Toggle light / dark theme

How do I make clear ice at home? A food scientist shares easy tips

When you splurge on a cocktail in a bar, the drink often comes with a slab of aesthetically pleasing, perfectly clear ice. The stuff looks much fancier than the slightly cloudy ice you get from your home freezer. How do they do this?

Clear ice is actually made from regular water—what’s different is the freezing process.

With a little help from science, you can make clear ice at home, and it’s not even that tricky. However, there are quite a few hacks on the internet that won’t work. Let’s dive into the physics and chemistry involved.

Hacker arrested for KMSAuto malware campaign with 2.8 million downloads

A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing malware disguised as the KMSAuto tool for illegally activating Windows and Office software.

The 29-year-old man was extradited from Georgia to South Korea following a related request under Interpol’s coordination.

According to the Korean National Police Agency, the suspect used KMSAuto to lure victims into downloading a malicious executable that scanned the clipboard for cryptocurrency addresses and replaced them with ones controlled by the attacker — known as ‘clipper malware’

Romanian energy provider hit by Gentlemen ransomware attack

A ransomware attack hit Oltenia Energy Complex (Complexul Energetic Oltenia), Romania’s largest coal-based energy producer, on the second day of Christmas, taking down its IT infrastructure.

The 40-year-old Romanian energy provider employs over 19,000 people, operates four power plants with an installed production capacity of 3,900 MWh, and provides about 30% of Romania’s electricity.

“As a result of the attack, some documents and files were encrypted, and several computer applications became temporarily unavailable, including ERP systems, document management applications, the company’s email service, and website,” it said over the weekend.

Quantum global race: “The word ‘secret’ no longer exists”

Please see this news story on a remarkable new technological cybersecurity breakthrough for mitigating the threats of Q-Day and AI:

#cybersecurity #quantum #tech


The next leap in technology: a quantum computer unlike anything humanity has seen, capable of breaking all encryption and challenging the most crucial national security defenses.
Tal Shenhav from i24NEWS Hebrew channel has the story.

Hacker claims to leak WIRED database with 2.3 million records

A hacker claims to have breached Condé Nast and leaked an alleged WIRED database containing more than 2.3 million subscriber records, while also warning that they plan to release up to 40 million additional records for other Condé Nast properties.

On December 20, a threat actor using the name “Lovely” leaked the database on a hacking forum, offering access for approximately $2.30 in the site’s credits system. In the post, Lovely accused Condé Nast of ignoring vulnerability reports and claimed the company failed to take security seriously.

“Condé Nast does not care about the security of their users’ data. It took us an entire month to convince them to fix the vulnerabilities on their websites,” reads a post on a hacking forum.

Ancient Priests Hacked Consciousness With Sound

Let’s travel back in time. We are in Malta, deep beneath the earth, inside a chamber, where the only light is that of torches. We hear a low hum that reverberates through the stone walls. A priestess enters, chanting a mantra, resonating within the walls, and her voice echoes with unparallel precision, while rhythmic drumbeats pulse like a heartbeat. The participants are entranced, they feel their minds slip from this mundane world into realms of heightened awareness. Suddenly, visions of spirits, out-of-body journeys, and profound insights interfere with the very nature of reality. Do you think this is fantasy? Absolutely not. This is the essence of the ancient rituals where sound and vibration served as gateways to altered states of consciousness. As we go deep into the mysteries of sacred sounds, we will uncover how mantras and drums were instruments of rebellion against the illusions of the material world, where mystics challenged the tyrannical grip of false gods through transcendent practices.

In this fascinating exploration, we will travel through time and cultures, and we will examine the scientific and spiritual foundations of these auditory phenomena. We will move from the shamanic drums of indigenous tribes to the mantras of the Vedic sages and the hymnic invocations of ancient Greece. And we will find a common thread: the “sound”. The universal key to unlocking the mind’s hidden potentials. We’ll also venture into archaeoacoustics, the study of sound in ancient sites, and connect these old practices to modern research on binaural beats, revealing how vibration continues to bridge the ancient and the contemporary in our quest for cosmic liberation. And as usual, we keep reinventing ancient knowledge of thousands of years before us.

Technological Disruption: Strategic Inflection Points From 2026

By Chuck Brooks


Quantum Computing and the Dismantling of Cryptographic Foundations Quantum technology may be the most transformative long-term influence on the horizon. Although large-scale, fault-tolerant quantum computers may remain years from realization, their expected influence is already transforming cybersecurity strategies. As quantum technology advances, the risk of “harvest now, decrypt later” assaults suggests that today’s encrypted sensitive data could become vulnerable in the future.

From 2026 to 2030, enterprises will increasingly recognize that cryptographic agility is vital. The move to post-quantum cryptography standards means that old systems, especially those in critical infrastructure, financial services, and government networks, need to be fully inventoried, evaluated, and upgraded.

Fake MAS Windows activation domain used to spread PowerShell malware

A typosquatted domain impersonating the Microsoft Activation Scripts (MAS) tool was used to distribute malicious PowerShell scripts that infect Windows systems with the ‘Cosmali Loader’

BleepingComputer has found that multiple MAS users began reporting on Reddit [1, 2] yesterday that they received pop-up warnings on their systems about a Cosmali Loader infection.

You have been infected by a malware called ‘cosmali loader’ because you mistyped ‘get.activated.win’ as ‘get.activate[.]win’ when activating Windows in PowerShell.

/* */