox Updates. If there's a new update, install it, then relaunch the browser.)

That accomplished, head back to Settings, then select Firefox Labs. Under "Customize your browsing," click the checkmark next to "Link previews."

link preview settings page
Credit: Lifehacker

Now, open any website, hover over any link on your screen, and hit Shift + Alt (Windows) or Shift + Option (Mac). A small pop-up window should open immediately, along with the webpage's title and a brief description. Soon, you should also see the cover image for the page, then, after a few moments, Firefox will generate the page's "Key points."

link preview on mashable site
Credit: Lifehacker

Are Firefox's AI link previews worth using?

So far, the feature has been a bit hit-or-miss for me. Sometimes the key points it offers up are three well-summarized takeaways from the article. Other times, they are quotes lifted straight out of the article. Plagiarism aside, it's tough to get a sense of the scope of an article if the "key points" are just listing the first few ideas in the text.

I suspect part of the problem is that what the AI sees as most important will vary based on how each site is configured: I found the previews frequently copied the text on Lifehacker articles verbatim, for example, while summarizing articles found on other sites. Again, this feature is in development, so Mozilla may need to figure out how to accommodate the variations in in websites design to make it uniformly useful. But as AI features go, I don't hate it, and in 2025, that's saying something.


from Lifehacker https://ift.tt/cZGM1gi

18 of the Best Shows You Can Watch for Free on Tubi

Unlike the other big streamers, Tubi only has a handful of original shows, most of them imports (their original movie selection is much larger). That's not to say it's a wasteland for TV addicts: The streamer might actually have too many shows, a vast and sometimes wild catalog that spans decades.

As the likes of Netflix and HBO Max have slimmed down their catalogues, Tubi is growing, offering a mix of established hits, underrated gems, and more obscure offerings. For the sheer breadth of material on offer, it has become the first place I look for anything outside the current zeitgeist—like the following 18 shows, an entirely non-comprehensive sampling of what Tubi has to offer, crossing genres and decades.

Gossip Girl (2007 – 2012)

Occasionally referred to as the greatest teen drama of all time (certainly this side of 90210), Gossip Girl was a buzzy ratings champ for the CW back in the day, with its juicy, often scandalous storylines that veered so often into intentional satire that it was hard to ever get mad at the ridiculousness of any of it. Set among a group of well-heeled students on Manhattan's Upper East Side, its characters find their private lives being chronicled by the title’s mysterious master of gossip—so think of it as a proto-Bridgerton. You can stream Gossip Girl here.


Babylon 5 (1993 – 1998, five seasons)

J. Michael Straczynski’s wildly ambitious sci-fi epic was way ahead of its time, with a planned (more or less) five season story arc set on the titular space station. Babylon 5 is a remote outpost that becomes the last best hope for peace in the face of conflicting human and alien agendas—even more so after an ancient threat is awakened. With increasingly complex storylines that expanded over its run, this was a stab at prestige TV before that was a thing, and it still holds up (dated CGI effects notwithstanding. You can stream Babylon 5 here.


Empire (2015 – 2020)

Hip hop mogul and Empire Entertainment CEO Lucious Lyon (Terrence Howard) is dying, having been diagnosed with ALS at a young age. He wasn't planning to have to hand off his company so early, but nevertheless finds himself preparing his three very different sons (Trai Byers, Jussie Smollett, and Bryshere Y. Gray) to take the keys to the kingdom—by pitting them against one other. Into this already Shakespearean setup steps Lucious' ex-wife Cookie (Taraji P. Henson), just released from prison and harboring her own plans for Lucious's empire. You can stream Empire here.


Mr. Robot (2015 – 2019)

Social anxiety disorder, clinical depression, and dissociative identity disorder make up the potent blend of neurodivergences challenging Elliot Alderson (Rami Malek), a genius senior cybersecurity engineer at Allsafe Cybersecurity. In season one, he's recruited by an anarchist who goes by the moniker Mr. Robot (Christian Slater) to encrypt all the financial data of a global mega-conglomerate, thereby erasing massive amounts of debt (hey, real-life hackers, maybe take some notes?). The show starts strong and gets better across its increasingly labyrinthian four seasons—utterly preposterous while also feeling realistic in its technical detail. You can stream Mr. Robot here.


Boarders (2024 - , two seasons)

This British import feels a bit like a latter-day Skins, with a talented cast of young stars-in-waiting (including leads Josh Tedeku and Jodie Campbell) and a scholastic setting. At the (fictional) prestigious boarding school St. Gilbert’s, five Black teens are newly attending, having earned scholarships, but their integration into the existing cliques is less than smooth. The blend of coming-of-age drama with a willingness to take the piss when it comes to the whole rich private school thing makes this Tubi original a good time. You can stream Boarders here.


Big Mood (2024 – , renewed for a second season)

Another UK import and Tubi original (at least stateside), Big Mood stars Nicola Coughlan (Bridgerton) and Lydia West (It's a Sin) as a couple of besties in East London, living their best millennial thirtysomething lives. Well, kind of: Maggie's dealing with bipolar disorder, and unclear on whether she wants to continue with her medication as she sets out to write a play, while Lydia is doing her very best running a tanking dive bar inherited from her father. It's both a cute dramedy and an impressively frank exploration of the challenges of living with mental illness. You can stream Big Mood here.


Vicious (2013 – 2016, two seasons)

The old-school sitcom formula has never been executed quite this bitchily, with the inspired pairing of Ian McKellen and Derek Jacobi as Freddie Thornhill and Stuart Bixby, a couple of nearly 50 years who’ve developed a love-hate relationship. This cast, which includes Frances de la Tour and Game of Thrones’ Ian Rheon, is unbeatable, and the one-liners are hilariously nasty. You can stream Vicious here.


The Haves and the Have Nots (2013 – 2021, eight seasons)

Tyler Perry's old-school primetime soap was the show that practically built OWN; it was the then-new network's first scripted show, and an immediate breakout. It follows three families: The wealthy Harringtons and the Cryers are wealthy movers in Atlanta, Georgia, while the Young family is overseen by single mom Hanna, who's both a maid for the Cryers and confidante to the family matriarch. There's juicy tension galore between the three families, in no small part because of class differences, but also because they're all equally screwed. You can stream The Haves and the Have Nots here.


Spartacus (2010 – 2013)

Doing Ridley Scott’s Gladiator one better in terms of both narrative complexity and in hot shirtless gay arena action, Spartacus starts off as pure spectacle and grows into a juicy, high-gloss soap opera by series' end. Buoyed by performances from leads Andy Whitfield (who tragically passed away during the series' original run), Manu Bennett, John Hannah, and Lucy Lawless, it’s sword-and-sandals done right. A follow-up series is in development over at Starz, so it's a good time to catch up. You can stream Spartacus here.


Broadchurch (2013 – 2017)

Creator Chris Chibnall's dark crime drama didn't invent its particular sub-genre (whatever you call the one where two troubled homicide detectives butt heads in a gloomy town), but it did popularize it to the point that we've been inundated with countless imitators of wide-ranging quality. With the great pairing of Olivia Colman and David Tennant (joined by yet another Doctor Who Doctor, Jodie Whittaker), Broadchurch still stands alongside the best of its kind. You can stream Broadchurch here.


Doctor Who (1963 – 1989, 26 seasons)

Speaking of Doctor Who, even if you're current with the modern incarnation (if I can use "modern" for a show that started airing in 2005), you've got a lot of timey-wimey adventures to enjoy. Tubi has the entirity of the surviving 26-season original run, going all the way back to 1963 and the story of a mysterious old man living in a junkyard with his granddaughter. Seven doctors is enough to keep anyone busy for a while. Tubi has the show broken out by Doctor, but, if you want to start from the beginning you can stream The First Doctor here.


Haven (2010 – 2015)

Tubi is a haven for small gems like this, a five-season Stephen King adaptation originally produced by SyFy. Emily Rose stars as Audrey Parker, and FBI Special Agent sent to the small town of Haven, Maine on a routine case who gets drawn into “The Troubles," a series of harmful supernatural events that have recurred throughout the town’s history. A supernatural-case-of-the-week format gives way to a bigger mystery when Audrey comes to learn that this isn’t her first time in Haven, nor the first time she’s encountered the Troubles. You can stream Haven here.


Scandal (2012 – 2018, seven seasons)

Shonda Rhimes was already a powerhouse producer and screenwriter with several successful seasons of Grey's Anatomy under her belt when Scandal debuted, but its blend of political thrills and sexy, soapy drama is what solidified her brand, and her spot atop of the modern TV landscape. Kerry Washington stars as Olivia Pope, head of the DC-based crisis management firm Olivia Pope & Associates (OPA), who is the person to call when you've got a PR disaster to fix. If you want to get a sense of the stakes involved, consider that Tony Goldwyn costars as Fitzgerald Grant III, president of the United States, and also Olivia's lover. You can stream Scandal here.


Buffy the Vampire Slayer (1997 – 2003)

With word that Sarah Michelle Gellar (and company?) are returning to the wreckage of Sunnydale for a Hulu reboot, it’s probably not a bad time to visit (or revisit, or re-revisit) this seven-season teen vampire hunter saga. While the pacing might feel a little slow, and the effects a little janky, its blend of high school (and then college) angst, kick-ass monster fights, and genuinely laugh-out-loud comedy holds up. You can stream Buffy here.


Heartland (2007 – , 18 seasons)

If there’s a stereotype that middle-American viewers won’t watch foreign fare, this show puts the lie to it—at least when it comes to imports from Alberta (tariff-free!). Based on a popular book series from Linda Chapman and Beth Chambers (writing under the name Lauren Brooke), the show follows the lives of a family of horse ranchers in western Canada, led by sisters Amy and Lou (Amber Marshall and Michelle Morgan). Tubi currently has only the first 15 seasons of the drama, which has recently been renewed for a 19th. That’s Law & Order-level longevity, people. You can stream Heartland here.


Highlander (1992 – 1998, six seasons)

An classic of '90s-era syndicated action/adventure, Highlander stars Adrian Paul as the title hero, taking over from Christopher Lambert in the film series. Duncan MacLeod is an immortal warrior living in the modern(-ish) day, hunted by others of his own kind, whose goal is singular: to chop off Duncan's head in order to steal his power. Episodes typically involve some sort of flashback to an earlier era in Duncan's life where we first encounter the threat he'll face in the modern day. There's at least one good sword fight in every episode, and I can't imagine what more you'd want out of a series. Bonus: It carries over the films' kick-ass Queen theme song. You can stream Highlander here.


Z Nation (2014 - 2019)

The Walking Dead made prestige television out of the zombie apocalypse, but this SyFy channel original is all about zombies as a campy, gory good time.  Things kick off with a soldier who’s been tasked with transporting a package across country. The package in question is actually a human being, the survivor of a zombie bite who might be able to help create a vaccine (take note, The Last of Us fans). This one comes from the schlock-masters at The Asylum, purveyors of infamous B-movies like Sharknado, which should tell you all you need to know about the tone. You can stream Z Nation here.


Columbo (1968 – 2003, 16 seasons)

Peter Falk's sublimely rumpled detective practically invented the style that Peacock's Poker Face has recently revived: a crime (usually a murder) is committed, the viewers know whodunnit, and Columbo has to solve it. Early on in any given episode, we get to watch the crime being committed, though we don't always know the motive. The challenge isn't to figure out the culprit, but to discover exactly how TV's greatest detective is going to solve the case. You can stream Columbo here.


from Lifehacker https://ift.tt/Ya4Voj9

Tuesday, May 27, 2025

WhatsApp Is Finally Available on iPad

The wait is over, people: WhatsApp is officially, finally, available on iPad.

WhatsApp started as an iPhone app way back in 2009. Seventeenyears later, the app is still available on iPhone, as well as Android, Mac, and PC. But one platform the app has never been available for is the iPad. Despite being the most popular mobile messaging app in the world—roughly a quarter of the global population uses it—Meta never cared to bring WhatsApp to the most popular tablet in the world.

That changes today. On Tuesday, May 27, Meta included an iPad app with the latest WhatsApp update (version 25.16.81). It comes just one day after the company teased the app on X: The official WhatsApp account reposted an X user who said there should be an iPad version of the app. WhatsApp didn't say anything other than posting the side-eye emoji, heavily implying the app was on its way.

From the App Store listing, it appears to be the usual WhatsApp experience you'd expect from, well, WhatsApp—only, optimized for the iPad's larger display. When viewing your chats, you can see all conversations in a column on the left, with the active chat featured prominently in a larger column on the right. Your statuses will take up the full screen, and video calls will let you fit many callers on one screen. (I imagine this will be a big improvement for people who frequently video call groups on the iPhone app.)

You can download WhatsApp for iPad here.

Instagram may be getting an iPad app too

WhatsApp isn't the only Meta app that needed an iPad version. Instagram infamously has remained iPad free for years, forcing users to download the iPhone version or rely on the web app to access Instagram on their tablets. Rumor has it, however, the company is working on a native iPad app for Instagram, too, though nothing is set in stone. It would be a big improvement for Instagram users who often browse on their iPads, but we'll have to wait and see if the company actually pulls the trigger.


from Lifehacker https://ift.tt/AHqOov2

How (and Why) I Use Smart Cameras to Monitor My Garden

We may earn a commission from links on this page.

While most people think of smart cameras as just a part of their security system, they’re also a good way to monitor the things growing in your yard. In most cases, the cameras you already have set up for security can be doing double duty as a tool to keep track of what's happening in your garden.

I believe we’re on the cusp of smart cameras becoming a much bigger part of the gardening experience. For the last few years, smart bird houses have exploded in popularity. One of those companies, Bird Buddy, has launched an entirely new line of cameras specifically for micro-viewing experiences in the garden. Their Petal cameras, expected to be available next year, should be positioned closer to the ground than most security cameras, and are meant to capture bees, insects, and butterflies, as well as the growth of your plants. Using AI (as a subscription service), the camera will allow you to assign names to your plants and even communicate with them. Still, there is a lot you can do with security cameras already on the market. 

Remote monitoring

Winter shot from EufyCam
Credit: Amanda Blum

In an ideal world, you could pack up for vacation and your yard would take care of itself—but a smart camera can allow you to remotely keep an eye on what’s happening and monitor for any damage. What’s impressive to me is how well my solar-powered cameras maintain their connection, even during low temperatures and freezing rain. 

Close up of plants via security cam
I've been impressed at how much detail I can get from small plants through my cameras. Credit: Amanda Blum

Cameras allow you to keep an active watch on your yard. Not only will your security camera let you know if your trusted waterer drops by while you're gone as promised, but you can actually see how your plants are doing and if additional help is needed.  I’m always impressed at how good the zoom is on the cameras I use around my yard; I can actually tell if a tomato is ripe or if broccoli is ready to be picked. 

Last year, when I couldn’t get outside because of a sprained ankle and had someone helping in the garden, being able to see what they were doing and communicate with them via my security camera was invaluable. It’s much more effective than trying to describe what you need or want. 

Catch pests

Garden pests are frustrating for a wealth of reasons. To start with, you often don’t know what kind of pest you’re dealing with, and it’s nearly impossible to catch them in the act. Smart cameras are perfect for this, because they give you fly-on-the-wall ability to passively watch. Motion detection does most of the work for you. 

My security camera let me know I had raccoons in my yard last winter. They weren’t doing any damage (yet), but it helped influence how I design my garden and chicken coops. The cameras identified the cat that had chosen my garden to use as a litter box, checking in each night around 1 a.m. I’ve been chasing down a rat for the last two weeks, and the cameras do a spectacular job of catching his activity, which tells me where to add traps and what I may be doing that is enabling him. 

Other uses for smart cameras in your yard

Chickens in the coop
Credit: Amanda Blum

The most invaluable service I’ve gotten from my cameras are how I use them to monitor backyard pets. I could not figure out how my newly adopted doberman was escaping from the yard, so I installed security cameras, and discovered she was climbing a five-foot tall chain link fence. I’ve got three cameras installed in my chicken coop, and they tell me when there are eggs to be grabbed, if a chicken is becoming broody, if everyone got into the coop at night, and if that pesky rat has cracked into the chicken food. When I first got my chickens, I couldn’t figure out which bird was laying which color egg, but the cameras helped. And now that I have a beehive, being able to see the activity going in and out of the hive is a helpful to monitor the health of the hive, and if a rodent of any kind tries to get in, I’ll know immediately. 

How to choose a camera for your yard

I’ve tried smart cameras from almost every major brand, and I’ve figured out some things. First, in almost all cases, I want a PTZ (point, tilt, zoom) camera. These allow you to use your phone as a remote control and move the camera around, often almost 360 degrees, to zoom in on what you want. This is far superior to a fixed range camera. It’s simply annoying to have something going on just outside of the range of your camera and not be able to do anything to adjust it remotely. 

Additionally, I look for an app that makes it easy to watch clips. While I think Reolink cameras are affordable and functional, their app forces you to watch a horizontal clip on a vertical screen, so details are incredibly small. The Ring app has a lot of bloat, bringing neighborhood alert notifications to your phone. I enjoy the Aqara, Switchbot, and Eufy apps for getting to the video quickly and easily. 

Lastly, as you add cameras to your collection, being able to remain free from subscription costs is a real bonus. For that reason, I have largely switched over to Eufy cameras, which—if connected to a Home Base—don’t need a subscription. 

What I use in my yard:

Where to place your camera

Reolink mounted on outdoor post
Credit: Amanda Blum

All security cameras are either hardwired or wireless. You might already have exterior floodlights on your home, and wired security cameras can use those connections, replacing the lights (many units come with floodlights). In this case, your connection is likely high up, and can’t be moved easily. So long as it’s high up, you likely have a good field of vision of your yard, but make sure to consider plants that grow in the summer, and if they’ll block your view. 

If you don’t have these connections available and don’t want to pay an electrician to create them, you need wireless cameras. But I actually prefer my wireless cameras. 

First, the solar power on most of them is astounding. I live in the Pacific Northwest, a place with seven months of gloom, and my cameras always stay powered. Second, being wireless means you can move your camera around to find the perfect spot. Usually all you need is to screw the base into the spot you want the camera. Don’t be afraid to try different spots, when I was chasing down how my dog escaped, I had to keep moving the camera. I attached the camera to a 2x4, and moved the wood around the yard, leaning it against whatever was near until I found the right range of vision. 


from Lifehacker https://ift.tt/xNjhXzm

Monday, May 26, 2025

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into companies around the world, gaining access to sensitive data.

fake IT workers

Recently, more of these schemes have been linked to North Korea. They don’t just steal crypto or deliver malware. Now, they log into your systems as employees. This is no longer just a cybersecurity issue, it’s a growing geopolitical threat.

There may be hundreds of thousands of these workers deployed globally, though precise numbers are hard to verify. The U.S. Treasury, State Department, and FBI estimate that the IT worker scam has generated hundreds of millions of dollars each year since 2018.

Although US companies were their primary targets, North Korean IT workers have started expanding their activities to the rest of the world, especially Europe. This shift is likely due to pressure from American law enforcement agencies at exposing these activities.

How they do it

Using stolen credentials or fake identities, these actors are often hired as remote contractors, since there’s no need to appear in person or attend on-site interviews.

They use AI to make deepfakes for video interviews. AI also helps them overcome language barriers by improving résumés and eliminating poor grammar.

To increase their chances of success, they’ve built an entire support network:

  • People running IT staffing companies that help them get hired
  • Laptop farms that hide their real location
  • Individuals who receive salaries in legitimate accounts, then forward the money onwards

Risks and consequences

Once inside your organization, these fake IT workers can compromise systems, and exfiltrate data.

Installing malware or creating backdoors can give them long-term access, even if their initial access is revoked. Depending on the access they gain, they can steal intellectual property, or leak sensitive corporate strategies.

This brings us to social engineering, where these individuals appear as trusted employees, for example, by pretending to be a tech support coworker and asking for passwords or access codes.

Before this became a major concern in corporate circles, these workers could slowly slip into companies without raising suspicion. That’s no longer the case, since being discovered early on could lead them to take revenge or resort to blackmail.

How to protect your organization

There’s a lot of finger-pointing when one of these workers slips into an organization. Did HR miss something during hiring? Or did the IT and security teams fail to catch the signs early?

HR is the first line of defense in hiring, but with remote jobs, spotting this kind of fraud isn’t easy. That’s why even a basic security check or a second opinion from someone with technical knowledge can make a big difference.

Insist on caution. Human judgment plays a crucial role. Too often, we focus only on positive traits when assessing someone, which can lead us to overlook potential red flags. Security awareness training must be comprehensive, ensuring staff are equipped to recognize and report anomalies.

Enforce the principle of least privilege. Give people access only to what they need to do their jobs. Nothing more. Check access rights often and remove anything unnecessary. This helps block fake workers from getting too much control.

Monitor for unusual behavior. Track login times, IP addresses, and data access patterns. Flag remote workers who suddenly log in from unexpected countries. Watch for unusual file downloads, system changes, or unauthorized software installations.

Carefully review vendors and third-party recruiters. Some fake IT workers enter through staffing agencies. Vet the agencies you use and ask for details about their screening process. Don’t rely only on outsourced hiring for technical roles unless you fully trust the partner.


from Help Net Security https://ift.tt/Tyk1iZB

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk assessments, conducted annually or quarterly, are too slow to detect active threats.

third-party breaches increase

35.5% of all breaches in 2024 were third-party related, a 6.5% increase from 2023. This figure is likely conservative due to underreporting and misclassification. So while you’re updating your firewall rules, somewhere in your supply chain a vendor might be inadvertently letting in the very attackers you’ve been working to keep out.

46.75% of third-party breaches involved technology products and services, a drop from last year’s 75%, signaling a diversification of attack surfaces. File transfer software remained the top third- party breach enabler, with Cl0p exploiting vulnerabilities in Cleo software (CVE-2024-50623 and CVE-2024-55956) to launch large-scale attacks.

Cross-industry technology was four times more commonly exploited than industry-specific technology, reflecting the broad reach of supply chain risks. Retail and hospitality saw the highest third-party breach rate (52.4%), followed by the technology industry (47.3%) and the energy and utilities industry (46.7%).

4.5% of breaches now extend to fourth parties, one breach triggers multiple organizational failures.

Healthcare in the spotlight

The healthcare sector had the most third-party breaches (78) but a below-average rate (32.2%).

Healthcare suffers from the most breaches overall (242 incidents, 24.2% of all breaches), but a smaller percentage of these breaches involve third parties than the cross-industry average. This isn’t due to greater resilience against third-party attacks, but rather reflects the sheer volume of direct attacks targeting healthcare organizations.

A notable source of third-party risk comes not from external vendors but from within an organization’s own corporate family. The risk from subsidiaries and acquired companies represents a blind spot in many security programs. Subsidiaries and acquisitions account for 11.75% of third-party breaches globally.

Ransomware attacks are correlated with third-party breach vectors

There is a significant correlation between ransomware attacks and third-party breach vectors, suggesting that supply chain vulnerabilities are becoming increasingly central to ransomware operations. 41.4% of ransomware attacks now start through third parties.

Cl0p remains the most prolific group but saw its share decrease from 26% to 17% year-over-year. Despite this decline, Cl0p’s share remains more than twice that of the next most active group (17% vs.8.2%). LockBit continues to hold second place despite law enforcement disruption.

Ransomware attacks represented a larger share of third-party breaches (34.6%) than of overall breaches (29.7%), a 4.9% difference.

Singapore (71.4%) had the highest third-party breach rate, followed by the Netherlands (70.4%) and Japan (60%). The US reported a lower rate (30.9%), falling 4.6% below the global average.

“Threat actors are prioritizing third-party access for its scalability. Our research shows ransomware groups and state-sponsored attackers increasingly leveraging supply chains as entry points. To stay ahead of these threats, security leaders must move from periodic vendor reviews to real-time monitoring to contain these risks before they escalate throughout their supply chain,” said Ryan Sherstobitoff, SVP of SecurityScorecard’s STRIKE Threat Research and Intelligence.


from Help Net Security https://ift.tt/mnxQ60R

Cybersecurity jobs available right now: May 27, 2025

cybersecurity jobs May 2025

Application Security Engineer, SDO AppSec

Amazon | EMEA | Hybrid – View job details

As an Application Security Engineer, SDO AppSec, you will be responsible for creating, updating, and maintaining threat models across a diverse range of software projects. Part of your role will involve developing security automation tools to enhance efficiency and consistency. You will perform adversarial security analysis, leveraging tools to complement manual testing efforts.

CISO

AudioCodes | Israel | Hybrid – View job details

As a CISO, you will develop and maintain a robust information security strategy aligned with the company’s business objectives. Identify, assess, and prioritize security risks, implementing effective mitigation strategies. Design, implement, and manage security architectures, including network, application, and infrastructure security.

CISO

Dubai Civil Aviation Authority | UAE | On-site – View job details

As a CISO, you will develop and implement the DCAA’s information security strategy in alignment with business goals and objectives. Establish and maintain comprehensive information security policies and procedures that comply with industry standards, regulations, and legal requirements. Develop and implement risk management strategies to address and mitigate these risks effectively, including business continuity and disaster recovery planning.

Get weekly updates on new cybersecurity job openings. Subscribe here!

Cleared Cyber Threat Hunter

Vibrint | USA | On-site – View job details

As a Cleared Cyber Threat Hunter, you will hunt for and identify potential threats and vulnerabilities within clients’ environments. Perform in-depth analysis of security logs, network traffic, and other data sources to identify indicators of compromise and suspicious activities. Develop and implement threat hunting methodologies and techniques to effectively detect and mitigate advanced cyber threats.

Cloud Security Lead

Miro | Germany | Hybrid – View job details

As a Cloud Security Lead, you will propose, design, implement and maintain cloud and infrastructure-related security controls and solutions. Perform security audits of the cloud, infrastructure and data security. Perform security reviews (architecture review, design review, code review) of the cloud, containers and infrastructure changes.

Cybersecurity Analyst I, Applications

The University of British Columbia | Canada | Hybrid – View job details

As a Cybersecurity Analyst I, Applications, you will design, implement, configure and manage application security solutions based on business, security, and privacy needs. The incumbent will monitor and respond to threats and vulnerabilities by implementing protective measures such as web application firewall rules.

Cyber Security Analyst

Defence Construction | Canada | Hybrid – View job details

As a Cyber Security Analyst, you will Review and interpret IT security alerts in order to respond and provide diagnostics. Respond to, investigate and analyze security incidents and breaches. Operate and maintain DCC’s cyber security awareness program by running periodic phishing campaigns and delivering training. Contribute to the disaster recovery plans for DCC’s computer systems, databases, networks, servers and software applications.

Cyber Security Consultant

Allianz | Australia | On-site – View job details

As a Cyber Security Consultant, you will embed strong cyber security risk management practices across the enterprise. You will collaborate with both local and global cyber security teams to manage threats, respond to incidents, and strengthen the organization’s overall security posture. Your responsibilities will include conducting cyber threat and risk assessments, monitoring emerging technologies, and recommending proactive solutions to mitigate potential risks.

Cyber Security Consultant

Insight | Italy | Hybrid – View job details

As a Cyber Security Consultant, you will develop and implement comprehensive security strategies tailored to the unique needs of businesses and enterprise environments. Identify, assess, and mitigate potential threats and vulnerabilities within the organisation’s infrastructure, ensuring proactive measures are in place.

Cyber Security Engineer

Goldbelt Nighthawk | USA | On-site – View job details

As a Cyber Security Engineer, you will enforce department and industry standards, guidelines, and policies for securing windows servers ensuring they have been appropriately applied and configured across all OBO/IRM IT infrastructure (on-prem and in-cloud). Coordinate and conduct application, windows server, and database vulnerability and compliance scans across all infrastructures. Conduct audit exercises across all environments.

IAM Governance Analyst, Senior

Toyota | USA | Hybrid – View job details

As an IAM Governance Analyst, Senior, you will maintain IAM policies, procedures, standards and methodology for the organization that will be consumed by business and technology stakeholders. Create and maintain IAM governance dashboards and reports for senior management, providing insights into the organization’s IAM posture and compliance status. Lead the development and implementation of IAM governance initiatives, including user access reviews, role-based access controls, and segregation of duties.

Information Security Director

Sycurio | United Kingdom | Hybrid – View job details

As an Information Security Director, you will develop, maintain, and expand the information security management system (‘ISMS’) in line with an optimise compliance for ISO27001, PCI-DSSS and SOC2 compliance. Identify gaps in the information security capability, both technical and operational, and propose remediation and mitigation plans and solutions.

Information Security Principal (Senior Leadership)

bp | Malaysia | On-site – View job details

As an Information Security Principal (Senior Leadership), you will develop and implement security policies, procedures, and guidelines that align with business goals. Coordinate incident response efforts and lead communication with affected business units. Provide technical expertise in information security, implementing operating processes and ensuring alignment to security standards across all activities including regulatory compliance.

Manager, Information Security Risk

Acrisure | USA | On-site – View job details

As a Manager, Information Security Risk, you will conduct comprehensive third party risk assessments, analyzing security policies, procedures, controls, and compliance with regulatory requirements. Perform in-depth technical assessments of third-party solutions, evaluating compatibility with company’s network infrastructure and data handling practices.

NOC Analyst

The Guitar Center Company | USA | On-site – View job details

As a NOC Analyst, you will monitor operational systems, networks, and applications to ensure availability, performance, and security. Respond to alerts, incidents, and service requests in a timely manner, following predefined procedures and protocols. Participate in the development and implementation of proactive measures to prevent system failures and improve overall reliability.

OT Security Consultant

Secura | Germany | Remote – View job details

As an OT Security Consultant, you will perform advisory services on client’s SCADA/ICS/OT infrastructure for small to large-sized projects. This will include security risk assessments based on IEC 62443 methodology, gap assessments, security maturity reviews, trainings and consultancy support. Provide support in security design and security architecture of industrial networks and provide recommendations to improve the design. Interpret security vulnerabilities, risks, policies, and procedures concerning the operational business impact.

Penetration Tester

Avrioc Technologies | UAE | On-site – View job details

As a Penetration Tester, you will perform full-scope red team assessments targeting application frontends, APIs, and mobile backends using advanced offensive techniques. Simulate sophisticated attacker behaviour to test and bypass authentication, authorization, encryption, and session management controls. Develop custom scripts, payloads, and exploits to bypass WAFs, EDRs, and behavioural analytics tools.

Security Engineer

Scaleway | France | Hybrid – View job details

As a Security Engineer, you will develop and maintain internal security tools that support both the CSIRT and trust & safety teams. You will also create new tools and design innovative approaches to mitigate risks across the organization. Additionally, you will integrate open-source tools into company’s internal systems to support the SOC team’s operations. You will automate detection and alerting capabilities based on feedback and insights gathered from the SOC team.

Senior Cloud Security Engineer

1GLOBAL | Portugal | On-site – View job details

As a Senior Cloud Security Engineer, you will design and implement scalable cloud security controls in AWS multi-account environments. Lead Kubernetes security architecture, including PodSecurity, RBAC, and network policies. Enforce zero trust network architecture and secure segmentation across cloud and hybrid environments. Integrate security automation into CI/CD pipelines (image scanning, SAST, IaC analysis).

Senior Cyber Research Specialist

Bank of Ireland | Ireland | Hybrid – View job details

As a Senior Cyber Research Specialist, you will conduct research on current and emergent threats, utilising sources to include but not limited to academia, industry publications, government agencies (national and international) etc. Collaborate with the Chief Information Security and Resilience Officer (CISRO) and GISR senior management to gain an understanding of their functions and to understand how you may be able to support them with targeted cyber research.

Senior Cyber Security Engineer – Software Development

JLR | Ireland | Hybrid – View job details

As a Senior Cyber Security Engineer – Software Development, you will design, implement, and maintain software applications related to security functionalities such as crypto key management, HSM APIs, secure logging, and firewalls. Develop, document, and institutionalise comprehensive best practice software guidelines, practices, and procedures for cybersecurity, ensuring consistency and reliability across the organisation.

Senior Cyber Security Specialist

KONE | India | On-site – View job details

As a Senior Cyber Security Specialist, you will act as a cybersecurity advisor and provide security expertise and guidance to development and operations teams. Conduct risk-based security impact assessments to classify applications and assign appropriate security requirements. Detect security issues during validation and operation using automation and scenario-based testing.

Senior Product Security Engineer (InfoSec)

Palo Alto Networks | Israel | On-site – View job details

As a Senior Product Security Engineer (InfoSec), you will build risk driven intelligent automation to optimize security findings and remediations. Take part in developing security services that provide product engineering teams with easily consumable, top notch security implementations. Implement programs to automate complex data analysis for high priority security missions.

Senior Security Specialist

London Stock Exchange Group | United Kingdom | Remote – View job details

As a Senior Security Specialist, you will plan, lead and carry out red teams / purple teams and penetration tests where you assume the role of a threat actor to meet specified objectives. Develop, modify and extend tools/exploits that assist with execution of security assessments, including custom tools and automation.

SIEM & Threat Detection Manager

Mogi I/O | India | On-site – View job details

As a SIEM & Threat Detection Manager, you will lead and manage the SOC team across L1 and L2 analysts in a 24/7 environment. Handle escalated security incidents including threat detection, investigation, containment, and remediation. Work cross-functionally with technical and business stakeholders during and after incident response. Conduct proactive threat hunting and brand monitoring across endpoints, networks, and cloud environments (especially AWS).


from Help Net Security https://ift.tt/ZTdqV9a