Page 3,123«..1020..3,1223,1233,1243,125..3,1303,140..»

Microsoft Warns Web Shell Attacks That Maliciously Harness Servers Increased Dramatically In 2020 – Hot Hardware

As long as computers have been around, there have been hackers who have progressively improved and become sneakier at exploiting them. Last year, Microsoft used Microsoft 365 Defender data to find that web shell attacks, which are simple yet effective pieces of malicious code embedded into a web server, are rising. This year, they found that trend not only continued, it accelerated: every month from August 2020 to January 2021. Web shells, as Microsoft describes, are just a small piece of malicious code, that allows attackers to run commands on servers to steal data or use the server as launch pad for other activities like credential theft, lateral movement, deployment of additional payloads, or hands-on-keyboard activity. If any vulnerability crops up on a web server, a malicious actor could take advantage of it to get a web shell on the box. While the simple answer would just be scanning through code to find things like web shells, the task is actually incredibly difficult. The code can blend in with everything else and only be 15 or fewer lines, even down to 5 or fewer lines depending on what is needed by the attacker.As these sorts of attacks are easy to make and hard to detect, the number of them has subsequently increased. Alarmingly, in a year-over-year comparison, Microsoft saw nearly double the monthly average of web shell encounters as seen in 2019 to 2020, shown in the chart below. To help defend against these attacks, Microsoft Defender for Endpoint uses a combination of durable protections that prevent web shell installation and behavior-based detections that identify related malicious activity. In laymans speak, Microsoft Defender For Endpoint can detect malicious behavior by analyzing processes and other things happening on a device with behavior inspection. While Microsoft Defender is nice, it cannot be the only line of defense, however. People who maintain web servers need to harden them against web shells by, as listed by Microsoft, keeping up to date on vulnerabilities and remediation practices, segmenting perimeter networks, turn on antivirus protection, and other good security practices.

Ultimately, even if you do not know what all of this is, it should be slightly concerning to know that attackers are out there and only ramping up operations. If you are an IT admin, it is time to batten down the hatches as the oncoming storm of hackers will only strengthen, and it is a matter of when not if.

Read more:
Microsoft Warns Web Shell Attacks That Maliciously Harness Servers Increased Dramatically In 2020 - Hot Hardware

Read More..

Global High Availability Server Market (2021 to 2026) – Growth, Trends, COVID-19 Impact, and Forecasts – Yahoo Finance

TipRanks

Were well into the first quarter of 2021 now, and its a good time to take stock of whats behind us, and how it will impact what lies ahead. Goldman Sachs strategist Jan Hatzius believes that we are on an upward trajectory, with better times ahead. Hatzius sees the developed economies expanding as the corona crisis recedes. For the US, particularly, he is impressed by the very substantial fiscal support implies in the latest COVID relief package. Even with that, however, Hatzius believes that Q4 was a weaker period, and we are still not quite out of it. Hes putting Q1 growth at 5%, and says that were going to see further expansion concentrated in the spring, and an acceleration to 10% growth rate in Q2. And by accelerations, Hatzius means that investors should expect Q2 GDP in the neighborhood of 6.6%. Hatzius credits that forecast to the ongoing vaccination programs, and the continued development of COVID vaccines. The Moderna and Pfizer vaccines are already in production and circulation. Hatzius says, in relation to these programs, That fact that we are developing more options and that governments around the world are going to have more options to choose between different vaccines [means] production is likely to ramp up in pretty sharply in incoming months Its definitely a major reason for our optimistic growth forecast. In addition to Hatzius' look at the macro situation, analysts from Goldman Sachs have also been diving into specific stocks. Using TipRanks' database, we identified two stocks that the firm predicts will show solid growth in 2021. The rest of the Street also backs both tickers, with each sporting a Strong Buy consensus rating. Stellantis (STLA) Weve talked before about the Detroit automakers, and rightly so -- they are major players on the US economic scene. But the US hasnt got a monopoly on the automotive sector, as proven by Netherlands-based Stellantis. This international conglomerate is the result of a merger between Frances Groupe PSA and the Italian-American Fiat-Chrysler. The deal was a 50-50 all stock agreement, and Stellantis boasts a market cap exceeding $50 billion, and a portfolio of near-legendary nameplates, including Alpha Romeo, Dodge Ram, Jeep, and Maserati. The deal that formed Stellantis, now the worlds fourth largest automotive manufacturer, took 16 months to accomplish, after it was first announced in October 2019. Now that it is reality the merger was completed in January of this year the combined entity promises cost savings of nearly 5 billion euros in the operations of both Fiat-Chrysler and PSA. These savings look to be realized through greater efficiency, and not through plant closures and cutbacks. Stellantis is new in the markets, and the STLA ticker has supplanted Fiat-Chryslers FCAU on New York Stock Exchange, giving the new company a storied history. The companys share value has nearly tripled since its low point, reached last March during the corona recession, and has stayed strong since the merger was completed. Goldman Sachs analyst George Galliers is upbeat on Stellantis future, writing, We see four drivers which, in our view, will enable Stellantis to deliver. 1) PSA and FCAs product portfolios in Europe cover similar segment sizes at similar price points 2) Incremental economies of scale can potentially have a material impact on both companies... 3) Both companies are at a relatively nascent stage [in] electric vehicle programs. The merger will prevent duplication and deliver synergies. 4) Finally, we see some opportunities around central staffing where existing functions can likely be consolidated... In line with this outlook, Galliers rates STLA a Buy and his $22 price target indicates room for 37% growth in the year ahead. (To watch Galliers track record, click here) Overall, this merger has generated plenty of buzz, and on Wall Street there is broad agreement that the combined company will generate returns. STLA has a Strong Buy consensus rating, based on a unanimous 7 buy-side reviews. The stock is priced at $16.04, and the average target of $21.59 is congruent with Galliers, suggesting a 34.5% one-year upside potential. (See STLA stock analysis on TipRanks) NRG Energy (NRG) From automotive, we move to the energy sector. NRG is a $10 billion utility provider, with dual head offices in Texas and New Jersey. The company provides electricity to more than 3 million customers in 10 states plus DC, and boasts a over 23,000 MW was generating capacity, making it one of North Americas largest power utilities. NRGs production includes coal, oil, and nuclear power plants, plus wind and solar farms. In its most recent quarterly report, for 3Q20, NRG showed $2.8 billion in total revenues, along with $1.02 EPS. While down year-over-year, this was still more than enough to maintain the companys strong and reliable dividend payment f 32.5 cents per common share. This annualizes to $1.30 per common share, and gives a yield of 3.1%. Analyst Michael Lapides, in his coverage of this stock for Goldman Sachs, rates NRG a Buy. His $57 price target suggest an upside of 36% from current levels. (To watch Lapides track record, click here) Noting the recent acquisition of Direct Energy, Lapides says he expects the company to deleverage itself in the near-term. After NRGs acquisition of Direct Energy, one of the larger electricity and natural gas competitive retailers in the US, we view NRGs business as somewhat transformed. The integrated business model owning wholesale merchant power generation that supplies electricity that gets used to serve customers supplied by NRGs competitive retail arm reduces exposure to merchant power markets and commodity prices, while increasing FCF potential," Lapides wrote The analyst summed up, "We view 2021, from a capital allocation perspective, as a deleveraging year, but with NRG creating almost $2bn/year in FCF, we see a pick up in share buybacks as well as 8% dividend growth ahead in 2022-23." Were looking at another stock here with a Strong Buy analyst consensus rating. This one based on a 3 to 1 split between Buy and Hold reviews. NRG is trading for $41.84 and its $52.75 average price target suggests a 26% upside from that level on the one-year time frame. (See NRG stock analysis on TipRanks) To find good ideas for stocks trading at attractive valuations, visit TipRanks Best Stocks to Buy, a newly launched tool that unites all of TipRanks equity insights. Disclaimer: The opinions expressed in this article are solely those of the featured analysts. The content is intended to be used for informational purposes only. It is very important to do your own analysis before making any investment.

Go here to see the original:
Global High Availability Server Market (2021 to 2026) - Growth, Trends, COVID-19 Impact, and Forecasts - Yahoo Finance

Read More..

AWS Managed Services Market Recent Analysis of Industry Trends and Technological Improvements For 2027 KSU | The Sentinel Newspaper – KSU | The…

Global AWS Managed Services market report gives out the data for industry about company profile, product specifications, capacity, production value, and market shares for each company for the year 2020 to 2027 under the competitive analysis study. The report brings into focus several aspects related to industry and market. Few of these can be listed here as market definition, market segmentation, competitive analysis and research methodology. This market research report evaluates chief factors of the market which provides precise data and information for the business growth. Imperative aspects of AWS Managed Services market report are key market dynamics, current market scenario and future prospects of the sector.

AWS Managed Services Market is expected to register a healthy CAGR of 15.4% in the forecast period of 2019 to 2026.

AWS Managed Services Market 2021 and Upcoming Growth for 2027 from various Effect and factors about market environment, competitive landscape, historical and current data for forecast Growth with technological innovation, upcoming technologies and the technical progressive CAGR AWS Managed Services market. This global AWS Managed Services market report endows with an exhaustive overview of product specification, technology, product type and production analysis by considering major factors such as revenue, cost, and gross margin. This report assists clients to be acquainted with new opportunities in the ABC industry and most important customers for the business growth and increased revenue. This excellent report has been planned with full commitment and transparency in research and analysis. By applying best-practice models and research methodologies, complete market analysis is carried out in this AWS Managed Services report to make sure that the report provides accurate market segmentation and insights for the success of business. At present, the market is developing its presence and some of the Global AWS Managed Services Marketkey players Involved in the study areRACKSPACE US INC, Smartronix Inc., Mission Cloud Services, Inc, Claranet limited, Capgemini, DXC Technology Company,

Click HERE To get FREE SAMPLE COPY OF THIS REPORT (Including Full TOC, Table & Figures) at@ https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-aws-managed-services-market&DP

Global AWS Managed Services Market Dynamics:

Product Launch:

Important Features of the Global AWS Managed Services Market Report:

1) What all companies are currently profiled in the report?

List of players that are currently profiled in the report-Onica, Accenture, Slalom, LLC, 8K Miles Software Services Ltd., e-Zest Solutions, Great Software Laboratory, Cloudnexa, Logicworks, CLOUDREACH, AllCloud, Rean Cloud (Hitachi Vantara Corporation), and others.

** List of companies mentioned may vary in the final report subject to Name Change / Merger etc.

2) What all regional segmentation covered? Can specific country of interest be added?

Currently, research report gives special attention and focus on following regions:

North America, Europe, Asia-Pacific etc.

** One country of specific interest can be included at no added cost. For inclusion of more regional segment quote may vary.

3) Can inclusion of additional Segmentation / Market breakdown is possible?

Yes, inclusion of additional segmentation / Market breakdown is possible subject to data availability and difficulty of survey. However a detailed requirement needs to be shared with our research before giving final confirmation to client.

** Depending upon the requirement the deliverable time and quote will vary.

Global AWS Managed Services Market Segmentation:

New Business Strategies, Challenges & Policies are mentioned in Table of Content, Request TOC @https://www.databridgemarketresearch.com/toc/?dbmr=global-aws-managed-services-market&DP

Strategic Points Covered in Table of Content of Global AWS Managed Services Market:

Chapter 1:Introduction, market driving force product Objective of Study and Research Scope AWS Managed Services market

Chapter 2:Exclusive Summary the basic information of AWS Managed Services Market.

Chapter 3:Displaying the Market Dynamics- Drivers, Trends and Challenges of AWS Managed Services

Chapter 4:Presenting AWS Managed Services Market Factor Analysis Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.

Chapter 5:Displaying the by Type, End User and Region 2013-2018

Chapter 6:Evaluating theleading manufacturers of AWS Managed Services marketwhich consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company Profile

Chapter 7:To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions.

Chapter 8 & 9:Displaying the Appendix, Methodology and Data Source

Region wise analysis of the top producers and consumers, focus on product capacity, production, value, consumption, market share and growth opportunity in below mentioned key regions:

North America U.S., Canada, Mexico

Europe: U.K, France, Italy, Germany, Russia, Spain, etc.

Asia-Pacific China, Japan, India, Southeast Asia etc.

South America Brazil, Argentina, etc.

Middle East & Africa Saudi Arabia, African countries etc.

What the Report has in Store for you?

Industry Size & Forecast:The industry analysts have offered historical, current, and expected projections of the industry size from the cost and volume point of view

Future Opportunities:In this segment of the report, AWS Managed Services competitors are offered with the data on the future aspects that the AWS Managed Services industry is likely to provide

Industry Trends & Developments:Here, authors of the report have talked about the main developments and trends taking place within the AWS Managed Services marketplace and their anticipated impact at the overall growth

Study on Industry Segmentation:Detailed breakdown of the key AWS Managed Services industry segments together with product type, application, and vertical has been done in this portion of the report

Regional Analysis:AWS Managed Services market vendors are served with vital information of the high growth regions and their respective countries, thus assist them to invest in profitable regions

Competitive Landscape:This section of the report sheds light on the competitive situation of the AWS Managed Services market by focusing at the crucial strategies taken up through the players to consolidate their presence inside the AWS Managed Services industry.

About Data Bridge Market Research:

An absolute way to forecast what future holds is to comprehend the trend today!Data Bridge set forth itself as an unconventional and neoteric Market research and consulting firm with unparalleled level of resilience and integrated approaches. We are determined to unearth the best market opportunities and foster efficient information for your business to thrive in the market.

Contact:

US: +1 888 387 2818

UK: +44 208 089 1725

Hong Kong: +852 8192 7475

Corporatesales@databridgemarketresearch.com

Follow this link:
AWS Managed Services Market Recent Analysis of Industry Trends and Technological Improvements For 2027 KSU | The Sentinel Newspaper - KSU | The...

Read More..

From High-Speed Pursuit to High-Speed Connection: Emerging Technology in Law Enforcement – HSToday

A world of artificial intelligence and augmented reality provides criminals an avenue to avoid detection by law enforcement and continue an unlawful lifestyle. A lack of essential technical skills, artificial intelligence, and augmented reality capabilities within law enforcement will provide an advantage to criminals within cyber and physical environments. Local, state, and federal law enforcement agencies that solely focus on brick-and-mortar crimes, or crimes committed in the physical sense, will diminish their usefulness within the next decade.

As technology evolves so does crime, and the question is whether state and local police lack capabilities to safely prevent and mitigate crime within their communities. Cold cases, forensic bias, and human error will be history within the next decade. The emergence of 5G connectivity will enable artificial intelligence and augmented reality to enhance law enforcement interaction with their respective community, consequentially resolving crime with evidence-based tactics at unprecedented speed.

First, it is crucial to recognize that police will require technical skills to resolve issues and solve crimes as law enforcement agencies strive to understand malicious cyber activity and the effects on citizens. Identity theft, financial crimes, unlawful access to personal and business software and web-based platforms, and confidential information leakage are only a few of the many cybercriminals targets. Federal law enforcement does not have the capacity or capabilities to prevent nor prohibit cyber criminality at the local level. Therefore, it is the responsibility of a chief of police and staff to ensure police are trained and remain ready in the cyber realm.

Facial recognition technology, also known as FRT, compares multiple images to match a humans face, confirming the identity of a suspect or victim (Service, 2020). Law enforcement agencies need this capability to eliminate errors in human bias and witness manipulation. The images are pulled from a database of mugshots, body camera images, social media photos, and other public information sources within legal capacity (Service, 2020). The storage of biometrics poses security concerns for the server and data privacy, which will be addressed later.

Augmented reality, if used correctly, keeps the officer, residents, and local patrons safe. For example, officers arriving at a patrol scene can utilize AR glasses to obtain information regarding previous criminal history in the area, scan license plates, and even find exits to a building in pursuit of a suspect (Mirkow&Gelles, 2020). Additionally, an officer can identify whether a person has an immediate health condition that needs attention, preparing the officer to perform life-saving procedures with advised medical equipment (Mirkow&Gelles, 2020).

Evidence-based policing is arguably the most revolutionary technology for law enforcement. The technology can provide real-time advisory to law enforcement agencies, giving researchers and computer programmers access to the most significant outcome of different tactics (Mirkow & Gelles, 2020). The theory proves vital at the local and federal levels, including drug raids, border patrol, and even domestic violence disputes (Mirkow & Gelles, 2020). Not only will this capability increase efficiency in crime-solving, but it will also provide an accurate account of the crime with sufficient resolution.

While many technologies await law enforcement utilization, three key opportunities lie in bringing innovative technology into law enforcement. Quality risk management, effective crime prevention, and fostering a positive community-police relationship create a holistic approach to building an effective and accountable police force while preventing and solving criminal activity promptly.

Analysis

Quality Risk Management

According to the Department of Justice (2018), the use of force and pursuit operations rank as the highest-risk activities in law enforcement. Incorporating technology in risk management can minimize physical harm to citizens and officers and property damage by removing human error and potentially extreme lethality. The data collected from technology can also be used in a court of law to determine guilt or innocence. For example, a pursuit operation incorporating an unarmed drone and thermal imaging will assist law enforcement in tracking a suspect regardless of the time of day. Additionally, facial recognition technology with accurate data management can confirm whether the right person is in custody.

The use of force is a controversial and sensitive topic and promotes strain between the police force and the local community. While there is no technology to eliminate human bias, automated tools help reduce the risk of bias during traffic and routine police stops. Emerging technology, such as artificial intelligence, machine learning, and augmented reality, provides evidence-based policing, which provides analytical hypotheses on the location and linkage of suspects with advanced forensic techniques in a fraction of the time it takes for detectives to conclude a solution (Mirkow & Gelles, 2020). The analysis also provides police a buffer between unconscious bias and their duty to the community in crime prevention (Mirkow & Gelles, 2020).

Cloud storage and edge computing can provide real-time data to police patrols to identify whether a vehicle or the driver has previous law violations or warrants without pulling the vehicle over and obtaining identification, an emerging tool known as the Fog-to-Cloud System (Rejiba, Masip-Bruin, Jurnet, Marin-Tordera, & Ren, 2018). A mobile server connected to a secured cloud database providing real-time information on a vehicle and its driver reduces potentially dangerous interaction between citizens and police and reduces the number of resources and amount of time in traffic stops.

Effective Crime Prevention

Over 8 million tips to help locate missing children are provided to a team of approximately 25 people (Mirkow & Gelles, 2020). Sifting and analyzing this information could take decades to find these children, and in most cases that will be too late. Deploying artificial intelligence to analyze this data can exponentially reduce time spent and potentially locate the child to reunite them with their families and hold the perpetrators accountable (Mirkow & Gelles, 2020). Technology such as closed-circuit television, or CCTV, provides a live feed to police stations, which provides first-hand information in place of physical police presence (Mirkow & Gelles, 2020). This technology is implemented in numerous locations globally and already proves a powerful tool in crime prevention. CCTV assisted Indian law enforcement to find nearly 3,000 missing persons in just four days (Mirkow & Gelles, 2020).

Police-Community Relationship

Law enforcement and community relations are a sensitive topic in the 21st century. While there are historical aspects to consider, a way forward requires implementing augmented reality, or AR, to train, assess, and employ police officers research on adult learning theory suggests that hands-on, problem-solving learning approaches foster skills and knowledge that translate back into behavior change (Office of Community Oriented Policing Services, 2018). Statistics have also shown that de-escalation exercises and tactics training significantly reduced the amount of injury and death of police officers and citizens over the past decade (Office of Community Oriented Policing Services, 2018), consequently reducing strained fear relationships within the local community. Augmented reality goggles provide hands-on training with real-world scenarios without exhausting police officers already strained resources in a fraction of the time. The AR toolkit can provide various scenarios, including cultural sensitivity, psychological crisis, and even pursuit operations.

Organizational Challenges

While emerging technology is advantageous to law enforcement, technical and organizational challenges arise with implementation. The first challenge is the technical expertise required to maintain databases and networks of innovative technology. The resources and personnel necessary to maintain such technology consist of a financial budget that some precincts and cities may not afford without government assistance. Secondly, law enforcement will require an in-depth defense of database and network access. Cybersecurity professionals can provide training, access and authentication protocols, and advisory to law enforcement and local government leadership on why and how to protect the infrastructure from common and unprecedented malicious activity. The protection of cloud data is crucial in law enforcement as the justice system relies on the information, leaving little to no room for error in data misconfiguration, privacy breaches, and ransomware.

Cybersecurity Requirements

Privacy

As mentioned before, the duty of the police requires preventing crime and protecting citizens from crime. Privacy and confidentiality breaches brought to public attention by brute force remain among the top cybersecurity threats in the United States. Shortly after the EU passed the General Data Protection Regulation (GDPR), the CEOs of Apple and Microsoft called on the U.S. to pass new privacy laws (Burt, 2019). The technologies mentioned above, facial recognition and augmented reality, retrieve and save sensitive data. Therefore, the security measure must be implemented through the development and deployment phase of police technology to prevent leaks. Considerations in information security are containerized applications, restricted access, and zero-trust security architecture (NIST, 2020).

Data Integrity

As previously mentioned, sensitive data stored in physical or cloud servers pose a higher risk of manipulation, theft, and breaches. If law enforcement and the justice system rely on data to identify, confirm, and prosecute suspects or identify victims, data securitys vitality is critical to operations. Disruption, distortion, and denial of data are the ultimate threats to police investigations and prosecution (Belani, 2020). A robust cloud security strategy can mitigate threats. Furthermore, an emergency response plan and the backup server can eliminate disruption in operations (Belani, 2020).

Artificial Intelligence

Artificial intelligence, employed lawfully, can and will increase productivity and security. Machine learning, a derivative of artificial intelligence, studies the networks packet traffic, detecting malicious packets intrusion. In conjunction with machine learning, AI can build reports and analysis for law enforcement within minutes, reducing the number of staff hours necessary to account for accurate data and analysis. AI/ML can pose a risk to security, as malicious actors utilize this technology to access networks (Belani, 2020). For example, sophisticated criminals can use machine learning to access law enforcement data and manipulate a potential suspects supporting crime violation evidence or remove a victims identity.

References

Belani, G. (2020).5 Cybersecurity Threats to Be Aware of in 2020. Retrieved from IEEE Computer Society : https://www.computer.org/publications/tech-news/trends/5-cybersecurity-threats-to-be-aware-of-in-2020

Burt, C. (2018, September 5).Malware Targeting Biometric Security and Strong Authentication Observed in Brazil Bank Attack . Retrieved from BiometricUpdate :https://www.biometricupdate.com/201809/malware-targeting-biometric-security-and-strong-authentication-observed-in-brazil-bank-attacks

Copple, C., & Copple, J. (2018).Risk Management in Law Enforcement: Discussions on Identifying and Mitigating Risk for Officers, Departments and the Public. Washington DC: Office of Community Oriented Policing Services. Retrieved from https://cops.usdoj.gov/RIC/Publications/cops-w0865-pub.pdf

Mirkow, A., & Gelles, M. (2020).Deloitte. Retrieved from The Future of Policing :https://www2.deloitte.com/us/en/pages/public-sector/articles/future-of-policing-and-law-enforcement-technology-innovations.html

NIST. (2020).SP 800-207 (Second Draft) Zero Trust Architecture.doi:10.6028/NIST.SP.800-207

Office of Community Oriented Policing Services. (2018).Risk Management in Law Enforcement.Department of Justice , Washington DC . Retrieved fromhttps://cops.usdoj.gov/RIC/Publications/cops-w0865-pub.pdf

Rejiba , Z., Masip-Bruin, X., Jurnet, A., Marin-Tordera , E., & Ren, G.-J. (2018). F2C-Aware: Enabling Discovery in Wi-Fi Powered Fog-to-Cloud (F2C) Systems.2018 6th IEEEInternation Conference on Mobile CLoud Computing, Services, and Engineering (MobileCloud)(pp. 113-116). Bamberg: IEEE. doi:10.1109/MobileCloud.2018.00025

Service, T. N. (2020, September 25).Congressional Research Service Report: Facial Recognition Technology & Law Enforcement: Select Constitutional Considerations..Retrieved from Targeted News Service :https://advance-lexis-com.proxy.library.georgetown.edu/document/?pdmfid=1516831&crid=1dd17cda-596d-4235-aa9a-67fc8a26e065&pddocfullpath=%2Fshared%2Fdocument%2Fnews%2Furn%3AcontentItem%3A60XN-HD91-JC11-13K6-00000-00&pdcontentcomponentid=299219&pdteaserkey=

(Visited 219 times, 109 visits today)

Here is the original post:
From High-Speed Pursuit to High-Speed Connection: Emerging Technology in Law Enforcement - HSToday

Read More..

The 7 best 2FA apps on Android – Android Police

More than ever, online account security is essential these days. You should rely on unique passwords for each of your accounts (using a password manager of your choice) and turn on two-factor authentication (2FA) for any service you use that supports it. For most accounts, the second factor usually is a one-time password (OTP), automatically regenerated on a regular 30-second schedule. Using this security measure will prevent bad actors from breaching your accounts even if they get a hold of your passwords.

Some services offer to send you OTPs via SMS, but you should always opt for proper 2FA apps if you can. Text messages aren't encrypted and phone numbers can be spoofed, so an elaborate hacker has no trouble getting past these measures. Luckily, there are quite a few great 2FA apps to choose from.

It's generally a good idea to rely on open-source tools for security the code is transparent and openly available, so security audits are easy to conduct. That's why our first recommendation and my personal 2FA manager of choice is andOTP, a fork of the long-inactive OTP Authenticator app. The open-source app might not be the prettiest, but it gets the job done very well. Its storage can be encrypted via password, and it supports encrypted backups. While it doesn't offer cloud syncing, you can rest assured that your OTPs will never be stored on unknown, potentially insecure servers without your explicit permission. andOTP also saves the secret code you need to use to set up your OTPs, so you can easily switch to another OTP manager if you ever want to without having to go through the setup process for all of your accounts again.

If you don't value the open-source aspect that much and prefer a 2FA app that automatically and securely syncs over the cloud, Authy might be the service of your choice. Your cloud backup is encrypted by a password and an SMS-based 2FA system, allowing you to seamlessly sync your OTP codes across multiple devices. Authy also has a proprietary 2FA API that some services rely on, so you might be forced to use Authy already anyway.

Authy doesn't let you recover the secret codes used to set up OTPs, so if you ever want to switch to another manager, you'll have to set up all of your OTPs via your accounts anew again.

If you don't want to backup or sync your 2FA codes at all for security reasons, the Google Authenticator might be interesting for you. It supports the usual features and runs locally on your Android phone. While Authy and andOTP have dark modes, Google Authenticator is the only one that switches automatically based on your system theme.

It's generally not recommended to store 2FA credentials in the same place as your password as that effectively eliminates thesecond factorpart of the equation. But as long as you take all imaginable measures to secure your password manager, having all of your credentials in one place is convenient and might encourage you to set up 2FA for more of your accounts, which is more secure than just relying on passwords. You might still want to use a standalone 2FA app for your most important accounts when you go this route.

Here are our favorite solutions for password managers with 2FA support:

Microsoft Authenticator started out as a 2FA app, but the company recently turned it into a full-fledged password manager that syncs with Microsoft Edge when you log in with your Microsoft account. You can still use the Authenticator as a standalone 2FA app by simply not adding passwords if you prefer that. You also don't have to log in with your Microsoft account if you don't want or need cloud backups.

MYKI probably isn't the best-known password manager out there, but it has some unique tricks up its sleeve. Your data doesn't ever leave the devices you own, but your passwords and 2FA codes still sync via its peer-to-peer setup that doesn't require manual work on your part. That's great if you're concerned about server security without wanting to lose out on the convenience of cross-device syncing. Our own Rita wrote an extensive review a few years back, and it's still to the point.

OTPs are displayed alongside your password and account name.

If you'd rather rely on cloud-based software, Bitwarden is a great open-source choice. To use it for 2FA codes, you need to pay for the $10/year premium version, which is incredibly fair compared to other password managers. Once you've got everything set up, you can use Bitwarden to autofill passwords. OTP codes will then be added to your clipboard automatically, so you can just paste them.

LastPass's approach is a little different from other password managers with integrated OTP support. The security company offers a secondary 2FA app that you need to use in tandem with the main password manager application. When you log in to one of your OTP-protected accounts, you'll receive a push notification on your phone, allowing you to seamlessly verify your identity. You can also back up your OTPs to your LastPass account.

Of course, this is only a small selection of 2FA options out there, but we've found these to be the best or most unique ones. Most password managers have built-in support for 2FA codes, and a few services have their own OTP implementations you can or must alternatively use.

You can find out which of your services support 2FA on the crowdsourced twofactorauth.org website. Tap the "Docs" shortcut in the results to see detailed instructions on how to enable OTP codes for the service in question.

Original post:
The 7 best 2FA apps on Android - Android Police

Read More..

Infrastructure Engineer – Monitoring – FARFETCH job with FARFETCH Group | 156280 – The Business of Fashion

FARFETCH exists for the love of fashion. Our mission is to be the global platform for luxury fashion, connecting creators, curators and consumers.

We're a positive platform for good, bringing together an incredible creative community made up by our people, our partners and our customers. This community is at the heart of our business success. We welcome differences, empower individuality and celebrate diverse skills and perspectives, creating an inclusive environment for everyone. We are FARFETCH for All.

TECHNOLOGY

We're on a mission to build the technology that powers the global platform for luxury fashion. We operate a modular end-to-end technology platform purpose-built to connect the luxury fashion ecosystem worldwide, addressing complex challenges and enjoying it. We're empowered to break traditions and revolutionise, with the freedom and autonomy to make a difference for our customers all over the world.

PORTO

Our Porto office is located in Portugal's vibrant second city, known for its history and its creative yet cosy environment. From Account Management to Technology and Product, whatever your skills are, you'll find your fit here. You can have an informal meeting in the treehouse or play the piano in your lunch break!

THE ROLE

We are looking for an Infrastructure Engineer with a DevOps mindset obsessed about automation, scalability and infrastructure reliability for our Monitoring team. As part of this team, you will maintain, enhance, and scale our monitoring stack. We use our own tools, built on top of state-of-the-art technology, to build and manage an Infrastructure of +2000 cloud servers that support our production/live services and our teams of software engineers.

WHAT YOU'LL DO

WHO YOU ARE

REWARDS & BENEFITS

EQUAL OPPORTUNITIES STATEMENT

We are looking for an Engineer that is experienced in Infrastructure and has a DevOps mindset, who'll be working in maintaining, enhancing and scaling our monitoring stack.${description2}

Originally posted here:
Infrastructure Engineer - Monitoring - FARFETCH job with FARFETCH Group | 156280 - The Business of Fashion

Read More..

Global Advanced Persistent Threat Protection Market By Component, By Organization Size, By Deployment Type, By End User, By Region, Industry Analysis…

New York, Feb. 08, 2021 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Advanced Persistent Threat Protection Market By Component, By Organization Size, By Deployment Type, By End User, By Region, Industry Analysis and Forecast, 2020 - 2026" - https://www.reportlinker.com/p06021495/?utm_source=GNW They are very tough to detect and eliminate as they dont clearly appear to be malware and also may be established very deeply into an administrations computing systems. The initiators and designers of the APT are steadily monitoring and guiding its actions by altering its code to avoid detection and transform it into a changing set of behaviors. Basically, an organization that has been penetrated will not even be alert of it and may only become alert at a much later time by monitoring through log analysis via Security Information and Event Management (SIEM) tools or through outbound communication activity.

A speedily evolving threat landscape is the dynamic factor for the rise in the demand for protection systems in the market. The application of this protection system is visible in defense and government, financial services and insurance, healthcare, banking, and others, which has resulted to the growth of the ATP protection marketplace. The forensic analysis marketplace is also anticipated to grow at a maximum rate. The main factors contributing towards the growing demand for ATP protection in the marketplace are the advancements that are made in technology, rising adoption of cloud in the enterprises, stringent government regulations, and increasing consciousness towards securing confidential information.

By Component

Based on Component, the market is segmented into Solution and Services. Solutions segment is further classified into Security Information and Event Management (SIEM), Endpoint Protection, Intrusion Detection System/ Intrusion Prevention System (IDS/ IPS), Next-Generation Firewall, Sandboxing, and Others. On the basis of solutions, the SIEM segment likely to hold the largest market size in the year 2026. SIEM collects security data from servers, network devices, and domain controllers, examines the data stored to discover trends, detects threats, and then allows administrations to investigate any alerts.

By Organization Size

Based on Organization Size, the market is segmented into Large Enterprises and Small & Medium Enterprises. Large Enterprises segment witnessed higher revenue share in 2019. Large enterprises are broadly opting for APT protection solutions and are likely to invest considerably in advanced APT protection solutions in order to provide prime security to their enterprises extremely competitive environment.

By Deployment Type

Based on Deployment Type, the market is segmented into Cloud and On-premise. Cloud segment generated the highest revenue in 2019. Growing reliability and easy access to data are uplifting the adoption of these cloud services in numerous enterprises thereby driving revenue growth of the cloud segment in the worldwide market. Over the past decade, the ATP protection market has evolved from traditional unsophisticated malware outbreaks to advance and zero-day attacks.

By End User

Based on End User, the market is segmented into BFSI, Retail & Ecommerce, Government & Defense, Healthcare, Telecom & IT, Energy & Utilities and Others. Advanced persistent threat market security approach is progressively being applied across various vertical lines such as BFSI, government and defense, education, and others that have contributed to market growth internationally.

By Region

Based on Regions, the market is segmented into North America, Europe, Asia Pacific, and Latin America, Middle East & Africa. APAC is expected to register the highest growth rate during this period. APAC countries comprise developing economies, such as China, India, Australia, and Japan. With the propagation of AI, IoT, and big data in the APAC region, fraud and security concerns have risen. This is expected to invest more insecurity due to the increasing threat of APT attacks.

The major strategies followed by the market participants are Product Launches and Acquisitions. Based on the Analysis presented in the Cardinal matrix; Cisco Systems, Inc. and Microsoft Corporation are the forerunners in the Advanced Persistent Threat (APT) Protection Market. Companies such as McAfee, LLC, FireEye, Inc., Fortinet, Inc., and Trend Micro, Inc., Palo Alto Networks, Inc., Dell Technologies, Inc., Sophos Group PLC, and ESET, spol. s.r.o. are some of the key innovators in the market.

The market research report covers the analysis of key stake holders of the market. Key companies profiled in the report include Microsoft Corporation, Cisco Systems, Inc., Palo Alto Networks, Inc., Fortinet, Inc., Dell Technologies, Inc. (VMware, Inc.), FireEye, Inc., Trend Micro, Inc., ESET, spol. s.r.o., McAfee, LLC and Sophos Group PLC (Thoma Bravo).

Recent strategies deployed in Advanced Persistent Threat (APT) Protection Market

Partnerships, Collaborations, and Agreements:

Dec-2020: Fortinet announced a collaboration with Amazon Web Services (AWS). Together, the companies aimed to offer customers advanced security across their cloud platforms, applications, and network.

Nov-2020: Trend Micro collaborated with Amazon, a technology company. Following the collaboration, Trend Micro became the launch partner for AWS Network Firewall. It is a managed service that aims to make it easier to install necessary network protections for Amazon Virtual Private Clouds (Amazon VPCs) on Amazon Web Services (AWS).

Sep-2020: Palo Alto Networks and OPSWAT, the leader in critical infrastructure protection extended their partnership to keep on improving secure access solutions. The expansion helps in incorporating support for new endpoint platforms and IoT devices in GlobalProtect and Prisma Access for branch offices, retail locations, and mobile users.

Apr-2020: McAfee came into a partnership with Zyxel, a leader in delivering secure, AI- and cloud-powered home and business solutions. Following the partnership, the companies aimed to offer an integrated one-box security solution to small and medium-sized enterprises (SMEs).

Sep-2019: McAfee signed a partnership agreement with Canon, a company specialized in optical, imaging, and industrial products. This partnership aims at offering industries with embedded protection against malware execution and interfering with firmware and applications that run on multi-function devices (MFDs).

Jun-2019: Palo Alto Networks and Retarus announced their partnership. The partnership was focused on providing secure email communication from European data centers. The WildFire malware prevention technology from Palo Alto Networks is now part of Retarus exhaustive email security portfolio.

May-2019: Cisco announced its partnership with Tata Communications, an Indian telecommunications company. The partnership was focused on removing the complications of digital era enterprise networking through incorporating Cisco SD-WAN with the IZO cloud enablement platform.

Jan-2019: Dell came into partnership with Secureworks and CrowdStrike for new endpoint security offering including response services, threat detection, and prevention. The latest Dell SafeGuard and Response offering integrates unified endpoint protection, managed security, incident response expertise, and threat behavioral analytics.

Acquisition and Mergers:

Oct-2020: Cisco Systems introduced its acquisition of Portshift, a startup that focuses on application security for cloud-native development environments. The acquisition enhanced security for Kubernetes-based cloud-native applications.

Jun-2020: VMware completed the acquisition of Lastline. The acquisition strengthened VMwares portfolio to include new capabilities for network detection and response/network threat analysis that extend over NSX and SD-WAN offerings.

Mar-2020: McAfee completed its acquisition of Light Point Security, LLC, an award-winning pioneer of browser isolation. The acquisition added Light Point Securitys robust browser isolation capabilities to the McAfee product portfolio.

Jan-2020: FireEye acquired Cloudvisory, a control center for cloud security management. The acquisition added cloud workload security capabilities to FireEye Helix, providing customers with an integrated security operations platform for cloud and container security.

Oct-2019: Trend Micro acquired Cloud Conformity, an advanced Cloud Security Posture Management (CSPM) company. The acquisition widened the cloud services of Trend Micro, hence resolving and securing frequently overlooked security problems that are resulted from cloud infrastructure misconfiguration.

Oct-2019: Fortinet acquired enSilo, a privately-own next-generation endpoint security company. The acquisition further improved the Fortinet Security Fabric and supported Fortinets powerful endpoint and network security solutions by offering customers next-generation endpoint security.

Aug-2019: McAfee took over NanoSec, a multi-cloud, zero-trust application, and security platform. The acquisition helped companies in enhancing compliance and governance and minimizing the risk of their cloud and container deployments.

May-2019: FireEye took over Verodin, the key vendor in proving the efficiency of cybersecurity controls. The Verodin platform encourages cybersecurity products and technology-enabled services. Verodin incorporated FireEye Helix security orchestration abilities to assist customers to prioritize and automate continuous enhancement of security controls.

Jan-2019: Sophos acquired Avid Secure, an advanced cloud infrastructure security company. The acquisition extended the present portfolio of the company and enabled it to provide cloud security.

Product Launches and Product Expansions:

Dec-2020: Trend Micro launched a regional data lake for detection and response (XDR) service in India. Trend Micro XDR provides exhaustive correlated detection that goes beyond endpoint detection and response (EDR). It is capable of analyzing and gathering activity data from emails, endpoints, servers, cloud workloads, and networks, enabling security operations center (SOC) teams to detect, investigate and respond to advanced threats.

Nov-2020: Trend Micro unveiled a free tool that aims to help users increase their privacy online and fight misinformation. A Security Check is included in this new tool. This feature utilizes threat intelligence to confirm whether a website or URL is corrupted or infected. Moreover, it enables Privacy Check that utilizes the ID Security service of Trend Micro to verify whether a users email address has been put up for sale on the dark web.

Nov-2020: McAfee launched the MVISION XDR platform for its extended detection and response (XDR) capabilities. It is a cloud-based next-generation threat management solution with complete coverage across the effective response, prioritization to protect what matters easy orchestration and attack lifecycle.

Oct-2020: FireEye introduced Mandiant Advantage: Threat Intelligence, the first SaaS-based offering by Mandiant Solutions. This solution incorporated the threat Intelligence with information from the main part of its industry-key cyber incident response engagements, provided through a simple to use management platform.

Aug-2020: Microsoft introduced its Defender Advanced Threat Protection (ATP) application for Android users. Microsoft users with 365 E5 license are the only ones that can use the application. The objective of the app is to aid enterprise/business users to keep a distance from cybersecurity threats from harmful websites and apps that intend to steal your data. The app also enables Security Operations teams to detect and examine security incidents for the enterprise.

May-2020: FireEye launched a new advanced Architecture behind FireEye Endpoint Security, which includes the accessibility of various new methods for protection, investigation, and response. With the help of this approach, FireEye is enabling companies with an effective way to install advanced features.

Mar-2020: Fortinet unveiled the FortiOS 6.4 that incorporates above 350 new functions across areas including SD-WAN, two-factor authentication, SD-Branch, device visibility, email, and web security, SIEM, next-generation AV, hybrid cloud, and many more. It is designed to develop a cybersecurity platform that follows three main principles namely automated workflows, broad visibility, and integrated solutions.

Feb-2020: Microsoft launched various enterprise security solutions. It includes Microsoft Threat Protection GA, Microsoft 365 Insider Risk Management GA, Microsoft 365 Communication Compliance GA, Office 365 ATP Campaign Views GA, Office 365 ATP Compromise Detection and Response GA, Azure Sentinel Enhancements, Microsoft Defender ATP for Linux Previews, Azure Active Directory and FIDO2 Preview, Azure Security Center for IoT Perks.

Feb-2020: Fortinet launched FortiAI, a unique on-premises solution. This solution utilizes self-learning Deep Neural Networks (DNN) to accelerate threat remediation and manage time-consuming, manual security analyst tasks.

Oct-2019: Sophos launched Managed Threat Response (MTR) service. This service offers a dedicated round the clock security team to the organizations for offsetting the most sophisticated and complex threats.

Jun-2019: Palo Alto Networks launched Prisma, a new cloud security suite aimed at helping its customers live a safer digital life. It becomes the new benchmark in cloud security, changing the cloud journey by streamlining access, data protection, and application security. Prisma was developed based on Palo Alto Networks cloud security products and offers new experiences with the Prisma suite.

Jan-2019: FireEye released several new defenses that are now available on FireEye Email Security; Server Edition, in direct response to the ever-changing cyber threat landscape. FireEye Email Security-Server Edition includes various other new functions designed to address rising threat vectors while improving performance. These incorporate Attachment Detonation Customization, Full URL Rewrite, Passwords in Images, and New Machine Learning Engine.

Scope of the Study

Market Segments covered in the Report:

By Component

Solution

o Security Information and Event Management (SIEM)

o Endpoint Protection

o Intrusion Detection System/ Intrusion Prevention System (IDS/ IPS)

o Next-Generation Firewall

o Sandboxing

o Others

Services

By Organization Size

Large Enterprises

Small & Medium Enterprises

By Deployment Type

Cloud

On-premise

By End User

BFSI

Retail & Ecommerce

Government & Defense

Healthcare

Telecom & IT

Energy & Utilities

Others

By Geography

North America

o US

o Canada

o Mexico

o Rest of North America

Europe

o Germany

o UK

o France

o Russia

o Spain

o Italy

o Rest of Europe

Asia Pacific

o China

o Japan

o India

o South Korea

o Singapore

o Malaysia

o Rest of Asia Pacific

LAMEA

o Brazil

o Argentina

o UAE

o Saudi Arabia

o South Africa

View post:
Global Advanced Persistent Threat Protection Market By Component, By Organization Size, By Deployment Type, By End User, By Region, Industry Analysis...

Read More..

A breakdown of different types of precipitation and how they form – KATC Lafayette News

Well with winter precipitation becoming a real possibility here across Acadiana over the next few days, I thought I'd go over some forecasting techniques that we use right here in the weather lab to help us determine just what kind of precipitation we could be faced with.

Of course, it is all about examining the atmospheric column.

So I'm going to be going over four different precipitation types (or four different scenarios). It's important to keep in mind that for each scenario, the precipitation starts out as snow in the cold, upper parts of the atmosphere. That's where the coldest temperatures are found.

So it is pretty straightforward with Scenario number one: We have a warm layer of air that melts the snow as it falls through the column. As a result, we are left with liquid precipitation or rain at the surface. This is something that we're pretty accustomed to seeing here, across South Louisiana.

Scenario number two: We have a deep warm layer of air in the mid/upper parts of the atmosphere (below the snow higher up) that when the snow falls through that layer, it's going to eventually melt. However, it is then going to encounter a very thin layer of freezing temperatures just above the surface. It's not going to have enough time to completely re-freeze, but it will be able to freeze on contact with the surface, especially with temperatures at or below freezing.

(katc)

That's our freezing rain solution and also the one that leads to those icy road conditions.

(katc)

Kind of setting up treacherous travel conditions and really, this is the scenario we've been tracking over the last couple of days for our potential storm system on Monday. So, keep that in mind if you have any travel plans, especially late in the day on Monday going into Tuesday (Mardi Gras).

(katc)

Remember that bridges and overpasses ice over quicker than the surface roadway.

(katc)

That is because the ground provides insulation to the roads from below which keeps the road from freezing quite as quickly.

However, that is not the case for bridges and overpasses as cold air is able to circulate above AND beneath the bridge/overpass.

Scenario number three kind of flip flops from Scenario number two. The warm layer is not nearly as deep.. it's more shallow in nature so as the snow falls through the atmosphere, it's only going to partially melt, kind of becoming a slushy raindrop in nature.

It is then going to encounter a much deeper colder layer just above the surface, so it is actually going to be able to re-freeze. Now its not going to have the same shape or composition as the original snowflake, but rather it's going to be in the form of sleet. That's what we see at the ground.

And then of course Scenario number four: That's where our temperature profile remains below freezing throughout the column and that is a scenario you want to see if you're looking for snow. This one obviously we do not see a whole lot of down here.

The rest is here:
A breakdown of different types of precipitation and how they form - KATC Lafayette News

Read More..

Astro Bob: Journey to the deep sky with Cassiopeia as your guide | INFORUM – INFORUM

Deep-sky objects are "extended" (not pinpoint stars) celestial objects and include nebulas, star clusters and galaxies. (NASA, ESO)

Deep-sky objects are non-stellar celestial objects that usually require optical aid to see. They include all those magnificent galaxies, star clusters and nebulae (clouds of dust illuminated by stars) famously pictured with the Hubble Space Telescope. The brighter naked-eye stars are typically dozens to hundreds of light-years away, while deep-sky objects are often much more remote, from thousands to billions of light-years distant. Deep.

To find deep-sky objects in binoculars start at a bright star and create a path to the target. I own several binoculars but use a pair of 8x40 most often. Eight (8) is the magnification, while "40" is the size of the lenses in millimeters. 40 millimeters equals about 1.5 inches. (Bob King)

Once I became familiar with the brighter stars I used them to star-hop to a nebula or cluster. I'd lay open my star atlas and note the position of a deep-sky target with respect to a star I could easily identify. I'd mentally draw a path to the object, then point my binoculars at it and slide a little this way and a little that way until I spotted what I was looking for. Often, I had to use more than one star to get there the same way you'd carefully chose steppingstones to cross to the other side of a river.

Use this map to help guide you to the featured deep-sky objects. 5 is equal to three fingers held together at arm's length against the sky. A fist covers 10 of sky. (Stellarium with additions by the author)

You can hunt the deep-sky, too. How would you like to see three star clusters and the closest, biggest galaxy beyond the Milky Way? All are within a stone's throw of the familiar W of Cassiopeia and visible in a pair of 35mm or larger binoculars. You'll need a clear, preferably moonless sky for the hunt and warm clothing. Clothing is important for comfort's sake. Properly dressed, you can observe in a relaxed state of mind, which increases the enjoyment of stargazing.

Our deep-sky targets are the Andromeda Galaxy, the Perseus Double Cluster and NGC 752, a bright but neglected star cluster in Andromeda. Depending on the size of your binoculars and sky darkness they may all strike you as little more than hazy patches of light at first glance. Most things do in typical amateur instruments. Only larger telescopes and time-exposure photographs show the kind of detail we've grown accustomed to seeing in published images.

Deep-sky objects appear more delicate and nuanced and require an observer to spend at least a few minutes to appreciate what's there. The act of focusing your attention will not only reveal more detail than you thought was present at first encounter, but there are spillover benefits. Visual concentration sharpens our powers of observation of other natural phenomena.

We're going to use Cassiopeia as our steppingstone to the deep-sky. Start around 8 o'clock local time in mid-February and allow about 10 minutes for your eyes to adapt to the darkness. Look halfway up in the northwestern sky to spot the W of Cassiopeia. This time of year it's tilted on its side and better resembles the Greek letter sigma, written as .

The Double Cluster in Perseus is a sparkling sight in any instrument. (Hunter Wilson)

While looking up, raise the binoculars to your eyes and focus sharply on the top two stars of the W. Then slide about one binocular field of view (~6) up and to the left. You should now see two dense clumps of stars, one on top of the other. This is the Perseus Double Cluster, comprised of two paired star clusters, NGC 869 and 884, that lie 7,500 light-years from Earth. Each is 4th magnitude, bright enough to see with the naked eye from a dark sky.

In my 8x40s I see two dense piles of starry gems, each with its own distinctive appearance. It was just an impression, but the stars in both appeared to spill over the sides as if heaped too high. Both are young clusters, born from gas and dust clouds (nebulae) 12.8 million years ago. The Pleiades in contrast are much older, roughly 100 million years.

At left is a time exposure photo of the Andromeda Galaxy made with a telescope. At right is a sketch I made using 10x50 binoculars of the galaxy under dark skies. It's surprising how much binoculars can reveal. Besides the Andromeda's elongated shape and bright core, two of its satellite galaxies M32 and M110 were also visible. (John Chumack (left) and Bob King)

After you've taken your measure of the Double Cluster, point your binoculars at the bottom three stars in the W that form a bright equilateral triangle. Then slide about three binocular fields to the left until you see something fuzzy. That's the Andromeda Galaxy, located 2.5 million light-years away. It's the nearest large galaxy to our own and contains about a trillion suns in a flattened disk 220 million light-years across twice the size of the Milky Way!

Andromeda is so far away that its faint stellar multitudes blur into a cigar-shaped puff of light 2-3 long. One detail stands out the galaxy's brighter core, where the stars are more densely concentrated. Can you see it? Like the Double Cluster, the galaxy is faintly visible without optical aid under dark skies.

NGC 752 is a spread-out star cluster in Andromeda located near a skinny, bright triangle of stars (below in this image). (PANSTARRS DR1 / Aladin Sky Atlas)

From the Andromeda Galaxy, follow the short arc of stars to its left to the bright star Mirach. Then slide about two binocular fields straight up to find the sprawling 6th magnitude star cluster NGC 752. It looks like a smoky patch about 1 across shot through with faint stars. While nowhere near as compact as the Double Cluster, it's still a true star cluster. All of its members hang together by their mutual gravities as they travel across space like a school of fish in the ocean. NGC 752 is ancient about two billion years old and 1,300 light years away.

I've shown you one way to star-hop to each of our featured deep-sky objects, but like driving to a destination, there's often more than one way to get there. With the help of the map you can choose to start at a different star and arrive at an object by an alternate route. More power to you! Finding your way in the sky takes advantage of your own ingenuity. The more you use it, the more satisfying your journey.

"Astro" Bob King is a freelance writer for the Duluth News Tribune. Read more of his work at duluthnewstribune.com/astrobob.

View original post here:
Astro Bob: Journey to the deep sky with Cassiopeia as your guide | INFORUM - INFORUM

Read More..

In an anxious winter, the garden offers consolation – Sumter Item

By JULIA RUBIN The Associated Press

Deep into this pandemic winter, it can be hard to remember what a refuge gardens were last spring and summer.

In those frightening early days of COVID-19, victory gardens and household vegetable plots sprang up all over. Seed companies reported shortages. Hardware stores saw a run on garden tools. Millions found comfort, release and a sense of safety outdoors with their hands in the dirt.

That feels like a long time ago. We dreaded this winter, and we weren't wrong: January was the deadliest month yet from the virus. Political violence shook Americans' sense of security and shared purpose. Businesses and household incomes are struggling. And the human interactions that might help us process all this anxiety and grief are discouraged.

Yet the garden is still there, hunkering down, too. And it can still help. Even in winter, it can provide solace, inspiration and perspective. Fresh air. And an assurance that spring is coming.

"From December to March, there are for many of us three gardens - the garden outdoors, the garden of pots and bowls in the house and the garden of the mind's eye," Katherine S. White, an editor and writer at The New Yorker and an avid gardener, wrote several decades ago.

As we round the bend into mid-February, and with the hope that vaccines will bring real change, all three of those gardens offer a promise of light.

THE GARDEN OUTDOORS

To the eye, there's little in a winter garden that can compare to spring and summer's binge-worthy drama of growing, blooming and buzzing. Only the most serious gardeners (or those in warmer climates) can keep the growing going outside, using cold frames, fabric or plastic tunnels and other techniques.

But there are smaller joys to be had. The trees' bare branches make for beautiful silhouettes and better views of birds and sunsets. Landscape photographer Larry Lederman, author of the recent book "Garden Portraits," recommends getting to know your garden better in the winter, when "everything is bare and you can see the bones of the landscape."

More significantly, gardens remind us that winter is just one season in a cycle. Death is everywhere in a garden, all year round, but it makes rebirth possible. The species keep going.

"The return of spring each year can be endlessly relied on, and in (plants) not dying when we die, we have a sense of goodness going forward," Sue Stratis-Smith writes in her new book, "The Well-Gardened Mind: The Restorative Power of Nature."

"This," she says, "is the garden's most enduring consolation.''

Of course, the constancy of the seasons these days can't be taken for granted as in the past. So winter is also a good time for reevaluating our own yard-size battles against climate change. We can start or continue composting. And we can research services, products and methods to help make next year's garden - and those beyond - more sustainable.

THE GARDEN INDOORS

Houseplants are hot now, and Instagram is full of plant influencers posting photos.

New technologies make it easier to grow plants anywhere indoors, with or without soil. The plants offer not only beauty, but the rewards of caring for living things and seeing them grow.

Indoor vegetable gardening, too, has become especially popular both as a food source and as a family activity. For instance, you can buy organic mini-farms in Mason jars, cans and boxes - all intended for the windowsill. You can grow mushrooms in their cardboard box with just a spritzer, or set up a large jar of tomatoes adding nothing but water.

Sales of backyard greenhouses and grow lights are up, and seed companies are already reporting another year of high demand. Johnny's Selected Seeds, a high-end, mail-order seller based in Winslow, Maine, recently suspended orders from home gardeners temporarily, saying that because of COVID-19, order volume "has exceeded our capacity to pack seed and to ship orders quickly."

Some gardeners have already started planting the seeds of cold-weather vegetables in flats indoors - seeing the sprouts of cabbage, onions, spinach and more. In just a couple months, perhaps, they can think about transplanting them outdoors if they have the space.

As the Vermont Bean Seed Company says in its 2021 spring catalog: "In each seed and seed-bearing fruit, there is a promise of a new beginning."

THE GARDEN OF THE MIND'S EYE

Which brings us to the third garden: the one we imagine and plan.

"I shall never have the garden I have in my mind, but that for me is the joy of it; certain things can never be realized and so all the more reason to attempt them,'' the author/gardener Jamaica Kincaid once said.

The new seed catalogs carry the promise that, this year, you can make your garden better. Maybe that means converting more lawn to flowers and vegetables, choosing more native plants, reducing water use, putting in paths and water features. A garden is never finished.

Planning it is creative and hopeful. And as our second pandemic spring approaches, those hopes are being buoyed by the rollout of vaccines, too.

As Amanda Gorman said in her inauguration poem last month, in a shoutout to Lin-Manuel Miranda, who was quoting George Washington and Alexander Hamilton, who were quoting the Bible: "Everyone shall sit under their own vine and fig tree, And no one shall make them afraid."

The garden as metaphor for peace, safety, prosperity, calm. Not a bad place for the mind's eye to rest, particularly in this most unsettling of winters.

Originally posted here:
In an anxious winter, the garden offers consolation - Sumter Item

Read More..