Skip Navigation
Writing Down and Throwing Away Your Anger May Help Reduce It, According to New Study
www.404media.co Paper-Crumpling Study About the Nature of Anger Is the Best Thing I've Read in a Long Time

Science has found that writing down your feelings and performatively disposing of them can make you less angry.

Paper-Crumpling Study About the Nature of Anger Is the Best Thing I've Read in a Long Time

!

Summary

A new study suggests that writing down your anger and then throwing the paper away can significantly reduce anger levels. Researchers believe the act of throwing away the paper with your written anger on it symbolically throws away the anger itself.

The study involved participants writing about a social problem and then receiving negative feedback designed to make them angry. They were then asked to write about their anger and either throw the paper away, shred it, or put it in a folder. Throwing the paper away and shredding it resulted in a significant reduction in anger compared to putting the paper in a folder.

The researchers believe this technique may work because we associate objects with our feelings and destroying the object feels like destroying the feeling itself. They acknowledge that this technique may not work for very serious anger issues.

Link to the study

https://www.nature.com/articles/s41598-024-57916-z

2
[MonkeyUser] Compile vs Runtime Error (12 Dec 2017)
  • I thought my exception handling would be like having a jet-ejection seat sending me into space.

  • cute dogs, cats, and other animals @lemmy.ml Squire1039 @lemm.ee
    Bear Necessities: Black Bear Cubs Take a Swan Paddle at Woburn Safari Park
    news.sky.com Bedfordshire: Black bears at Woburn Safari Park ride on swan pedalos

    The four young bears, Harvard, Maple, Colorado, and Aspen, enjoyed riding on the pedalos at Woburn Safari Park in Befordshire.

    Bedfordshire: Black bears at Woburn Safari Park ride on swan pedalos

    !

    Four black bear cubs at Woburn Safari Park in Bedfordshire, England, were treated to a unique enrichment activity - a swan pedalo ride!

    Heavy rains created a small lake in their enclosure, and park keepers decided to place a swan pedalo on the water. The bears, named Harvard, Maple, Colorado, and Aspen, were immediately curious about the new object and wasted no time climbing aboard.

    This enrichment activity is designed to stimulate the bears' natural foraging behaviors and keep their minds and bodies active. While a swan boat might not be a typical element in a bear's habitat, it proved to be a big hit with these curious cubs!

    2
    Scientists Experiment with Thickening Arctic Sea Ice to Mitigate Warming
  • I wouldn't know about the speed bump. They are dumping the water on the ice to refreeze it, though.

  • IMF Discloses Microsoft 365 Email Account Hacking Incident
    www.bleepingcomputer.com International Monetary Fund email accounts hacked in cyberattack

    The International Monetary Fund (IMF) disclosed a cyber incident on Friday after unknown attackers breached 11 IMF email accounts earlier this year.

    International Monetary Fund email accounts hacked in cyberattack

    Summary:

    • The International Monetary Fund (IMF) detected the incident in February 2024.
    • Hackers compromised 11 email accounts, but no evidence suggests access to other systems.
    • The IMF uses Microsoft 365 for email and is investigating the incident with cybersecurity experts.
    • This is not the first IMF cyberattack; a major breach occurred in 2011.
    • Connection to recent Microsoft 365 breaches by a Russian hacking group is unclear.
    0
    Scientists Experiment with Thickening Arctic Sea Ice to Mitigate Warming
    www.bbc.com Climate change: The 'insane' plan to save the Arctic's sea-ice

    Could a daring experiment help our planet or is it a dangerous distraction?

    Climate change: The 'insane' plan to save the Arctic's sea-ice

    !

    Summary

    An experiment is underway in the Arctic to save its sea ice from vanishing due to global warming. Scientists are pumping seawater onto the ice to thicken it, aiming to reduce the amount of solar energy absorbed by the dark ocean surface. This approach, part of the controversial field of geoengineering, faces skepticism from many experts who argue it could have unforeseen consequences and distract from the urgent need to cut carbon emissions. While the researchers stress that their efforts are still in the experimental stage, they acknowledge that geoengineering is not a standalone solution and that reducing emissions remains paramount. Despite the challenges, they believe innovative approaches are necessary to address the rapid decline of Arctic sea ice, which poses serious threats to the planet's ecosystems and climate.

    13
    Urban Diets Lead to Decline in Gut Bacteria That Digest Plants
    arstechnica.com Urban humans have lost much of their ability to digest plants

    Rural populations still have lots of the gut bacteria that break down cellulose.

    Urban humans have lost much of their ability to digest plants

    This article discusses a new study on the link between gut bacteria and diet, particularly the ability to digest cellulose, a major component of plants.

    Key Points:

    • Humans have gut bacteria that can break down cellulose, but the amount varies depending on diet.
    • Rural populations and hunter-gatherers have more of these bacteria compared to urban dwellers.
    • The decline is likely due to modern, processed diets low in fiber.
    • Some cellulose-digesting bacteria may have come from our primate ancestors, while others were acquired from domesticated herbivores like cows.
    • These bacteria, though digesting cellulose for themselves, may provide benefits to human health through byproducts and immune system interaction.

    The study identified:

    • Four distinct groups of cellulose-digesting bacteria in humans.
    • A historical decline in these bacteria with dietary changes.
    • Potential benefits to gut health from these bacteria, even if they contribute minimally to direct food processing.
    1
    Unexpectedly, after updating KeePassXC started knocking on the Internet. Is this behavior normal?
  • 140.82.121.5

    Well, apparently, this is an A record for api.github.com. This name resolves to a different IP around the globe. See https://www.whatsmydns.net/#A/api.github.com

    The IP is detected as "clean" on VirusTotal: https://www.virustotal.com/gui/ip-address/140.82.121.5/detection , although apparently (probably not surprising as it is github) is also a favorite address for everything including malware.

    Maybe you can ask in the keepassxc discussion forum on github.

  • Unexpectedly, after updating KeePassXC started knocking on the Internet. Is this behavior normal?
  • VirusTotal doesn't indicate keepassxc.exe 2.7.7 contacts this address. I'd be careful. Check the binaries' signatures. Try a full install to see if that behaves differently.

    keppassxc.exe: https://www.virustotal.com/gui/file/fea4df5024f83155f6742a3372a801fc6cc97ed82627b36fce6f0caed54506cf/relations

    KeePassXC-2.7.7-Win64.msi: https://www.virustotal.com/gui/file/9c3dab957db0f769c4e67bfdf4f0134a65ecfa65c5569718a36aa88e649158cd

  • Mewm and Pewpew
  • The canon is used to induce a radical evasive movement. Probably need lots of airbags. Looks awesome, though; would have loved it as a toy car.

  • Self-Destructing Chips: Researchers Unveil Techniques to Thwart Sophisticated Cyberattacks

    Researchers presented new techniques to fight sophisticated hacking at a tech conference. Here are the highlights:

    Self-destruct chips:

    • A team from Vermont and Marvell created chips with unique fingerprints that can destroy themselves (through increased voltage) if tampered with. This prevents both counterfeiting and unauthorized access to information.
    • Probe detection: Columbia and Intel researchers developed a circuit that detects probes attached to a circuit board, preventing hackers from gaining physical control of a system.
    • Signal Obscuring: Researchers from Texas and Intel created a method to hide a chip's power and electromagnetic signals, making it harder for attackers to steal information.

    These innovations could improve chip security and save businesses billions from chip counterfeiting.

    Comments

    NGL. After I saw "Self-destruct chips", I was just overwhelmed by Mission Impossible theme song.

    https://youtu.be/PeKW0stTThk

    21
    Removed
    A 62-Year-Old German Man Got 217 Covid Shots—and Was Totally Fine
  • ... officials had opened a fraud investigation against the man, confirming 130 vaccinations over nine month... The man then reported an additional 87 vaccinations to the researchers, which in total included eight different vaccine formulations, including updated boosters.

  • Chernobyl Worms Show Unexpected Resilience to Radiation
    www.sciencealert.com Tiny Worms Living Near Chernobyl Have Evolved a Remarkable New Talent

    Microscopic worms that live their lives in the highly radioactive environment of the Chernobyl Exclusion Zone (CEZ) appear to do so completely free of radiation damage.

    Tiny Worms Living Near Chernobyl Have Evolved a Remarkable New Talent

    Tiny worms living in the radioactive Chernobyl Exclusion Zone (CEZ) surprisingly show no signs of radiation damage in their genes. Researchers compared the worms' genomes to those from non- irradiated areas and found no mutations caused by radiation.

    This doesn't mean the zone is safe, but suggests these worms have remarkable resilience to radiation. Studying these worms might provide insights into DNA repair mechanisms that could benefit human health research, such as understanding why some people are more susceptible to cancers caused by DNA damage.

    9
    I don't think this needs explaining
  • Chocolate chip-shrimp cookies with dip... yum...

  • Hacked WordPress sites use visitors' browsers to hack other sites
    www.bleepingcomputer.com Hacked WordPress sites use visitors' browsers to hack other sites

    Hackers are conducting widescale attacks on WordPress sites to inject scripts that force visitors' browsers to bruteforce passwords for other sites.

    Hacked WordPress sites use visitors' browsers to hack other sites

    Summary

    Hackers are compromising WordPress sites to inject malicious scripts. These scripts can either steal cryptocurrency from visitors' wallets or hijack their browsers to launch brute-force attacks against other websites. The hackers are likely building a larger pool of compromised sites to launch more extensive attacks in the future.

    1
    Pet Allowance
  • It's like saying, if you can't figure this out, you aren't worth the one extra dog you have, please give it away.

  • Canada's anti-money laundering agency offline after cyberattack
  • I can see orgies of blackmailing.

  • cute dogs, cats, and other animals @lemmy.ml Squire1039 @lemm.ee
    Thai Customs Seize 87 Animals in Checked Luggage, Including Endangered Red Panda, from Passengers
    www.bbc.com Red panda found in luggage at Bangkok airport

    Six Indian nationals have been arrested for attempting to smuggle dozens of animals out of Thailand.

    Red panda found in luggage at Bangkok airport

    Summary

    Thai customs officials arrested six Indian nationals at Bangkok airport for trying to smuggle 87 animals, including an endangered red panda, snakes, parrots, and monitor lizards. The animals were hidden in their checked luggage and they were all headed to Mumbai. This incident highlights Thailand's role as a wildlife smuggling hub, with animals often destined for China and Vietnam, but increasingly India as well.

    6
    If someone nefarious has your full legal name and your phone number, can they wreak any havoc in our life with that info?
  • Have I been pawned is really nice, but only includes confirmed data leaks. If you use other services like Google or Malwarebyte, they will tell you more leaks. I was involved with the MoveIt data leak from a financial institution recently, which basically leaked all the information that possibly can be partly/wholely used for identity theft. This didn't show up in HIBP. Fidelity Financial Life Insurance just leaked enough info via Infosys for another 30,000 customers with enough data for identity thefts recently.

    In the US, it seems if somebody is able financially to aggregate all these sensitive data leaks, they probably can cause havocs to many people. These info often come from financial institutions, which you can't totally withhold or lie about your personal information.

  • If someone nefarious has your full legal name and your phone number, can they wreak any havoc in our life with that info?
  • Spoofing a number means they can call somebody and appears as calling from your number. In order to receive SMS or call made to your number, they would have to hijack your SIM, typically convincing your telecom provider to transfer your phone info over to theirs.

    In the US, someone knowing your full name and phone number is commonplace. There is no wide-spead havoc because of this. Someone who wants to harm you would really have to be motivated to get more information from the info you gave them. This is obviously possible because of wide-spread data leaks, but does your emissary have the perseverance and the knowledge to do this?

  • What were the consequences of you going to college? Do you think it helped you in life or did it only hold you back?
  • I am somewhat reluctant to say it, but if you get into a top-branded school, it will absolutely help you as it will open doors that otherwise would be closed. People will look at you differently, expect from your differently, and you'll expect from yourself differently.

    OTH, look at Bill Gate, Steve Job, Michael Dell, etc.; extraordinary people will be extraordinary given the right circumstances, ideas, and perseverance.

  • Me🌅irl
  • Apparently a common experience with no apparent satisfactory solutions to everybody involved.

  • Skynet fights back
  • I can't wait until they start delivering packages with humanoid robots... They could spike up Halloween.

  • Challenges in Deciphering the Secrets of Large Language Models

    !

    The article discusses the mysterious nature of large language models and their remarkable capabilities, focusing on the challenges of understanding why they work. Researchers at OpenAI stumbled upon unexpected behavior while training language models, highlighting phenomena such as "grokking" and "double descent" that defy conventional statistical explanations. Despite rapid advancements, deep learning remains largely trial-and-error, lacking a comprehensive theoretical framework. The article emphasizes the importance of unraveling the mysteries behind these models, not only for improving AI technology but also for managing potential risks associated with their future development. Ultimately, understanding deep learning is portrayed as both a scientific puzzle and a critical endeavor for the advancement and safe implementation of artificial intelligence.

    10
    UK Trial: Pornhub's Chatbot Halts Millions from Accessing Child Abuse Content
  • The MLs have been shown to be extraordinarily good at statistically guessing your words. The words covered are probably comprehensive.

  • UK Trial: Pornhub's Chatbot Halts Millions from Accessing Child Abuse Content
    www.wired.com A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

    Every time someone in the UK searched for child abuse material on Pornhub, a chatbot appeared and told them how to get help.

    A Pornhub Chatbot Stopped Millions From Searching for Child Abuse Videos

    A trial program conducted by Pornhub in collaboration with UK-based child protection organizations aimed to deter users from searching for child abuse material (CSAM) on its website. Whenever CSAM-related terms were searched, a warning message and a chatbot appeared, directing users to support services. The trial reported a significant reduction in CSAM searches and an increase in users seeking help. Despite some limitations in data and complexity, the chatbot showed promise in deterring illegal behavior online. While the trial has ended, the chatbot and warnings remain active on Pornhub's UK site, with hopes for similar measures across other platforms to create a safer internet environment.

    246
    Study: Fasting Triggers Body-Wide Changes After 3 Days
    www.sciencedaily.com Study identifies multi-organ response to seven days without food

    New findings reveal that the body undergoes significant, systematic changes across multiple organs during prolonged periods of fasting. The results demonstrate evidence of health benefits beyond weight loss, but also show that any potentially health-altering changes appear to occur only after three ...

    Study identifies multi-organ response to seven days without food

    !

    Fasting for a week:

    • Causes significant changes in protein levels across various organs.
    • May have health benefits beyond weight loss, but only after 3 days.
    • Switches energy source from glucose to fat after 2-3 days.
    • Average weight loss of 5.7 kg (fat and muscle), with most fat loss sustained after 3 days of eating.

    Implications:

    • Provides insights into the molecular basis of fasting's health effects.
    • Paves the way for developing alternative treatments based on fasting benefits.
    • Confirms historical use of fasting for specific health conditions.
    57
    Scientists Observe First Instance of Solo Orca Hunting Great White Shark
    www.bbc.com Killer whale vs shark: Solo orca eats great white

    A killer whale is captured on camera hunting and "eviscerating" a great white shark in less than two minutes.

    Killer whale vs shark: Solo orca eats great white

    A rare event was documented: a single killer whale, or orca, successfully hunted and killed a juvenile great white shark. This "astonishing" attack, filmed in 2023, showcased the orca's exceptional predatory skills. It's the first recorded instance of a solo orca hunting a great white, highlighting the animal's adaptability and learning abilities.

    Previously, scientists had observed orcas working together to target and consume the livers of great white sharks. This new observation raises questions about the impact of killer whale behavior on shark populations and potential consequences for the ecosystem. The scientists emphasize that further research is needed to understand the motivations behind this behavior and its broader ecological implications. The discovery also highlights the remarkable hunting skills and intelligence of killer whales.

    1
    Green Alley Award Celebrates Decade of Circular Economy Innovation: Recognizing Startups Turning Waste into Resources
    www.positive.news Debunking junk: 10 years of rethinking rubbish - Positive News

    Some horizon-expanding companies have won plaudits from the Green Alley Award in its 10 years to date, altering how we think of waste

    Debunking junk: 10 years of rethinking rubbish - Positive News

    The Green Alley Award is celebrating its 10th anniversary. It's a European award that recognizes and supports startups focused on the circular economy, aiming to reduce waste and resource consumption.

    The article highlights the award's achievements over the past decade. It showcases examples of past winners who developed innovative solutions like reusable packaging and bioplastics. This year, the award offers a €25,000 prize and the chance for finalists to network with potential investors and collaborators.

    The article emphasizes the growing importance of circular economy solutions as we face resource limitations and climate change. Research suggests that transitioning to a circular economy could significantly reduce our reliance on raw materials. The Green Alley Award plays a role in fostering innovation and progress in this crucial area.

    0
    [xkcd] Dependencies (16 Jun 2010)
  • The prof is running in a loop.

  • Phone Push Notifications: A Double-Edged Sword for User Privacy and Law Enforcement
    www.theregister.com Investigators seek push notification metadata in 130 cases

    Those little popups may reveal location, device details, IP address, and more

    Investigators seek push notification metadata in 130 cases

    Summary:

    • US courts have received over 130 requests from law enforcement to access push notification data from phones, reported the Washington Post.
    • This data can reveal a user's location, device details, IP address, and more, even if they use encrypted messaging apps.
    • This raises concerns about privacy, as prosecutors and foreign governments could potentially access this data for various reasons.
    • While Apple and Google are promising more transparency regarding data requests, security experts highlight the potential for abuse by governments and marketing organizations.

    Key Points:

    • Push notification metadata includes information like the app receiving the notification, timestamp, and network details.
    • This data is not encrypted and can be used to track user movements and activity.
    • Law enforcement can use this data for investigations, but it also raises concerns about potential misuse by other parties.
    • Experts recommend increased awareness about the information users share through push notifications and the potential privacy risks involved.
    18
    Tech Company Leaks 2FA Codes/Password Reset Links for Major Platforms
    techcrunch.com A leaky database spilled 2FA codes for the world's tech giants | TechCrunch

    An SMS routing company's exposed database was left online without a password, spilling 2FA codes and password reset links to the open web.

    A leaky database spilled 2FA codes for the world's tech giants | TechCrunch

    A security breach exposed two-factor authentication (2FA) codes/password reset links for millions of users on platforms like Facebook, Google, and TikTok.

    Key Points:

    • YX International, an SMS routing company, left an internal database exposed online without a password.
    • The database contained one-time 2FA codes and password reset links for various tech giants.
    • YX International secured the database and claims to have "sealed the vulnerability."
    • The company wouldn't confirm how long the database was exposed or if anyone else accessed it.
    • Representatives from Meta, Google, and TikTok haven't commented yet.

    Concerns:

    • This leak highlights the vulnerabilities of SMS-based 2FA compared to app-based methods.
    • The lack of information regarding the leak's duration and potential access by others raises concerns.

    Gemini Recommendations:

    • Consider switching to app-based 2FA for increased security.
    • Be cautious of suspicious communications and avoid clicking unknown links.
    • Stay informed about potential security breaches affecting your online accounts.
    75
    Cutout.Pro, an AI-powered visual design platform, leaked 20M records, including email and IP addresses, names and salted MD5 password hashes, which have then been broadly distributed.
    haveibeenpwned.com Have I Been Pwned: Pwned websites

    Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.

    Have I Been Pwned: Pwned websites

    Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site.

    Other links on the story:

    • https://cybernews.com/security/ai-editing-service-leaks-images-customer-data/
    • https://www.hackread.com/ai-image-editing-tool-cutout-data-leak/
    10
    Late Actor Matthew Perry's Twitter Hacked: Fake Charity Plea Targets Fans with Cryptocurrency Scam
    www.bitdefender.com Matthew Perry's Twitter account hacked by cryptocurrency scammers

    Matthew Perry's official Twitter account was hijacked by scammers this week who attempted to solicit donations from well-meaning fans of the much-loved late actor.

    Matthew Perry's Twitter account hacked by cryptocurrency scammers

    Scammers hacked the late actor Matthew Perry's Twitter account and posted a fake plea for cryptocurrency donations in the name of his foundation. The foundation confirmed the post was a scam and urged people not to donate.

    The article details several possibilities for how the account may have been compromised, highlighting the importance of strong passwords and multi-factor authentication for securing social media accounts, especially for celebrities with large followings.

    100
    WordPress and Tumblr Plan to Sell User Content to AI Companies
  • both

    Town-square when they lure you in, they own everything when they sell you ass off.

  • [Malwarebytes Blog] Android banking trojans: How they steal passwords and drain bank accounts
  • Yeah, the app data are separated and inaccessible, unless specified by the developer. Accessibility service is a separate permission, and should almost never be asked or granted, where as file/photo accesses are more common.

  • My Sister

    From: https://www.tumblr.com/memeuplift/732625248536723456/2024-chevrolet-trax?source=share

    7
    [Malwarebytes Blog] Android banking trojans: How they steal passwords and drain bank accounts
  • I agree with you. The article give a good warning about downloading applications in general, but hand-wave how they escalated from "file/photo" access to capturing your data. The recent Anatsa malware's details seem to imply accessibility service. This is a Thread Fabric article about Anatsa malware: https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach

  • [Malwarebytes Blog] Android banking trojans: How they steal passwords and drain bank accounts
    www.malwarebytes.com Android banking trojans: How they steal passwords and drain bank accounts | Malwarebytes

    Android banking trojans are a serious cyberthreat to everyday users that, through clever trickery, steal passwords and drain bank accounts.

    Android banking trojans: How they steal passwords and drain bank accounts | Malwarebytes

    This article warns users about Android banking trojans, a type of malware that steals online banking credentials and drains accounts.

    Key points:

    • Prevalence: These trojans are disguised as legitimate apps and pose a serious threat to Android users, with Malwarebytes detecting over 88,500 in 2023 alone.
    • Deception: They often masquerade as everyday apps like fitness trackers or QR readers or productivity or photography tools, making them difficult to identify.
    • Permissions Requests: Once installed, they request permissions like accessing photos or files, but use them to steal login details.
    • Sneaky Tactics: Some even hide their app icon on the home screen and download additional malware later, bypassing Google Play's security measures.
    • End Goal: Their ultimate aim is to steal your banking information and use it to make unauthorized money transfers.

    The article emphasizes that vigilance is crucial, as these trojans are becoming increasingly sophisticated. It also references a recent Anatsa Trojan: https://www.techradar.com/pro/security/this-nasty-new-android-malware-can-easily-bypass-google-play-security-and-its-already-been-downloaded-thousands-of-times

    9
    Squire1039 Squire1039 @lemm.ee
    Posts 52
    Comments 84