|
|||||
A major winter storm is expected to bring heavy snow to parts of the East Coast this weekend. Amid freezing temperatures, many will be hunkering down and sipping hot cocoa by the fire or trying out new warming winter recipes. Others will be getting creative with an ingredient that wont be in short supply: snow. First snow of the year means SNOW CREAM, one TikToker posted earlier this month. This is literally my childhood, another wrote in the caption of her video, combining fresh snow with milk, sugar, and vanilla to make a bowl of dessert. Other snow-based recipes that have gone viral in light of the recent weather include using snow as a way to freeze ice cream, adding whipped cream, vanilla, and icing sugar to a mixing bowl pressed into the snow. Another is sugar on snow, also known as maple taffy, made by pouring hot maple syrup directly onto snow and rolling it onto a stick for a simple cold-weather treat. While many of these concoctions arent new, comments online are mixed. Ohhhh girlfriend you’re not supposed to make snow cream with the first snow of the season, one warned. Another wrote, Hey so I saw an under the microscope of snow and Id just put that back on the ground. These fears arent entirely unfounded. The National Snow and Ice Data Center suggests avoiding ingesting the first layer of snow covering the ground. “As snow falls through the sky, it can lock in pollutants into its intricate latticework. The most common is black carbon from coal-fired plants and wood-burning stoves, the organization explains. Snow acts like a scrubbing brush as it falls through the atmosphere. So, the longer the snow falls, the cleaner the air, and also the snow.” If you do want to try your hand at making snow cream this weekend, avoid any discolored or yellow-tinged snow (for obvious reasons) and anything that could have been in contact with chemicals, such as salt or ice melt. City snow is also more likely to be contaminated than rural snow. If you live in Manhattan, perhaps you should sit this one out.
Category:
E-Commerce
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. While U.S. special operations forces carried out the dramatic seizure of Venezuelan President Nicolįs Maduro, a far quieter but equally devastating offensive was taking place in the unseen digital networks that help operate Caracas. The blackout was not the result of bombed transmission towers or severed power lines but rather a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons. To understand how a nation can turn an adversarys lights out without firing a shot, you have to look inside the controllers that regulate modern infrastructure. They are the digital brains responsible for opening valves, spinning turbines, and routing power. For decades, controller devices were considered simple and isolated. Grid modernization, however, has transformed them into sophisticated internet-connected computers. As a cybersecurity researcher, I track how advanced cyber forces exploit this modernization by using digital techniques to control the machinerys physical behavior. Hijacked machines My colleagues and I have demonstrated how malware can compromise a controller to create a split reality. The malware intercepts legitimate commands sent by grid operators and replaces them with malicious instructions designed to destabilize the system. For example, malware could send commands to rapidly open and close circuit breakers, a technique known as flapping. This action can physically damage massive transformers or generators by causing them to overheat or go out of sync with the grid. These actions can cause fires or explosions that take months to repair. Simultaneously, the malware calculates what the sensor readings should look like if the grid were operating normally and feeds these fabricated values back to the control room. The operators likely see green lights and stable voltage readings on their screens even as transformers are overloading and breakers are tripping in the physical world. This decoupling of the digital image from physical reality leaves defenders blind, unable to diagnose or respond to the failure until it is too late. Historical examples of this kind of attack include the Stuxnet malware that targeted Iranian nuclear enrichment plants. The malware destroyed centrifuges in 2009 by causing them to spin at dangerous speeds while feeding false normal data to operators. Another example is the Industroyer attack by Russia against Ukraines energy sector in 2016. Industroyer malware targeted Ukraines power grid, using the grids own industrial communication protocols to directly open circuit breakers and cut power to Kyiv. More recently, the Volt Typhoon attack by China against the United States critical infrastructure, exposed in 2023, was a campaign focused on pre-positioning. Unlike traditional sabotage, these hackers infiltrated networks to remain dormant and undetected, gaining the ability to disrupt the United States communications and power systems during a future crisis. To defend against these types of attacks, the U.S. militarys Cyber Command has adopted a defend forward strategy, actively hunting for threats in foreign networks before they reach U.S. soil. Domestically, the Cybersecurity and Infrastructure Security Agency promotes secure by design principles, urging manufacturers to eliminate default passwords and utilities to implement zero trust architectures that assume networks are already compromised. Supply chain vulnerability Nowadays, there is a vulnerability lurking within the supply chain of the controllers themselves. A dissection of firmware from major international vendors reveals a significant reliance on third-party software components to support modern features such as encryption and cloud connectivity. This modernization comes at a cost. Many of these critical devices run on outdated software libraries, some of which are years past their end-of-life support, meaning theyre no longer supported by the manufacturer. This creates a shared fragility across the industry. A vulnerability in a single, ubiquitous library like OpenSSLan open-source software tool kit used worldwide by nearly every web server and connected device to encrypt communicationscan expose controllers from multiple manufacturers to the same method of attack. Modern controllers have become web-enabled devices that often host their own administrative websites. These embedded web servers present an often overlooked point of entry for adversaries. Attackers can infect the web application of a controller, allowing the malware to execute within the web browser of any engineer or operator who logs in to manage the plant. This execution enables malicious code to piggyback on legitimate user sessions, bypassing firewalls and issuing commands to the physical machinery without requiring the devices password to be cracked. The scale of this vulnerability is vast, and the potential for damage extends far beyond the power grid, including transportation, manufacturing, and water treatment systems. Using automated scanning tools, my colleagues and I have discovered that the number of industrial controllers exposed to the public internet is significantly higher than industry estimates suggest. Thousands of critical devices, from hospital equipment to substation relays, are visible to anyone with the right search criteria. This exposure provides a rich hunting ground for adversaries to conduct reconnaissance and identify vulnerable targets that serve as etry points into deeper, more protected networks. The success of recent U.S. cyber operations forces a difficult conversation about the vulnerability of the United States. The uncomfortable truth is that the American power grid relies on the same technologies, protocols, and supply chains as the systems compromised abroad. The U.S. power grid is vulnerable to hackers. Regulatory misalignment The domestic risk, however, is compounded by regulatory frameworks that struggle to address the realities of the grid. A comprehensive investigation into the U.S. electric power sector that my colleagues and I conducted revealed significant misalignment between compliance with regulations and actual security. Our study found that while regulations establish a baseline, they often foster a checklist mentality. Utilities are burdened with excessive documentation requirements that divert resources away from effective security measures. This regulatory lag is particularly concerning, given the rapid evolution of the technologies that connect customers to the power grid. The widespread adoption of distributed energy resources, such as residential solar inverters, has created a large, decentralized vulnerability that current regulations barely touch. Analysis supported by the Department of Energy has shown that these devices are often insecure. By compromising a relatively small percentage of these inverters, my colleagues and I found that an attacker could manipulate their power output to cause severe instabilities across the distribution network. Unlike centralized power plants protected by guards and security systems, these devices sit in private homes and businesses. Accounting for the physical Defending American infrastructure requires moving beyond the compliance checklists that currently dominate the industry. Defense strategies now require a level of sophistication that matches the attacks. This implies a fundamental shift toward security measures that take into account how attackers could manipulate physical machinery. The integration of internet-connected computers into power grids, factories, and transportation networks is creating a world where the line between code and physical destruction is irrevocably blurred. Ensuring the resilience of critical infrastructure requires accepting this new reality and building defenses that verify every component, rather than unquestioningly trusting the software and hardwareor the green lights on a control panel. Saman Zonouz is an associate professor of cybersecurity and privacy and electrical and computer engineering at the Georgia Institute of Technology. This article is republished from The Conversation under a Creative Commons license. Read the original article.
Category:
E-Commerce
Two in five Americans have fought with a family member about politics, according to a 2024 study by the American Psychiatric Association. One in five have become estranged over controversial issues, and the same percentage has blocked a family member on social media or skipped a family event due to disagreements. Difficulty working through conflict with those close to us can cause irreparable harm to families and relationships. Whats more, the inability to heal these relationships can be detrimental to physical and emotional well-being, and even longevity. Healing relationships often involve forgivenessand sometimes we have the ability to truly reconcile. But as a professor and licensed professional counselor who researches forgiveness, I believe the process is often misunderstood. In my 2021 book, Practicing Forgiveness: A Path Toward Healing, I talk about how we often feel pressure to forgive and that forgiveness can feel like a moral mandate. Consider 18th-century poet Alexander Popes famous phrase: To err is human; to forgive, divineas though doing so makes us better people. The reality is that reconciling a relationship is not just difficult, but sometimes inadvisable or dangerous, especially in cases involving harm or trauma. I often remind people that forgiveness does not have to mean a reconciliation. At its core, forgiveness is internal: a way of laying down ill will and our emotional burden, so we can heal. It should be seen as a separate process from reconciliation, and deciding whether to renegotiate a relationship. But either form of forgiveness is difficultand here may be some insights as to why. Forgiveness, karma, and revenge In 2025, I conducted a study with my colleagues Alex Hodges and Jason Vannest to explore emotions people may experience around forgiveness, and how those emotions differ from when they experience karma or revenge. We defined forgiveness as relinquishing feelings of ill will toward someone who engaged in a harmful action or behavior toward you. Karma refers to a situation where someone who wronged you got what they deserved without any action from you. Revenge, on the other hand, happens when you retaliate. First, we prompted participants to share memories of three events related to offering forgiveness, witnessing karma and taking revenge. After sharing each event, they completed a questionnaire indicating what emotions they experienced as they retold their story. We found that most people say they aspire to forgive the person who hurt them. To be specific, participants were about 1.5 times more likely to desire forgiveness than karma or revenge. Most admitted, though, that karma made them happier than offering forgiveness. Working toward forgiveness tended to make people sad and anxious. In fact, participants were about 1.5 times more likely to experience sadness during forgiveness than during karma or revenge. Pursuing forgiveness was more stressful, and harder work, because it forces people to confront feelings that may often be perceived as negative, such as stress, anger, or sadness. Two different processes Forgiveness is also confusing, thanks to the way it is typically conflated with reconciliation. Forgiveness researchers tie reconciliation to interpersonal forgiveness, in which the relationship is renegotiated or even healed. However, at times, reconciliation should not occurperhaps due to a toxic or unsafe relationship. Other times, it simply cannot occur, such as when the offender has died or is a stranger. But not all forgiveness depends on whether a broken relationship has been repaired. Even when reconciliation is impossible, we can still relinquish feelings of ill will toward an offender, engaging in intrapersonal forgiveness. Not all forgiveness has to involve renegotiating a relationship with the person who hurt you. I used to practice counseling in a hospitals adolescent unit, in which all the teens I worked with were considered a danger to themselves or others. Many of them had suffered abuse. When I pictured what success could look like for them, I hoped that, in adulthood, my clients would not be focused on their past traumathat they could experience safety, health, belonging, and peace. Most often, such an outcome was not dependent upon reconciling with the offender. In fact, reconciliation was often ill-advised, especially if offenders had not expressed remorse or commitment to any type of meaningful change. Even if they had, there are times when the victim chooses not to renegotiate the relationship, especially when working through trauma. Still, working toward intrapersonal forgiveness could help some of these young people begin each day without the burden of trauma, anger, and fear. In effect, the client could say, What I wanted from this person I did not get, and I no longer expect it. Removing expectations from people by identifying that we are not likely to get what we want can ease the burden of past transgressions. Eventually, you decide whether to continue to expend the emotional energy it takes to stay angry with someone. Relinquishing feelings of ill will toward someone who has caused you harm can be difficult. It may require patience, time, and hard work. When we recognize that we are not going to get what we wanted from someonetrust, safety, loveit can feel a lot like grief. Someone may pass through the same stages, including denial, anger, bargaining, and depression, before they can accept and forgive within themselves, without the burden of reconciliation. Taking stock With this in mind, I offer four steps to evaluate where you are on your forgiveness journey. A simple tool I developed, the Forgiveness Reconciliation Inventory, looks at each of these steps in more depth. Talk to someone. You can talk to a friend, mentor, counselor, grandmasomeone you trust. Talking makes the unmentionable mentionable. It can reduce pain and help you gain perspective on the person or event that left you hurt. Examine if reconciliation is beneficial. Sometimes there are benefits to reconciliation. Broken relationships can be heald, and even strengthened. This is especially more likely when the offender expresses remorse and changes behaviorsomething the victim has no control over. In some cases, however, there are no benefits, or the benefits are outweighed by the offenders lack of remorse and change. In this case, you might have to come to terms with processing an emotionalor even tangibledebt that will not be repaid. Consider your feelings toward the offender, the benefits and consequences of reconciliation, and whether theyve shown any remorse and change. If you want to forgive them, determine whether it will be interpersonaltalking to them and trying to renegotiate the relationshipor intrapersonalin which you reconcile your feelings and expectations within yourself. Either way, forgiveness comes when we relinquish feelings of ill will toward another. Richard Balkin is a distinguished professor of counselor education at the University of Mississippi. This article is republished from The Conversation under a Creative Commons license. Read the original article.
Category:
E-Commerce
All news |
||||||||||||||||||
|
||||||||||||||||||