Tag Archive for: latest

Craving Dessert At Work? Watch The Latest Hack To Use Office Resources To Make It


Craving Dessert At Work? Watch The Latest Hack To Use Office Resources To Make It

The videos share a useful dessert hack.

You are in front of your laptop at work and a sudden craving for something sweet crops up. What do you do? Since you are not at home and your office probably doesn’t have deserts in their canteen, you’re left with no option but to order it. Well, maybe not. We all know how ordering food online can be a little expensive and the wait for it to arrive is too much. Now you can save that money and time and still satiate your sweet cravings. How? With office supplies! 

Also Read: 6 Quick Office Lunch Ideas to Make Everyday Cooking Hassle-Free

If you regularly follow food trends on the internet, you might have seen some videos about using office resources to create a dessert! We found two videos on Instagram – one on ‘travel_with_priyanka_’ in collaboration with ‘the_glowing_glory’ and another on ‘_riyaa_20’ with ‘ishika.jaiswal.3762’. 

Both videos show similar ways to use office resources to make a mug cake in no time. All you have to do is take a small biscuit pack and crush it with your hands. Then open the pack and pour the crumbled biscuits into a mug. Add some milk, sugar and fruit salt and mix everything together well. Then pop it in the microwave oven to bake it. It should not take more than 5 minutes. Your freshly baked biscuit mug cake will be ready to be enjoyed any time during office breaks. Genius, right? 

Also ReadUnable To Avoid Cravings During Office Hours? Follow These 3 Eating Habits

The videos are getting attention on social media with many people giving their approval. 

A user said, “As a self-appointed mug cake expert, I approve of this. Gotta add some chocolate on top though.” 

One user jokingly said, “Me running to the HR to complain about you guys.” 

Another user narrated his own experience doing a similar trick which did not end well. “We tried this at Amazon Hyderabad office … we forgot to turn off the oven the cup was boiling and there was this black smoke all over the place and the Fire alarm started to ring all the security members came to our place and there was this huge mess. … A memorable day.” 

Will you try this hack next time you crave a dessert in the office? 

Source…

No Independence-Day curbs, internet ban in Valley this year too: Cops | Latest News India


Srinagar: There will be no restrictions or internet ban in Kashmir on Independence Day, but a three-tier security will cover key venues to avoid any untoward event, divisional commissioner Vijay Kumar Bidhuri has said.

Aritists perform during full dress rehearsal ahead of independence day at Bakshi Stadium,in Srinagar,on 13 August 2023. (HT photo)

Internet services remained suspended across the Valley on important events like the Independence Day and Republic Day due to security concerns between 2005 and 2021. However, no such restriction has been imposed in the region over the last two years .

“There won’t be any restrictions in any part of Kashmir on Independence day. Also there won’t be restrictions on the internet on Independence Day… We are expecting huge participation of people in parades,” Bidhuri told reporters in Srinagar.

However, a three-tier security cover and drone surveillance have been put in place across the Kashmir Valley on August 15 to prevent any untoward incidents or threats, he added.

Additional director general of Police Vijay Kumar said that the police and security forces’ personnel are on high alert and ready to tackle any situation. “Drones will be used for surveillance across the region, and security arrangements have been made to ensure that common people don’t face any problems,” he added, calling upon local residents to join the celebrations in large numbers.

The J&K administration has made elaborate arrangements to mark the country’s 77th Independence Day.

On Sunday, Jammu & Kashmir Lieutenant Governor Manoj Sinha flagged off the “Tiranga Rally” on the banks of Dal lake to celebrate ‘Azadi Ka Amrit Mahotsav’ ahead of Independence Day. During the event, he also paid tributes to the slain soldiers as part of the “Meri Mati Mera Desh” campaign.

“I bow my head in reverence to the sacrifices of our freedom fighters and heroes who sacrificed their lives for the motherland. The memories of their martyrdom will forever live on in our hearts and inspire…

Source…

Senators Want Details on China’s Latest Hack of Microsoft email


Senators want answers from the State Department’s IT chief about how hackers, said to be from China, broke into diplomats’ Microsoft email accounts earlier this year, as officials were planning high stakes visits to Beijing for Secretary of State Anthony Blinken and other cabinet officials.

In a letter sent Wednesday to State Department Chief Information Officer Kelly Fletcher, and exclusively obtained by Newsweek, 14 senators of both parties are asking for details of the extent of the breach, and the timeline on which it was fixed.

Microsoft revealed on July 11 that hackers had “acquired” a master cryptographic key, which allowed them to impersonate almost any user of the company’s cloud-based Outlook email and calendar services, meaning they could log on as that person and copy all their email traffic and calendar appointments.

The letter, originally drafted by Sen. Eric Schmitt, R-Mo., was signed by GOP colleagues including Tim Scott of Florida and Bill Hagerty of Tennessee; and by the Democratic Chairman of the Senate Foreign Relations Commitee Ben Cardin of Maryland and several of his colleagues including Tim Kaine of Virginia. It asks for a “closed, unclassified briefing” for members and staff by September 6.

The intrusion, which started mid-May and was discovered a month later, would have allowed Beijing to see into diplomats’ planning for a succession of high stakes visits to China in June and July by U.S. cabinet members, including Blinken, Commerce Secretary Gina Raimondi and Treasury Secretary Janet Yellen, according to former officials.

The hack has led to questions about Microsoft’s relationship with China and whether that creates risks for the U.S. government, which relies heavily on the Redmond, Wash.-based tech giant’s services and products.

Bill Gates and Xi Jinping
A China Central Television news broadcast shows Microsoft co-founder Bill Gates, left, meeting with Chinese President Xi Jinping, on a giant screen outside a shopping mall in Beijing in June. Xi called Gates “a dear old friend of ours,” highlighting the close relations Microsoft has maintained with China.
AFP via Getty/Greg Baker/AFP/Getty

The senators’ letter also asks Fletcher to explain how she plans to “ensure a more robust,…

Source…

Hacker’s Latest Target: The Electric Vehicle


Can cars be hacked? Thirty years ago, that question would’ve seemed nonsensical. Today, with computer chips embedded in every electric vehicle (EV) and charging stations storing user data, EV security isn’t guaranteed. All smart devices — from coffee pots to baby monitors — are hackable, and electric vehicle security has emerged as an unsavory but necessary topic in the broader conversation about EVs.

How to Hack an EV

Any car with a computer chip and remote connectivity is potentially hackable. How do threat actors bypass electric vehicle security measures? The leading way cars can be hacked is through connectivity features — like Wi-Fi, cellular networks and Bluetooth — allowing remote control and vehicle communication. Remotely starting a vehicle requires a wireless connection to a car’s critical safety features. If drivers can control a vehicle remotely, so can hackers.

Crucially, a vehicle’s Controller Area Network — which links critical components like brakes and engines — is sometimes accessible through a cellular or satellite connection. Wirelessly connecting all safety systems using the same software means a single exploit could affect countless vehicles simultaneously.

Researchers from cybersecurity firm Kaspersky looked at 69 third-party applications used to control cars and found that 58 percent use vehicle owners’ information without obtaining consent. Unofficial apps put vehicle owners at risk of data breaches that could lead to stolen credit card numbers, home addresses, or other personal information. They could also give hackers access to vehicle systems.

Software Vulnerabilities

Another way cars can be hacked is through software vulnerabilities. Electric vehicles use complex software systems to control braking, steering, acceleration and other crucial functions. Software vulnerabilities or weak security measures let threat actors take control of the vehicle’s functions.

EVs use telematics systems to provide remote services, collect data and monitor vehicle performance. If these systems are unsecured, hackers can exploit them to gain unauthorized access to a vehicle. Many countries currently have a software developer shortage. In South Korea, a…

Source…