• THENEXTWEB.COM
    Airbus to build lander for Europes first Mars rover after Russia dropped
    The European Space Agencys (ESA) Rosalind Franklin rover is back on course for a landmark trip to Mars, where it will probe the red planet for signs of extraterrestrial life.ESA initially designed the Mars rover alongside Roscosmos, Russias space agency, as part of the ExoMars programme. The vehicle was set to launch in 2022, but when Russia invaded Ukraine, ESA severed ties with Moscow, putting the mission in jeopardy. Rosalind Franklin named after the British chemist whose work was crucial to understanding the structure of DNA was left without several key components, including a landing platform to safely touch down on the Martian surface.But now, ESA and Thales Alenia Space, the prime contractor for the ExoMars mission, have issued Airbus a 150mn contract to build a new lander at the companys facility in Stevenage, UK. The British government will fund the lander via the UK Space Agency.Getting the Rosalind Franklin rover onto the surface of Mars is a huge international challenge and the culmination of more than 20 years work, said Kata Escott, managing director at Airbus Defence and Space UK, which also designed and built the rover.Get TicketsThe ExoMars spacecraft is set to launch from the US in 2028. Arrival on Mars is expected by 2030.If successful, it will be Europes first rover to be sent to Mars. The US space agency NASA already has two in operation Perseverance and Opportunity while China has one, called Zhurong.The trip to MarsUK Technology Secretary Peter Kyle next to a mockup of the ExoMars Rosalind Franklin rover at Airbuss facility in Stevenage in the UK. Credit: DSITAs the spacecraft approaches Mars, the lander carrying the rover will separate and begin its rapid descent into the atmosphere. A combination of a heat shield, parachutes, and braking rockets will slow down the lander just before touchdown.Once on the surface, the lander will deploy ramps, allowing the rover to drive off and begin its exploration. Rosalind Franklins instruments will look for evidence of past and present Martian life. The rover includes a drill designed to probe as deep as two metres into the surface, acquiring samples shielded from radiation on the surface. Its designed to operate for at least seven months.Since its fallout with Russia, ESA has secured new agreements for various components of the ExoMars spacecraft, including a contract with NASA to supply adjustable braking engines for the landing platform and radioisotope heating units (RHUs). These RHUs use radioactive decay to generate heat, preventing the rover from freezing in the frigid Martian environment. Story by Sin Geschwindt Sin is a climate and energy reporter at TNW. From nuclear fusion to escooters, he covers the length and breadth of Europe's clean tech ecos (show all) Sin is a climate and energy reporter at TNW. From nuclear fusion to escooters, he covers the length and breadth of Europe's clean tech ecosystem. He's happiest sourcing a scoop, investigating the impact of emerging technologies, and even putting them to the test. Sin has five years journalism experience and holds a dual degree in media and environmental science from the University of Cape Town, South Africa. Get the TNW newsletterGet the most important tech news in your inbox each week.Also tagged with
    0 Comments 0 Shares
  • 9TO5MAC.COM
    iOS 18.4 adds robot vacuums to HomeKit; here are the supported models
    Apple released iOS 18.4 to everyone this week, and it comes with a big upgrade to the Home app. With iOS 18.4, users can now add robot vacuums to HomeKit for the first time thanks to the Matter smart home standard.Here are the best robot vacuums compatible with HomeKit in iOS 18.4What can you do with a robot vacuum in HomeKit?Once you add a compatible robot vacuum to the Home app, youll see the device alongside all your other HomeKit accessories.You can integrate your robot vacuum with different automations and scenes in the Home app. You can also schedule it to run at certain times of day and as part of specific automations, including scheduling and automating cleanings for specific rooms at specific times.Additionally, if you have a robot vacuum that supports vacuuming and mopping, the Home app will let you pick between those modes. The Home app will also show you the devices current status, such as whether its cleaning or charging.Integration with HomeKit also means you can control your robot vacuum with Siri. You can say things like, Siri, clean the living room or Siri, mop the kitchen to begin hands-free cleaning.You will, however, still have to use the manufacturers app for the more robust features and controls for your robot vacuums. This includes mapping, object avoidance settings, custom routes, and more. For the fundamentals and day-to-day usage, the Home app should be able to get the job done.Which robot vacuums support HomeKit?So, which robot vacuums support HomeKit integration? Its more than you might think, thanks to the Matter smart home standard. This makes it easier for manufacturers to adopt new features.In a press release, Roborock says it has started rolling out a firmware update that enables HomeKit support on a handful of its models. The update started rolling out today, and Roborock promises that all customers will have it by April 10th.Heres the full rundown on the Roborock models that will support HomeKit integration:Roborock says that firmware updates with HomeKit support will come to other models, like the S8 Max Ultra and Qrevo Slim, in the upcoming weeks and months, followed by even more models coming soon.Ecovacs is also committed to supporting HomeKit integration. The company told The Verge that the update be released to the following models in phases starting this week:SwitchBot is another brand that has started rolling out HomeKit support to its products. First up is the SwitchBot S10 Robot Vacuum and Mop, which features Home app integration today.iRobot says that the Roomba Combo 10 Max Robot Vacuum and Auto Wash Dock will receive a firmware update with Apple Home support. The company hasnt shared any details on when that update will be released, though.Wrap upWhile the Home app and HomeKit platform often feel neglected, support for robot vacuums is a great addition. Do you own a HomeKit-capable robot vacuum? Are you planning to buy one now that iOS 18.4 has been released? Let us know down in the comments.Follow Chance:Threads,Bluesky,Instagram, andMastodon.Add 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comments 0 Shares
  • 9TO5MAC.COM
    New AirPods Max just got three more features with iOS 18.4
    Apples AirPods Max revision last fall was underwhelming. It only brought a few changes: new colors, USB-C, and Personalized Spatial Audio. But now thanks to iOS 18.4, this new AirPods Max model just gained three additional features. Latest AirPods Max firmware adds three new featuresI love my AirPods Pro 2, and a big part of why is that Apple has consistently updated them with powerful new features. AirPods Max historically havent received the same attention. But thats starting to change thanks to the latest update.iOS 18.4, iPadOS 18.4, and macOS 15.4 include support for three new features with Apples latest AirPods Max model.If you use AirPods Max with USB-C, heres whats new:Lossless audioUltra-low latency audioWired playback is now supported for the first timeThese three new features are enabled by a combination of the new software updates and a fresh firmware version Apple just released.The new firmware is build 7E99.Release notes for the firmware are as follows:When used with an iPhone, iPad, or Mac running iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4 or later, AirPods Max with USB-C and firmware update 7E99 enable lossless audio and ultra-low latency audio for the ultimate listening experience and even greater performance for music production, content creation, and gaming.Apple had previously announced that this update was on its way. In that announcement, it shared even more detail, including saying that ultra-low latency audio significantly lowers lag time, and is on par with the native built-in speakers on Mac, iPad, and iPhone.Checking your AirPods Max firmware and updatingTo check which firmware your AirPods Max are currently running, open the Settings app, visit the AirPods Max settings near the top of the screen, then scroll to the bottom where Version is listed.If your AirPods Max arent yet running version 7E99, heres how Apple recommends triggering the update:Make sure that your iPhone, iPad, or Mac is updated to the latest version of iOS, iPadOS, or macOS, and that Bluetooth is on. To update your AirPods Max (USB-C), you need iOS or iPadOS 18.4 or later, or macOS Sequoia 15.4 or later.Make sure that your AirPods Max are connected via Bluetooth to your iPhone, iPad, or Mac.Connect your iPhone, iPad, or Mac to Wi-Fi.Plug the charging cable into the bottom-right earphone, then plug the other end of the cable into a USB charger or port.Keep your AirPods Max in Bluetooth range of your iPhone, iPad, or Mac, and wait at least 30 minutes for the firmware to update.Reconnect your AirPods Max to your iPhone, iPad, or Mac.Check the firmware version again.If you still cant update your firmware,reset your AirPods Max, then try to update your firmware again.What do you think of iOS 18.4s new AirPods Max features? Let us know in the comments.Best AirPods Max deals and accessoriesAdd 9to5Mac to your Google News feed. FTC: We use income earning auto affiliate links. More.Youre reading 9to5Mac experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Dont know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel
    0 Comments 0 Shares
  • FUTURISM.COM
    After a Single Concussion, Kids Are 15 Percent Less Likely to Go to College
    Image by Getty / FuturismNeuroscience/Brain ScienceMore concerning news from the traumatic brain injury (TBI) front: a new study shows that kids who experience just one concussion are 15 percent less likely to end up going to college the latest research to ring alarm bells about various ways that the long-term impacts of TBIs might manifest.The study, published last week in the European Journal of Epidemiology, was conducted by a cohort of Finnish scientists and physicians. Using data from the Finnish Care Register for Health Care, they analyzed data collected from patients aged 17 and under who received hospital-level care for a brain injury, ranging from emergency visits to the ER for seemingly mild concussions to treatment for more severe head traumas.What they found, according to lead study author Julius Mttnen,was alarming."A mild, single concussion is often considered a relatively harmless event, but our research suggests that it can have long-term effects on learning and cognitive abilities," Mttnen, a doctoral researcher at the University of Tampere in Finland, told New Atlas of the study's findings. "This should get more attention in both healthcare and schools."According to New Atlas, the researchers obtained the records of 136,828 patients from the Finnish registry; 24,039 of those records, they found, contained details regarding higher education for patients over the age of 26.Within that group, researchers found that 8,487 received hospital treatment for pediatric TBIs, or "pTBIs." About 7,600 patients in that cohort were treated for more generalized concussions, while the remainder had a "specific intracranial injury" like brain bleeding, according to the study. The average pTBI patient age at the time of their treatment was 13 years old.The pTBI group was then compared against a reference group of 15,552 pediatric patients who, instead of a head injury, had received hospital-level treatment for limb injuries like broken ankles and wrists. The results were fascinating and troubling.Overall, the scientists concluded that individuals from the pTBI cohort attended higher education at a 15 percent lower rate than their non-brain-injured counterparts. Within that group, the small cohort that experienced a specific cranial incident like a brain bleed were even less likely to engage with higher education, entering college and university at a rate 22 percent lower than those who experienced concussions. And even when someone with a pTBI did go to college, they were 19 percent less likely than their peers to go on to receive an advanced degree."People with pTBI had lower education attainment at all higher educational levels than the reference population with orthopedic injuries," reads the study, noting that the level of "education attainment" achieved by pTBI folks "was lower regardless of the injury severity."In other words, even a mild concussion was correlated with a lower likelihood of pursuing education beyond high school.Of course, the decision to seek higher education is complicated, and layered in factors like a person's socioeconomic background and identity. (That said, we should note that Finnish universities and all Finnish education is free for Finnish citizens, as well as citizens of the European Union, European Economic Area member states, and Switzerland.)But while the study's findings remain correlative, they add to an ever-growing body of scientific literature revealing the long-term consequences of brain injuries from seemingly low-level concussions to life-threatening traumas and their connection to learning disabilities, mental health challenges and disorders, behavioral changes, and long-term impairments in cognitive function.Hopefully, the Finnish paper leads to further study of how even comparatively minor head injuries may continue to impact someone's life years after their incident and how kids grappling with life after a TBI might be best supported by schools and leaders in education."For future monitoring of pTBI patients," write the study authors, "it is important to pay attention to the possible long-term negative cognitive impact that can lead to lower educational attainment."Share This Article
    0 Comments 0 Shares
  • THEHACKERNEWS.COM
    New Case Study: Global Retailer Overshares CSRF Tokens with Facebook
    Are your security tokens truly secure?Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations. Learn about the detection process, response strategies, and steps taken to mitigate this critical issue. Download the full case study here. By implementing Reflectiz's recommendations, the retailer avoided the following:Potential GDPR fines (up to 20M or 4% of turnover)$3.9M data breach cost [on average]5% customer churn IntroductionYou might not know much about CSRF tokens, but as an online retailer, you need to know enough to avoid any accidental oversharing of them by the Facebook Pixel. Getting this wrong could mean enormous fines from data protection regulators, so the purpose of this article is to give you a brief overview of the problem and explain the best way to protect your business against it. You can explore this key issue in greater depth by downloading our free new case study on the subject [from here]. It goes through a real-world example of when this happened to a global online apparel and lifestyle retailer. It explains the issue they faced in more detail, but this article is a bite-sized overview of the threat to get you up to speed.Let's take a deeper look at how this issue unfolded and why it matters for online security.What happened and why it mattersIn a nutshell, a web threat monitoring solution called Reflectiz discovered a data leak in the retailer's systems that others didn't: its Facebook Pixel was oversharing a security technology called CSRF tokens that it should've kept under wraps.CSRF tokens were invented to stop CSRF, which stands for cross-site request forgery. It's a type of cyberattack that involves tricking a web application into performing certain actions by convincing it that they came from an authenticated user. Essentially, it exploits the trust that the web application has in the user's browser.Here's how it works:The victim is logged into a trusted website (for instance, their online banking). The attacker creates a malicious link or script and tricks the victim into clicking it (this could happen via email, social media, or another website).The malicious link sends a request to the trusted website. Since the victim is already authenticated, their browser automatically includes their session cookies or credentials, making the request appear legitimate to the web application. As a result, the web application will carry out the action in the attacker's malicious request, such as transferring funds or changing account details, without the victim's consent.[Note that this is not a malicious activity event. All 'blockers' that monitor the traffic for malicious scripts would not detect any issues.]Developers can use various tools to stop this happening, and one of them is CSRF tokens. They ensure that authenticated users only perform the actions they intend to, not the ones requested by attackers. Reflectiz recommended storing CSRF tokens in HttpOnly cookies, which prevents third-party scripts, like Facebook Pixel, from accessing them.The misconfiguration problemIn the case study example [that you can find here] the retailer's Facebook Pixel had been accidentally misconfigured. The misconfiguration allowed the pixel to inadvertently access CSRF tokenscritical security elements that prevent unauthorized actions on behalf of authenticated users. These tokens were exposed, creating a serious security vulnerability. This breach risked multiple security issues, including potential data leaks and unauthorized actions on behalf of users.Like many online retailers, your website will probably use the Facebook Pixel to track visitor activities to optimize its Facebook advertising, but it should only be gathering and sharing the information it requires for that purpose, and it should only be doing so after obtaining the correct user permissions. Since CSRF tokens should never be shared with any third party, that's impossible!Here's how Reflectiz's technology works to uncover such vulnerabilities before they turn into serious security risks.The FixReflectiz's automated security platform was employed to monitor the retailer's web environment. During a routine scan, Reflectiz identified an anomaly with the Facebook Pixel. It was found to be interacting with the page incorrectly, accessing CSRF tokens and other sensitive data. Through continuous monitoring and deep behavioral analysis, Reflectiz detected this unauthorized data transmission within hours of the breach. This was a bit like sharing the keys to their house or the password to their bank account. They're actions that others could exploit in the future.Reflectiz acted swiftly, providing a detailed report to the retailer. The report outlined the misconfiguration and recommended immediate actions, such as configuration changes to Facebook Pixel code, to stop the Pixel from accessing sensitive data. Data protection regulators take a dim view of your business even if it accidentally overshares this kind of restricted information with unauthorized third parties, and fines can easily run into millions of dollars. That's why the 10 to 11 minutes it will take you to read the full case study could be the best time investment you make all year.Next StepsReflectiz's recommendations didn't just stop with immediate fixes; they laid the foundation for ongoing security improvements and long-term protection. Here's how you can protect your business from similar risks:Regular Security Audits:Continuous Monitoring: Implement a system of continuous monitoring to track all third-party scripts and their behavior on your website. This will help you detect potential vulnerabilities and misconfigurations in real-time, preventing security risks before they escalate.Periodic Security Audits: Schedule regular audits to ensure that all security measures are up to date. This includes checking for vulnerabilities in your third-party integrations and ensuring compliance with the latest security standards and best practices.Third-Party Script Management:Evaluate and Control Third-Party Scripts: Review all third-party scripts on your website, such as tracking pixels and analytics tools. Limit the access these scripts have to sensitive data and ensure they only receive the data necessary for their function.Use Trusted Partners: Only work with third-party vendors that meet stringent security and privacy standards. Ensure that their security practices align with your business's needs to prevent unauthorized data sharing.CSRF Token Protection:HttpOnly Cookies: Follow Reflectiz's recommendation to store CSRF tokens in HttpOnly cookies, which prevents JavaScript (including third-party scripts) from accessing them. This is a key measure in protecting tokens from unauthorized access by third-party vendors.Enforce Secure Cookie Attributes: Ensure that all CSRF tokens are stored with Secure and SameSite=Strict attributes to protect them from being sent in cross-origin requests and mitigate the risk of exposure through malicious third-party scripts.Privacy by Design:Integrate Privacy into Your Development Process: As part of your development and deployment processes, adopt a Privacy by Design approach. Ensure that privacy considerations are at the forefront, from the way data is stored to the way third-party scripts interact with your site.User Consent Management: Regularly update your data collection practices, ensuring users have control over what data they share. Always obtain clear, informed consent before sharing any sensitive data with third parties.Educate Your Team:Security Training: Make sure your development and security teams are well-trained in the latest security protocols, especially related to data privacy and CSRF protection. Awareness and understanding of security risks are the first steps to preventing issues like this.Cross-Department Collaboration: Ensure that marketing and security teams are aligned, especially when using third-party tools like the Facebook Pixel. Both teams should work together to ensure that security and privacy concerns are considered when implementing such tools.Adopt a Zero-Trust Approach:Zero-Trust Security Model: Consider adopting a Zero-Trust approach to security. This model assumes that all users, both inside and outside the network, are untrusted and verifies each request before granting access. By applying this philosophy to data exchanges between your site and third-party services, you can minimize exposure to risks.By implementing these next steps, you can proactively strengthen your security posture, safeguard your sensitive data, and prevent similar issues in the future. Reflectiz's insights provide the roadmap to build a more resilient and secure web environment. Protecting your business from emerging threats is an ongoing effort, but with the right processes and tools in place, you can ensure that your systems remain secure and compliant.Download the full case study here. Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.
    0 Comments 0 Shares
  • THEHACKERNEWS.COM
    China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions
    Apr 01, 2025Ravie LakshmananMalware / Cyber EspionageCybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, technology, logistics, manufacturing, telecommunications, IT services, and retail in the Asia-Pacific (APAC) and Latin American (LATAM) regions."The first sighting of its activity was in the second quarter of 2023; back then, it was predominantly observed in the APAC region," Trend Micro researchers Lenart Bermejo, Ted Lee, and Theo Chen said in a technical report published Monday. "Around the middle of 2024, it was also spotted in Latin America."The primary targets of the adversarial collective span countries such as Thailand, the Philippines, Malaysia, Taiwan, and Brazil.The infection chains begin with the exploitation of vulnerable services in internet-exposed web applications, using them to drop the Godzilla web shell for facilitating the deployment of additional payloads, including backdoors dubbed VARGEIT and COBEACON (aka Cobalt Strike Beacon).VARGEIT offers the ability to load tools directly from its command-and-control (C&C) server to a newly spawned process of Microsoft Paint ("mspaint.exe") to facilitate reconnaissance, collection, and exfiltration."VARGEIT is also the chief method through which Earth Alux operates supplemental tools for various tasks, such as lateral movement and network discovery in a fileless manner," the researchers said.A point worth mentioning here is that while VARGEIT is used as a first, second, or later-stage backdoor, COBEACON is employed as a first-stage backdoor. The latter is launched by means of a loader dubbed MASQLOADER, or via RSBINJECT, a Rust-based command-line shellcode loader.Subsequent iterations of MASQLOADER have also been observed implementing an anti-API hooking technique that overwrites any NTDLL.dll hooks inserted by security programs to detect suspicious processes running on Windows, thereby allowing the malware and the embedded payload within it to fly under the radar.The execution of VARGEIT results in the deployment of more tools, including a loader component codenamed RAILLOAD that's executed using a technique known as DLL side-loading, and is used for running an encrypted payload located in a different folder. The second payload is a persistence and timestomping module referred to as RAILSETTER that alters the timestamps associated with RAILLOAD artifacts on the compromised host, alongside creating a scheduled task to launch RAILLOAD.VARGEIT and controller interaction"MASQLOADER is also being used by other groups besides Earth Alux," Trend Micro said. "Additionally, the difference in MASQLOADER's code structure compared to other tools such as RAILSETTER and RAILLOAD suggests that MASQLOADER's development is separate from those toolsets."The most distinctive aspect of VARGEIT is its ability to support 10 different channels for C&C communications over HTTP, TCP, UDP, ICMP, DNS, and Microsoft Outlook, the last of which leverages the Graph API to exchange commands in a predetermined format using the drafts folder of an attacker-managed mailbox.Specifically, the message from the C&C server is prepended with r_, while those from the backdoor are prefixed with p_. Among its wide range of functions is the extensive data collection and command execution, which makes it a potent malware in the threat actor's arsenal."Earth Alux conducts several tests with RAILLOAD and RAILSETTER," Trend Micro said. "These include detection tests and attempts to find new hosts for DLL side-loading. DLL side-loading tests involve ZeroEye, an open source tool popular within the Chinese-speaking community, for scanning EXE files' import tables for imported DLLs that can be abused for side-loading." The hacking group has also been found to utilize VirTest, another testing tool widely used by the Chinese-speaking community, to ensure that its tools are stealthy enough to maintain long-term access to target environments."Earth Alux represents a sophisticated and evolving cyberespionage threat, leveraging a diverse toolkit and advanced techniques to infiltrate and compromise a range of sectors, particularly in the APAC region and Latin America," the researchers concluded. "The group's ongoing testing and development of its tools further indicate a commitment to refining its capabilities and evading detection."Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.SHARE
    0 Comments 0 Shares
  • SCREENCRUSH.COM
    Why Did My DVDs Stop Working? Disc Rot Explained
    If you appreciate the value, importance and (for the most part) reliability of physical media, its likely you have some DVDs in your collection.Unlike streaming, where your favorite films, documentaries and TV series can be pulled and/or shifted to another service at any given moment (if the thing you want to watch is even available to stream to begin with), physical media is always ready for you to press play.According to Sony, a typical DVD disc has an estimated life expectancy of anywhere from 30 to 100 years when properly stored and handled.Unfortunately though, DVDs still have some drawbacks one of which is the dreaded disc rot.What Is Disc Rot?Also known as CD rot, disc rot happens when the reflective layer on DVDs, CDs or other media discs begins to deteriorate, resulting in the complete loss or corruption of the data contained on the disc.Disc rot can be caused by a number of factors, including chemical reactions, exposure to heat or humidity (and even light), oxidation or deep scratches on the disc.Poor quality materials, especially those used to create early DVDs, can also lead to disc rot. Over time, the reflective layer breaks down and caused various glitches.This often manifests in content that freezes while playing or simply wont load at all, making the disc totally unplayable.Can Disc Rot Be Fixed?Unfortunately, one disc rot starts and the reflective layer on the CD or DVD disc begins to break down, theres really no way to reverse the rot or save the disc.Your best bet in the fight against disc rot is to try to prevent it from happening in the first place by properly storing your DVDs in their original cases.READ MORE: Home Video Formats That No Longer ExistDVDs should also be kept in a cool, dry, dark place.DVDs (and CDs) should also be cleaned with a microfiber cloth to remove any dust or grime, and you should always handle discs carefully and mindfully to avoid scratching them.broken dvd not workingiStock via Getty Imagesloading...Warner Bros. Will Replace Your Rotted DVDsIf you have any DVDs that were manufactured by Warner Bros. Home Entertainment (WBHE) between 2006 and 2008, you may be entitled to replacement discs for certain titles.In a statement shared in March 2025, WBHE noted they are aware that many of their DVDs from the mid-2000s are suddenly failing due to disc rot:Warner Bros. Home Entertainment is aware of potential issues affecting select DVD titles manufactured between 2006 and 2008, and the company has been actively working with consumers to replace defective discs ... Where possible, the defective discs have been replaced with the same title. However, as some of the affected titles are no longer in print or the rights have expired, consumers have been offered an exchange for a title of like-value.Impacted consumers are being asked to contact the customer support team at whv@wbd.com.Some of the hundreds of titles reportedly affected include Twilight Zone: The Movie, Rebel Without a Cause, Blade Runner (4-disc collectors edition), Veronica Mars, One Tree Hill, The Sopranos, The Powerpuff Girls: The Complete Series and more.Get our free mobile appDVDs That Sold For Shocking Amounts of MoneyThese DVD discs and box sets recently sold for hundreds of dollars eBay.Filed Under: Blu-ray, DVDCategories: DVD and Blu-ray, Longform, Movie News
    0 Comments 0 Shares
  • SCREENCRUSH.COM
    Two Franchises Collide in the Karate Kid: Legends Trailer
    The Jackie ChanKarate Kid was originally a reboot of that franchise, with a new setting and a new cast. (In China, it was even calledThe Kung Fu Dream, because there was no karate in this version.) Apart from maintaining the basic concept a troubled outsider teen learns martial arts from an old master they were totally distinct.Not anymore. InKarate Kid: Legends, Chans Mr. Han meets the most famous living alumnus from the originalKarate Kid franchise,Ralph Macchios Daniel La Russo. (Danielsmentor, Mr. Miyagi, was played by Pat Morita, who passed away in 2005.) Han asksDaniel to train one of his students for reasons the movies new trailer doesnt entirely make clear; apparently Han shares some sort of distant relationship with Miyagi. The new karate kid (Ben Wang) will learn both karateand kung fu, to help him triumph overthe franchises usual mix of bullies and tournament fighting.You can watch the movies new trailer below. It actually includes a moment where Ralph Macchio utters the sentence Lets make a karate kid. (How much do you want to bet that is exactly thephrase Sony executives said when they greenlit the film?)READ MORE: The Best Sports Movies For Kids EverIn recent years,The Karate Kid hasserved as the inspiration for the popular Netflix seriesCobra Kai, a legacyquel featuring Macchio and many other characters fromThe Karate Kid, set decades after the events of the original trilogy of movies. TheLegendstrailer only features Macchio, and it appears that he is the onlyCobra Kai(orKarate Kid) character whoreturns inthis movie, which might be a disappointment to some fans. (Maybe Sony is keeping some Cobra Kaicameos or small supporting roles secret for now.)Here is the films official synopsis:Karate Kid: Legends unites the iconic martial arts masters of one of the most beloved film franchises of all time to tell a completely new story full of action and heart. When kung fu prodigy Li Fong (Ben Wang) relocates to New York City with his mother to attend a prestigious new school, he finds solace in a new friendship with a classmate and her father. But his newfound peace is short-lived after he attracts unwanted attention from a formidable local karate champion. Driven by a desire to defend himself, Li embarks on a journey to enter the ultimate karate competition. Guided by the wisdom of his kung fu teacher, Mr. Han (Jackie Chan), and the legendary Karate Kid, Daniel LaRusso (Ralph Macchio), Li merges their unique styles to prepare for an epic martial arts showdown.Karate Kid: Legends is scheduled to open in theaters on May 30.SonySonyloading...Get our free mobile app12 Pairs of Wildly Different Movies With the Exact Same TitleYou'll be very confused if you get any of these movies mixed up.Gallery Credit: Emma Stefansky
    0 Comments 0 Shares
  • WEWORKREMOTELY.COM
    Briico: Business Success Specialist
    About The Role:Briico Business program. Youll have a big impact on a brand new, impactful, interesting program, and learn a lot of skills as you go. While some of the work will be execution oriented (sometimes repetitive), there will also be constant opportunities for creativity, engagement, technological innovation, and initiative. Specifically, some of your projects will include:Outreach to prospective participants to encourage them to apply to our program and answer questions, and provide program support. This may include sales, community-building, managing ads, and answering questions.Business Owner Support. Youll be working closely with our clients, who are new business owners from a huge range of backgrounds. This might mean offering helpful and compassionateguidance, filling out forms for a business owner, designing a new flyer in Canva, tracking down specific regulations, etc. Youll also serve as the project manager and success champion for every single participant, so youll need to be relentless in staying on top of what needs doing and moving things along in a friendly way (in collaboration with your team at Briico of course.)Content creation. Well likely have you create and edit videos (for YouTube and social media) with training and inspiration for business owners. This can involve you being on camera if youre interested in that, or can be more of back-end editing and production.Ops, AI implementation, and admin. Our program is very personal, delivered one-on-one (primarily via WhatsApp) with each person. But were building some tech magic on the back end to make it all work. Youll be in charge of implementing much of this, including setting up websites and other tech and admin jobs.Youll be a perfect fit if you are:A strong communicator. Youre a professional, warm, effective writer and communicator in person, by phone, and via email.Solutions-minded. Youre constantly looking for things that are out of place or could be improved and coming up with ideas to improve them.Self-directed. You expertly manage your own schedule and goals and are happy working remotely, on your laptop.Adaptable and coachable. You are excited to learn new skills and get better over time -- and are great at communicating with a team on successes and challenges in the work. You ask questions if you're not clear on what you need to do.Tech-savvy. You quickly and accurately use software like Google Docs, Google Sheets, Descript, AI tools like ChatGPT, and have strong research skills. You also learn new software super-easily. You are good at finding tech solutions to things and setting up elegant solutions to concrete problems using technology.Specifics:
    0 Comments 0 Shares
  • WEWORKREMOTELY.COM
    MPF Federal: Remote RN (Registered Nurse)
    MPF Federal is seeking compassionate, experienced, and tech-savvy Telehealth Triage Nurses (RNs) to join our 24/7 Nurse Advice Line working within a call center environment from home. This is a remote, work-from-home position that offers the opportunity to make a meaningful impact on the lives of military beneficiaries, including active-duty service members, veterans, and their families.COMPENSATION: $35.00/hr Differentials may apply for weekends, evenings and nights. All open shifts include weekends, and holidays which do NOT rotate. Available Schedules:S==W=FY (0800-1830) 8AM -6:30PM 10HRS==W=FY (0800-1830) 8AM -6:30PM 10HRSMT==F= (0400-1430) 4AM - 2:30PM 10HR===WRFY (0400-1430) 4AM - 2:30PM 10HR==TWRFY (0400-1230) 4AM - 12:30PM 8HR==TWRFY (0400-1230) 4AM - 12:30PM 8HRSM==RFY (1530-0000) 3:30PM - Midnight 8HRS==WRFY (1530-0000) 3:30PM - Midnight 8HRSMTW==Y (1530-0000) 3:30PM - Midnight 8HRSMTWR== (1530-0000) 3:30PM - Midnight 8HRSMT==FY (1530-0000) 3:30PM - Midnight 8HR==TWRFY (1530-0000) 3:30PM - Midnight 8HRSM==RFY (1530-0000) 3:30PM - Midnight 8HR==TWRFY (1530-0000) 3:30PM - Midnight 8HRS==WRFY (1530-0000) 3:30PM - Midnight 8HRS=T===Y (2300-1200) 11pm - Noon 12HRSM==RFY (0000-0830) Midnight - 8:30am 8HRS==WRFY (0000-0830) Midnight - 8:30am 8HRS==W==Y (0830-2100) 8:30am - 9pm 12HRSM==RFY(0600-1000) 6am-10am 6 hour break(1700-2100) 5pm-9pm 8HR (SPLIT SHIFT)Minimum of 3 years of clinical experience at the RN level required.We are looking for nurses with strong clinical backgrounds in emergency care, triage, or related specialties, who excel in rapid assessment, problem-solving, and patient education in a fast-paced, metric-driven telehealth environment.If you are a mission-driven nurse looking for a rewarding career that leverages your clinical expertise and emotional intelligence in a remote setting, we invite you to apply.Responsibilities:Triage & Assess: Evaluate patient symptoms via phone, chat, and video using evidence-based triage protocols.Provide Immediate Care Advice: Offer appropriate self-care recommendations or escalate cases for urgent intervention.Health Education & Counseling: Guide patients on medication use, medical conditions, and diagnostic tests.Crisis Management: Handle mental health, behavioral health, and emergency triage calls with empathy and precision.Documentation & Compliance: Accurately document all patient interactions in electronic health records.Collaboration: Work alongside program and project managers as well as call center management to meet tight deadlines in a metrics-based environment.Utilization & Resource Management: Navigate through and use several of the provided tech resources to gather and deliver the best advice per protocols.Work Environment & Schedule: 100% Remote, Structured Work-from-Home Position (dedicated, distraction-free workspace required). Must have a hard-wired (via ethernet cable) internet connection. Speed Test will be required as part of the hiring process. Must be available evenings, nights, weekends, and holidays. Full-time position with set schedules.RequirementsMinimum Requirements: RN with a BSN degree OR ASN if you also have completed a microbiology course with lab (proof of completion will be required). Multistate License required and must be active and unrestricted (verified via Nursys). Minimum of 3 years of clinical experience at the RN level within Emergency or Urgent Care settings. Able to work a very regimented schedule with minimal flexibility.Clinical Expertise: Additional years of nursing experience in emergency care, triage, ICU, med-surg, or urgent care is highly preferred. Previous telehealth, triage, or call center experience. Proficiency in triage protocols.Emotional Intelligence & Adaptability: Empathy & Active Listening: Ability to connect with patients over the phone, identify emotional distress, and provide compassionate care. Calm Under Pressure: Comfort handling high-volume, high-stress calls, including crisis management. Adaptability & Problem-Solving: Quick thinking in fast-changing medical situations.Technical Skills: Experience working in a metrics-driven environment (handle time, QA audits, schedule adherence). Strong computer skills: Ability to toggle between multiple screens and applications while speaking with patients. Comfortable with Microsoft Office Suite, EHR documentation, and telehealth platforms.Preferred Qualifications (Bonus Points!):Military/Veteran Healthcare Experience is highly desired.Experience in Behavioral Health, Crisis Intervention, or Substance Abuse Counseling.Licensing & Compliance: Active RN Compact License (must be in good standing). 3 years of verifiable registered nursing experience required. Ability to obtain licensure in all 50 states (we assist with this process). Must be a U.S. Citizen (Federal Public Trust Clearance required). Background Check & Drug Screening Required (as per federal regulations).Physical and Mental DemandsWork assigned shift, occasional overtime may be required dependent on business needRemain in a stationary position, often standing or sitting, for prolonged periodsProlonged use of employer provided office equipment such as a computer/laptop and monitor computer screensDexterity of hands and fingers to operate a computer keyboard, mouse, and other computer componentsUnauthorized peripheral equipment (e.g. monitor, keyboard, mouse) may not be connected to employer provided equipmentBenefitsMPF Federal is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status or on the basis of disability. We offer a competitive compensation package including a competitive salary, medical benefits, PTO, holiday pay and more.Apply NowLet's start your dream job Apply now
    0 Comments 0 Shares
CGShares https://cgshares.com