April 18, 2018

The health benefits of this organic product

Long before the wide availability of sugar in the 16th century, honey has already been valued as a natural sweetener.
Known as the liquid gold to some, honey has been found to contain a rich hidden nutritional and medicinal value for centuries.
This God-given gift has been used since the early days of Egyptian tombs, is loaded with antibacterial and antifungal properties.
As a matter of historical fact, honey production did flourish in ancient Greece and Sicily.
Suprisinglingly, Zoologists have said that animals like bears, badgers, and more-- have long raided honeybee hives, risking stings for the sweet reward.
How else can the importance of this remarkable substance be shown? Read on to see some importance and health benefits of honey
1. Honey is a memory booster
Naturally, the older we get as humans, the likelihood of the setting in of dementia. And this likelihood continues to get higher and higher because of our poor intake of vitamins and minerals.
However, with the use of honey, the body is helped to absorb calcium, which in return promotes the healthiness of the brain.
Also, the excess antioxidants in the nectar may help prevent cellular damage and loss within the brain.
2. It is a source of natural energy
Undoubtedly, the best recipe for boundless energy, is a healthy whole-food diet and proper sleep. But for a quick energy booster, honey can suffice.
Raw honey has been shown to contain natural sugars (80 percent), water (18 percent), and minerals, vitamins, pollen and protein (2 percent).
Thus making it the perfect agent of energy booster: Little wonder it is called “the perfect running fuel.”
In addition, honey provides an easily absorbed supply of energy in the form of liver glycogen, making it ideal for energetic morning starts and as a pre- and post-exercise energy source.
3. Honey is an antioxidant powerhouse
Scientific studies have shown that the level of health-promoting antioxidants in the body can be raised by a daily dose of raw honey.
Antioxidants do not only help block free radicals in the body that cause disease, it also boosts the immune system, acting as a preventative against any number of debilitating diseases.
In addition, honey contains polyphenols, which are powerful antioxidants that help fight the risk of heart disease and cancer.
4. Honey suppresses cough
According to 2012 study published in the journal Pediatrics, a persistent cough can suppress with few spoons of natural honey. And when it comes to matters concerning cold, honey is all natural cure.
The thick liquid of honey helps coat the throat, while the sweet taste is believed to trigger nerve endings that protect the throat from incessant coughing.
As a matter of fact, it has been observed that children between the ages of 1 and 5 with a nighttime cough due to colds, coughed less frequently when they received two teaspoons of honey 30 minutes before bed.
5. It helps in the treatment of wounds and burns
As a natural antibiotic, honey has the capability of acting both internally and externally. It is a perfect agent for the treatment of wounds and burns by disinfecting wounds and sores from major species of bacteria such as methicillin-resistant Staphylococcus aureus (MRSA).
A 2005 study published in the British Journal of Surgery Found all but one of patients who suffered from wounds and leg ulcers showed remarkable improvement after applying a topical application of honey.
In conclusion, it should be made known that there are other incredible health benefits of honey. If we are to go on it them, the list will be endless.
However, what is more, important is the awareness that honey is truly a remarkable substance, made even more extraordinary by the process with which it is made.
This blend of sugar, trace enzymes, minerals, vitamins, and amino acids is quite unlike any other sweetener on the planet.

MakeupShayla comes through with a Beyonce Coachella

Over the weekend, Beyonce shut down Coachella » with the performance of a lifetime and those of you lucky enough to bear witness to the Beyonce performance that rocked the first weekend of Coachella, we envy you. However, if you want to recreate a piece of music history, MakeupShayla has you covered with a Beyonce Coachella make-up tutorial.
Beyonce even reunited with Destiny’s Child members
Michelle Williams and Kelly Rowland for a special performance. The full Beyoncé Coachella performance was everything the world dreamt it would be and more » .
The production was like a high school football game halftime show starring the coolest girl in school » . The entire show was brilliantly choreographed, packed with incredible renditions of classic Bey tracks, six costume changes » , and even a nail polish change.
Take a look at Shayla 's video below so you can get in on the Queen B action!

How to blend your eyeshadow

amateurs. Between all the blending and techniques, it's easy to get confused but fear not, when it comes to getting your eyeshadow looking just right » , these
easy tips will have you blending like a pro » .
1. Prime for success.
If you're going to take the time out of your busy day to blend your shadow to perfection, you might as well smooth some eye shadow primer onto your lids to keep everything in place. Keep it closer to the lash line and fade it as you go upward so you have more flexibility to blend in the crease area. Then, let it dry for at least 10 seconds before moving on to the main event.
2. Pick your tools.
Depending on which makeup artist you ask, you're going to get a different answer for what the best blending brush is. Regardless, flawless eye shadow blending is all about brushes. You have to have the right tools for the job. You can never have enough blending brushes, but two is good to start with.
3. Start light.
First, taking the brush with densely packed bristles, you want to apply the lightest shade you plan to use on the inner half of your lids; then you can add darker shades of the same hue as you move toward the outer corners. Using the light as a transition colour, you can add dimension as you go with the darker colours and tones and blend, blend, blend.
4. Put it all into motion.
After laying down the lightest colour, you'll want to pause to do the actual blending before moving to the next shade. Sweep one of your clean blending brushes in a windshield-wiper-like motion along the creases to soften the edges and diffuse the hue. If you're using more than two shades on your lids, you will repeat this step with every colour you lay down on your lids.
After you apply your darkest shade to the outer half of your lids, you'll want to use a different blending technique. Swirl your second clean blending brush in small circles along the outer corners, running the brush in a V shape along your creases and top lash lines.
Pro tip on how to hold your brush while doing all this: The closer your fingers are to the brush hairs, the harder the application will be so relax, move your fingers further up the brush and make gentle sweeping motions, especially when working with darker colours.
5. Clean up mistakes.
Now that everything is seamlessly blended, you might notice that you got a little carried away and pulled the shadow out too far from the outer corners or have created a weird-looking shape. Touch up edges and buff away these mistakes with a damp Beautyblender.
You can also use translucent powder like a magic eraser.
Popular Nigerian beauty influencer, Dimma Umeh , shows you all the eyeshadow do's and dont's so you can step your eyeshadow game up to the next level.

Palm Kernel Oil The health benefits of this organic

The palm tree is arguably the richest tree on earth when it comes to natural endowments. It is blessed with a lot of priceless resources, which among them is the palm kernel oil.
Palm kernel oil is extracted from palm fruit. It is dark black in colour and distinguishes itself with a unique strong taste and smell.
Popular for its healing properties across the southern and eastern part of Nigeria, palm kernel is known to offer numerous health benefits that help prevents and heal life-threatening illnesses.
It is also useful for cooking as it is free of cholesterol. As a matter of fact, medical practitioners do advise people suffering from heart problems and high cholesterol level to make use of palm kernel oil when cooking because it is more beneficial to their health.
According to recent studies, the dark black oil is primarily composed of fatty triglycerides, with approximately 80 percent saturated fats and 20 percent unsaturated fats. And it can be found in a number of products, including margarine, vegetable oil, and shortening, creamers, chocolate and ice cream.
Here are seven priceless health benefits of palm kernel oil
1. It is a great remedy for epilepsy
Alternative medicine has shown that palm kernel oil is a wonderful solution when it comes to treating convulsion in kids. Its healing properties help combats the effect of epilepsy attack, as well as offering great relief.
2. Palm kernel oil helps prevent aging
Palm kernel oil is a rich antioxidants agent that contains vitamin E. And vitamin E, coupled with the antioxidants properties in it, help prevent the signs and symptoms of aging.
Observation has also shown that the use of palm kernel oil does not only prevent fine lines, it helps delay sagging and wrinkled skin. And according to research findings, palm kernel oil offers protection from the adverse effects of UV rays and several other toxic substances.
3. Palm kernel oil increases hair growth
Palm kernel oil has not only shown amazing results, in terms of growth, when applied to the hair, it also encourages thicker hair as well as preventing hair fall.
In addition, palm kernel oil nourishes the hair and makes it stronger than usual as a result of the conditioning it provides.
4. It helps to detoxify the body
Palm kernel oil does not only remove toxins from the body, it also purifies every cell of the body as well as rejuvenating them.
5. It helps in softening the skin
Apart from being an anti-aging agent, palm kernel oil also helps in making the skin soft without the skin getting greasy in appearance.
This is why most soap and cream industry have continued to make use of its oil as ingredients when producing their products.
Providing comprehensive benefits that are often overlooked, palm kernel oil helps in combating itchy skin, as well as providing relief to ragged cuticles.
6. It helps in controlling blood pressure
Studies have shown that also helps control the free flow of blood from the heart to other organs of the body. And by so doing, it helps in keeping the blood pressure under control, thereby preventing the risk of hypertension.
7. It tackles body odor
Owing to its unique strong smell, palm kernel oil helps tackle body odor when it is applied to the skin on a regular basis.

Intel Processors Now Allows Antivirus to Use Built-in GPUs .

Global chip-maker Intel on Tuesday announced two new technologies—Threat Detection Technology (TDT) and Security Essentials—that not only offer hardware-based built-in security features across Intel processors but also improve threat detection without compromising system performance.
Intel's Threat Detection Technology (TDT) offers a new set of features that leverage hardware-level telemetry to help security products detect new classes of threats and exploits.
It includes two main capabilities—Accelerated Memory Scanning and Advanced Platform Telemetry.
Accelerated Memory Scanning allows antivirus programs to use Intel's integrated GPU to scan and detect memory-based malware attacks while reducing the impact on performance and power consumption.
"Current scanning technologies can detect system memory-based cyber-attacks, but at the cost of CPU performance," says Rick Echevarria, Intel security division Vice President.
"With Accelerated Memory Scanning, the scanning is handled by Intel's integrated graphics processor, enabling more scanning, while reducing the impact on performance and power consumption."
According to Intel, early tests using the new GPU-accelerated scanning technique suggest that CPU utilization for malware threat scans "dropped from 20 percent to as little as 2 percent"—that's obviously a massive increase in efficiency.
The other TDT feature is Intel Advanced Platform Telemetry that incorporates cloud-based machine learning and endpoint data collection to better identify potential security threats, "while reducing false positives and minimizing performance impact."
Intel's new Thread Detection Technology solution will be available for computers with 6th, 7th, and 8th generation Intel processors, though it's up to third-party antivirus vendors to actually utilize the feature.
Microsoft and Cisco are the first ones to make use of Intel's Threat Detection Technology (TDT), with the Intel TDT coming to Windows Defender Advanced Protection Threat (ATP) this month.
The second security solution launched by the chip maker is Intel Security Essentials—a built-in toolkit which includes a bunch of different hardware-based security features available across Intel Core, Xeon, and Atom processors.
Intel Security Essentials has following properties that offer a chain of trust to protect against a wide range of attacks:
Hardware Root of Trust—Cryptographic keys protected by hardware
Small Trusted Computing Base—Protecting keys, IDs, and data using hardware trusted platform module (TPM)
Defence in Depth—Hardware and software protection
Compartmentalization—Hardware-enforced barriers between software components
Direct Anonymous Authentication—Cryptographic schemes to offer anonymous authentication of a device for privacy (especially for IoT devices)
HW Security escalation—Enabling hardware acceleration of cryptographic calculation, antivirus scanning, and key generation
The announcement comes after serious security vulnerabilities— Meltdown and Spectre —badly hit Intel CPUs and chips from other companies earlier this year, and the security patches rolled out by the companies increased load for the CPU, affecting device performance.

Here's How Hackers Infected 2.3 Million PCs

Last year, the popular system cleanup software CCleaner suffered a massive supply-chain malware attack of all times, wherein hackers compromised the company's servers for more than a month and replaced the original version of the software with the malicious one.
The malware attack infected over 2.3 million users who downloaded or updated their CCleaner app between August and September last year from the official website with the backdoored version of the software.

Now, it turns out that the hackers managed to infiltrate the company's network almost five months before they first replaced the official CCleaner build with the backdoored version, revealed Avast executive VP and CTO Ondrej Vlcek at the RSA security conference in San Francisco on Tuesday.
6-Months Timeline of CCleaner Supply Chain Attack
Vlcek shared a brief timeline of the last year's incident that came out to be the worst nightmare for the company, detailing how and when unknown hackers breached Piriform, the company that created CCleaner and was acquired by Avast in July 2017.
March 11, 2017 (5 AM local time)—Attackers first accessed an unattended workstation of one of the CCleaner developers, which was connected to Piriform network, using remote support software TeamViewer.
The company believes attackers reused the developer's credentials obtained from previous data breaches to access the TeamViewer account and managed to install malware using VBScript on the third attempt.
March 12, 2017 (4 AM local time)—Using the first machine, attackers penetrated into the second unattended computer connected to the same network and opened a backdoor through Windows RDP (Remote Desktop Service) protocol.
Using RDP access, the attackers dropped a binary and a malicious payload—a second stage malware (older version) that was later delivered to 40 CCleaner users —on the target computer's registry.
March 14, 2017—Attackers infected the first computer with the older version of the second stage malware as well.
April 4, 2017—Attackers compiled a customised version of ShadowPad, an infamous backdoor that allows attackers to download further malicious modules or steal data, and this payload the company believes was the third stage of the CCleaner attack.
April 12, 2017—A few days later, attackers installed the 3rd stage payload on four computers in the Piriform network (as a mscoree.dll library) and a build server (as a .NET runtime library).
Between mid-April and July—During this period, the attackers prepared the malicious version of CCleaner, and tried to infiltrate other computers in the internal network by installing a keylogger on already compromised systems to steal credentials, and logging in with administrative privileges through RDP.
July 18, 2017—Security company Avast acquired Piriform, the UK-based software development company behind CCleaner with more than 2 billion downloads.
August 2, 2017—Attackers replaced the original version of CCleaner software from its official website with their backdoored version of CCleaner, which was distributed to millions of users.
September 13, 2017—Researchers at Cisco Talos
detected the malicious version of the software , which was being distributed through the company's official website for more than a month, and notified Avast immediately.
The malicious version of CCleaner had a multi-stage malware payload designed to steal data from infected computers and send it back to an attacker-controlled command-and-control server.
Although Avast, with the help of the FBI, was able to shut down the attackers' command-and-control server within three days of being notified of the incident, the malicious CCleaner software had already been downloaded by 2.27 million users.
Moreover, it was found that the attackers were then able to install a second-stage payload on 40 selected computers operated by major international technology companies, including Google, Microsoft, Cisco, Intel, Samsung, Sony, HTC, Linksys, D-Link, Akamai and VMware.
However, the company has no proofs if the third stage payload with ShadowPad was distributed to any of these targets.
"Our investigation revealed that ShadowPad had been previously used in South Korea, and in Russia, where attackers intruded a computer, observing a money transfer." Avast said.
"The oldest malicious executable used in the Russian attack was built in 2014, which means the group behind it might have been spying for years."
Based on their analysis of the ShadowPad executable from the Piriform network, Avast believes that the malicious attackers behind the malware have been active for a long time, spying on institutions and organizations so thoroughly.

Hackers Exploiting Drupal Vulnerability to Inject Cryptocurrenc

The Drupal vulnerability (CVE-2018-7600), dubbed
Drupalgeddon2 that could allow attackers to completely take over vulnerable websites has now been exploited in the wild to deliver malware backdoors and cryptocurrency miners.
Drupalgeddon2, a highly critical remote code execution vulnerability discovered two weeks ago in Drupal content management system software, was recently patched by the company without releasing its technical details.
However, just a day after security researchers at Check Point and Dofinity published complete details, a Drupalgeddon2 proof-of-concept (PoC) exploit code was made widely available, and large-scale Internet scanning and exploitation attempts followed.
At the time, no incident of targets being hacked was reported, but over the weekend, several security firms noticed that attackers have now started exploiting the vulnerability to install cryptocurrency miner and other malware on vulnerable websites.
The SANS Internet Storm Center spotted some attacks to deliver a cryptocurrency miner, a PHP backdoor, and an IRC bot written in Perl.
The simple PHP backdoor allows attackers to upload additional files (backdoors) to the targeted server.
A thread on SANS ISC Infosec forums also suggests that Drupalgeddon2 is being used to install the XMRig Monero miner on vulnerable websites. Besides the actual XMRig miner, the malicious script also downloads additional files, including a script to kill competing miners on the targeted system.
Researchers from security firm Volexity have also
observed a wide variety of actions and payloads attempted via the public exploit for Drupalgeddon2 to deliver malicious scripts that install backdoors and cryptocurrency miners on the vulnerable sites.
The researchers believed that one of the Monero miner campaigns, delivering XMRig, is associated with a criminal group that exploited the vulnerability (CVE-2017-10271) in Oracle WebLogic servers to deliver cryptocurrency miner malware shortly after its PoC exploit code was made public in late 2017.
Volexity identified some of the group's wallets that had stored a total of 544.74 XMR (Monero coin), which is equivalent to almost $105,567.
As we reported in our previous article, Imperva stats
showed that 90% of the Drupalgeddon2 attacks are simply IP scanning in an attempt to find vulnerable systems, 3% are backdoor infection attempts, and 2% are attempting to run crypto miners on the targets.
For those unaware, Drupalgeddon2 allows an unauthenticated, remote attacker to execute malicious code on default or common Drupal installations under the privileges of the user, affecting all versions of Drupal from 6 to 8.
Therefore, site admins were highly recommended to patch the issue by updating their CMS to Drupal 7.58 or Drupal 8.5.1 as soon as possible.
In its advisory, Drupal warned that "sites not patched by Wednesday, 2018-04-11 may be compromised" and "simply updating Drupal will not remove backdoors or fix compromised sites."
Moreover,
"If you find that your site is already patched, but you didn’t do it, that can be a symptom that the site was compromised. Some attacks in the past have applied the patch as a way to guarantee that only that attacker is in control of the site."
Here's a guide Drupal team suggest to follow if your website has been hacked .


Suspected 'Big Bitcoin Heist' Mastermind Fled to Sweden.

Remember the "Big bitcoin heist " we reported last month when a group of thieves stole around 600 powerful bitcoin mining devices from Icelandic data centers?
Icelandic Police had arrested 11 suspects as part of the investigation, one of which has escaped from prison and fled to Sweden on a passenger plane reportedly also carrying the Icelandic prime minister Katrin Jakobsdottir.
Sindri Thor Stefansson, who is suspected of masterminding the whole theft of almost $2 million worth of cryptocurrency-mining equipment, traveled under a passport of someone else but identified through surveillance footage.

Stefansson had recently been transferred to a low-security Sogn prison, located in rural southern Iceland (just 59 miles away from Iceland's international airport in Keflavik), from where he escaped through a window early Tuesday and boarded the flight to Sweden.
Prime minister Jakobsdottir was on her way to Sweden to take part in India-Nordic Summit and meet Indian Prime Minister Narendra Modi on Tuesday in Stockholm.
It appears Stefansson has managed to hide himself in Sweden, as Swedish police say no arrest has been made in the country after being briefed by Icelandic police on the situation.
Icelandic police have issued an international arrest warrant for Stefansson.
The stolen cryptocurrency-mining devices are still missing, and Icelandic police are monitoring high-energy consumption area across the nation in an attempt to locate the missing equipment.
According to the authorities, Guards at the prison did not report Stefansson missing until after the flight to Sweden had taken off.
"He had an accomplice. We are sure of that," Police Chief Gunnar Schram told online news outlet Visir .
The theft, which the law enforcement said is one of the biggest series of robberies Iceland has ever experienced, took place between late December and early January, while the arrests of 11 people were made in February.
Besides 600 bitcoin mining devices, the theft also included burglary of 600 graphics cards, 100 processors, 100 power supplies, 100 motherboards and 100 sets of computer memory.
Shortly after the arrest, the Reykjanes District Court expressed restraint and released nine people on bail, leaving only two people under arrest, which included the alleged incident's mastermind Stefansson.


Critical Unpatched RCE Flaw Disclosed in LG Network.

If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this article carefully and then take appropriate action to protect your sensitive data.
A security researcher has revealed complete technical details of an unpatched critical remote command execution vulnerability in various LG NAS device models that could let attackers compromise vulnerable devices and steal data stored on them.
LG's Network Attached Storage (NAS) device is a dedicated file storage unit connected to a network that allows users to store and share data with multiple computers. Authorized users can also access their data remotely over the Internet.

The vulnerability has been discovered by the researcher at privacy advocate firm VPN Mentor, the same company that last month revealed severe flaws in three popular VPNs—HotSpot Shield, PureVPN, and Zenmate.
The LG NAS flaw is a pre-authenticated remote command injection vulnerability, which resides due to improper validation of the "password" parameter of the user login page for remote management, allowing remote attackers to pass arbitrary system commands through the password field.
As demonstrated by the researchers in the following video, attackers can exploit this vulnerability to first write a simple persistent shell on the vulnerable storage devices connected to the internet.
Using that shell, attackers can then execute more commands easily, one of which could also allow them to download the complete database of NAS devices, including users’ emails, usernames and MD5 hashed passwords.
Since passwords protected with MD5 cryptographic hash function can easily be cracked, attackers can gain authorized access and steal users sensitive data stored on the vulnerable devices.
In case, attackers don't want to crack the stolen password, they can simply run another command, as shown, to add a new user to the device, and log-in with that credentials to get the job done.
To add a new user to the database, all an attacker needs to do is generate a valid MD5. "We can use the included MD5 tool to create a hash with the username test and the password 1234," the researchers say.
Since LG has not yet released a fix for the issue, users of LG NAS devices are advised to ensure that their devices are not accessible via the public Internet and should be protected behind a firewall configured to allow only a trusted set of IPs to connect to the web interface.
Users are also recommended to periodically look out for any suspicious activity by checking all registered usernames and passwords on their devices.

April 17, 2018

Natural Skincare Why you and your skin will love

The importance of skincare can never be overstated. Taking care of your skin is the gift that keeps on giving and its important to know the natural skincare brands that aim to keep you glowing. Arami Essentials has built quite the following on social media and attracted rave reviews from customers. Here's why you and your skin will love Arami.
First of all, Arami looks the part. The brand's minimalist packaging looks so luxe and inviting. Their Instagram page makes you want to take the day off, relax and pamper yourself silly and Arami gives the air of absolute self-care, what more could you want?!
According to their website:
Arami was created to provide natural beauty essentials for a simple, fuss-free routine . Our company was founded on two major beliefs -your skin doesn’t need complex products to thrive and natural ingredients are best.
We are based in Nigeria, which is home to a lot of raw ingredients used in beauty products around the world. One of the key priorities of our business is to be a platform, boosting awareness around locally sourced ingredients such as Shea Butter and African Black Soap.
As a high number of our ingredients are sourced in Nigeriaand involve a high number of women processors, we are committed to giving love and encouraging self care for women at the Grassroots.
Their extensive range has something for every skincare issue from hyperpigmentation to dull and dry skin. Reviews state that their body scrubs, polishes and oils work brilliantly and are a must-have for every skincare enthusiast.
Their best selling product, their 'Glow Oil' is a 100% pure, cold-pressed shea nut oil which you can use daily for glowing skin and hair. For an even better smelling experience, get the Glow Oil infused with Sweet Oud for a rich and long-lasting fragrance.
Arami Essentials is everything that a good skincare brand should be, it's natural, effective and oh-so indulgent. We cannot get enough!

The health benefits of walking barefoot 

"Forget not that the earth delights to feel your bare feet and the winds long to play with your hair."
- Khalil Gibran
The importance of walking barefoot, sometimes, cannot be overemphasized, because making an effort to spend more time barefoot in nature can provide the human body with some incredible health benefit.
As a matter of fact, studies have shown that walking with your feet, directly touching the soil, allows your body to absorb negative electrons through the Earth, which helps to stabilize daily cortisol rhythm and create a balanced internal bioelectrical environment.
In other words, the negative ions present in the earth can help balance the positive ions in our body (if we allow contact). And when this happens, it improves our health in many ways.
Here are five health benefits of walking barefoot
1. It controls insomnia
A study in PubMed revealed that walking barefoot influences physiologic processes as well as inducing relaxation. It has also been shown that people who had been exposed to grounding have better sleep at night when compared with those who did not walk barefoot regularly.
The reason for this is because walking barefoot helps stabilize circadian rhythms, which is the first step to better sleep; as it is the internal system that's designed to regulate feelings of sleepiness and wakefulness over a 24-hour period.
2. It controls blood pressure
Recent studies have shown that the nerves of the feet are stimulated when we walk barefoot. And this usually leads to the reduction of stress levels. However, since stress is released through earthing, which is also known as walking barefoot, it helps in controlling the blood pressure.
3. It boosts energy level
Every lover nature knows that there is a higher energy in nature. This is why whenever you immerse yourself in the natural world, you pick up on the higher frequencies emitted from nature and therefore increase your own energy levels.
However, with our vitality constantly affected by modern society, it advisable for us to make out time to walk barefoot as often as we can.
4. It helps to reduce chronic pain
Alternative medicine practitioners affirm that the electrons present in the earth help enrich the immune system in our body. And this claim is backed by the findings of a recent study.
In addition to enriching the immune system, earthing increases the oxygen levels of the body and thus, helps reduce chronic or acute pain in our body.
5. It improves overall posture
A recent study has shown that shoes are having a negative effect on our feet. Our foot muscles are weaker than ever because of shoes and soft surfaces that don’t cause our feet to be flexible and strong like they once were.
This is one of the reasons bad posture because we become reliant upon other muscles to do the job our feet are responsible for doing.
Our weak feet can lead to a bad posture which can lead to back pain, neck pain, even knee pain which is actually often caused by shoes that misplace your postural alignment.

Eye Colour Change Here are the possible causes 

Ever notice how a baby's eyes sparkle, as does its skin?
Well, the ever-enlarging database of science has added to its collection the reason why this glow soon fades as the baby grows up.
The low level of melanin in a baby is the cause; consequently, when a child starts growing, chances are the child will be exposed to sunlight, which enlarges the melanin levels in the body.
Thus changing the colour of the body parts, including the eyes.
With this in mind, it becomes easy to understand that the longer your eyes are exposed to light, the more melanin pigments your irises produced.
However, it is important to note that genetics is also a major factor in influencing the skin, eye, and hair color.
So regardless of how much or little light exposure you have, your genes determine how light or dark is the nature of your eye colour.
Causes of eye colour change
1. Sun exposure
As previously mentioned, exposure to light causes your body to produce more melanin.
Even if your eye colour has set, there is every possibility for further change upon exposure to more sunlight. And this could lead to a darker shade of brown, blue, green, or gray, depending on your current eye colour.
Sunlight can also reveal colours that were already in your eyes. And since natural sunlight is often brighter than artificial lights, exposure to it might allow you to see colors in your irises that you couldn't recognize before.
2. Changes in pupil size
As unbelievable as it sounds, our pupils’ size can also cause our eyes to change colour. When your pupils shrink or dilate, the colour of your eyes may seem to change.
For example, if your pupils widen, not as much of your irises are exposed, and the remaining irises will look darker.
3. Heterochromia
You know there's a possibility that you've developed heterochromia, which is a rare condition, when your eyes changes colour significantly.
Nevertheless, heterochromia refers to a condition where each iris has a different color.
While partial heterochromia is said to be happening when parts of your irises have different colours. One corner might look green while the rest of the iris looks blue.
Also included is central heterochromia, which refers to a condition where your iris has two different colored rings.
However, you can acquire heterochromia as an adult from:
Eye surgery
Eye bleeding
Eye swelling
Eye injury
4.Glaucoma
5. Tumors in the iris
However, studies have shown that some of these causes can have adverse effects on your ocular and overall health.
If you've noticed a drastic change in your eye color as an adult, you may need to see an ophthalmologist or optometrist to rule out any possible health risks.
Be that as it may, it is important to note that a variety of external factors, combined with your genetics, are what determines the colour of your eye at any point in time.
And unless you've noticed a drastic sudden change in your eye colour, you have no need to worry. But in cases where the eye colour changes drastically and suddenly, it could be a sign of a serious illness.

The health benefits of this plant will amaze you.

Known to mankind since ancient times as a great source of good health, recent studies have shown that tomatoes are very rich in antioxidants that are effective against many diseases, especially cancer.
They also contain an impressive amount of nutrients and vitamins, which include vitamin A, vitamin C, and vitamin K, as well as, significant amounts of vitamin B6, folate, and thiamine.
In addition, tomatoes are an excellent source of potassium, manganese, magnesium, phosphorus, and copper. They also have dietary fiber and protein.
However, with the health benefits of this red plant ranging from skin maintenance to the prevention of cancer, it is, therefore, important to emphasise here that the more the proportion of plant foods in the diet increases, the more the risk of developing heart disease, diabetes, cancer decreases and other life-threatening illness decreases.
Here are some surprising health benefits of tomatoes
1. Tomatoes help in lowering hypertension
With an impressive level of potassium found in tomatoes, medical practitioners have advised that eating at least one tomato a day helps reduce the risk of developing high blood pressure, which is also known as hypertension.
This is because potassium as a vasodilator reduces the tension in blood vessels and arteries. And as a result, blood circulation is not only increased, hypertension is also eliminated by lowering the stress on the heart.
2. Tomatoes are great for the skin
Studies have shown that tomatoes contain a high-level lycopene. And lycopene is a bright red carotene and carotenoid pigment and phytochemical found in tomatoes and other red fruits and vegetables, such as red carrots, watermelons, gac, and papayas.
The substance has been found to be used in some of the most expensive face cleaner sold around the world.
However, according to skin experts, you’ll need about eight to twelve tomatoes if you intend to try tomatoes for skin care.
All you need do is peel the tomatoes and then place the skin on your face with the inside of the tomato touching your skin and leave them on your face for at least ten minutes before washing off.
5 amazing beauty benefits of pawpaw, and how to use it »
3. Tomatoes repair damages caused by smoking
Every Dick and Harry knows how harmful cigarette smoking is to the human body. Such is the danger it initiates that it cannot be overemphasized.
So, my advice is if you smoke cigarette, you should find a way to make tomatoes your favourite vegetable. In other words, it should be added to food on a daily basis.
Of course, eating tomatoes won’t help you quit smoking, instead, they help repair the damage caused by smoking, because they contain coumaric acid and chlorogenic acid that work to protect the body from carcinogens that are produced from cigarette smoke.
4. Tomatoes help to prevent urinary tract infection
Studies have shown that continuous intake of tomatoes helps to prevent urinary tract infection, as well as bladder cancer.
Tomatoes are diuretic in nature; they stimulate urination because they are high in water content. And owing to this, they help in facilitating the elimination of toxins from the body, as well as excess water, uric acid, salt, etc.
5. Tomatoes help to prevent cancer
The high levels of lycopene that is present on tomatoes do not only help in beautifying in the skin, numerous studies have shown that they also work to prevent prostate, colorectal and stomach cancer.
Naturally, lycopene is an antioxidant that works effectively to slow the growth of cancerous cells. And it is important to note that cooked tomatoes produce even more lycopene, but not overcooked.

Death risk increased with two blood pressure.

High blood pressure, or hypertension, is a major risk factor for heart disease, the leading cause of death in the United States. But a new study has found that two classes of medication that are commonly used to lower blood pressure could present a death risk all
on their own.

Researchers have identifIed two blood pressure drugs that could raise mortality risk.
Scientists at the Intermountain Medical Center Heart Institute in Salt Lake City, UT, found that individuals with hypertension who used alpha blockers and alpha-2 agonists to control their blood pressure showed an increase in blood pressure variability, which could increase mortality risk.
Lead study author Dr. Brian Clements and team have recently presented their findings at the 2018 American College of Cardiology (ACC) Scientific Sessions , held in Orlando, FL.
Blood pressure is the force of blood that pushes against the wall of the arteries. And, in November last year, the American Heart Association (AHA) and the ACC set new guidelines .
Now, a person is considered to have hypertension if their systolic blood pressure (the top number) is 130 millimeters of mercury (mmHg) or higher, and their diastolic blood pressure (the bottom number) is 80 mmHg or higher.
Systolic blood pressure is the force of blood against the artery walls when the heart is beating, while diastolic blood pressure is the force of blood when the heart is at rest, or between heartbeats.
The updated guidelines mean that almost half of adults in the United States have high blood pressure, which puts them at greater risk of heart attack, stroke, and heart disease, among other health problems.
Of course, when it comes to treating hypertension, the goal is to lower blood pressure. This may be achieved through lifestyle changes — such as adopting a healthful diet and increasing physical activity — medication, or both.
Previous research, however, has discovered that consistency is key for blood pressure levels. A study published in The BMJ in 2016, for example, associated higher variability of systolic blood pressure with a 15 percent increase in all-cause mortality .
According to the new study from Dr. Clements and colleagues, certain types of medication that are used to lower blood pressure may be contributing to this mortality risk.
Two medications 'should be avoided'
For their study, the researchers analyzed the data of over 10,500 adults with high blood pressure .
The participants had their blood pressure measured at least seven times between January 2007 and December 2011, and the type of blood pressure medication they were using was monitored.

Intel Admits It Won't Be Possible to Fix Spectre (V2) Flaw.

As speculated by the researcher who disclosed
Meltdown and Spectre flaws in Intel processors, some of the Intel processors will not receive patches for the Spectre (variant 2) side-channel analysis attack
In a recent microcode revision guidance ( PDF), Intel admits that it would not be possible to address the Spectre design flaw in its specific old CPUs, because it requires changes to the processor architecture to mitigate the issue fully.
The chip-maker has marked "Stopped" to the production status for a total 9 product families—Bloomfield, Clarksfield, Gulftown, Harpertown Xeon, Jasper Forest, Penryn, SoFIA 3GR, Wolfdale, and Yorkfield.

These vulnerable chip families—which are mostly old that went on sale between 2007 and 2011—will no longer receive microcode updates, leaving more than 230 Intel processor models vulnerable to hackers that powers millions of computers and mobile devices.
According to the revised guidance, "after a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release microcode updates for these products for one or more reasons."
Intel mentions three reasons in its documentation for not addressing the flaw in some of the impacted products:
Micro-architectural characteristics that preclude a practical implementation of features mitigating Variant 2 (CVE-2017-5715)
Limited Commercially Available System Software support
Based on customer inputs, most of these products are implemented as "closed systems" and therefore are expected to have a lower likelihood of exposure to these vulnerabilities.
Spectre variant 2 vulnerability (CVE-2017-5715) affects systems wherein microprocessors utilize speculative execution and indirect branch prediction, allowing a malicious program to read sensitive information, such as passwords, encryption keys, or sensitive information, including that of the kernel, using a side-channel analysis attack.
However, these processors can install pre-mitigation production microcode updates to mitigate Variant 1 (Spectre) and Variant 3 (Meltdown) flaws.
"We've now completed release of microcode updates for Intel microprocessor products launched in the last 9+ years that required protection against the side-channel vulnerabilities discovered by Google. However, as indicated in our latest microcode revision guidance, we will not be providing updated microcode for a select number of older platforms for several reasons, including limited ecosystem support and customer feedback." says an Intel spokesperson via email.
Besides Intel, AMD Ryzen and EPYC processors were also found vulnerable to 13 critical vulnerabilities that could allow an unauthorized attacker to access sensitive data, install persistent malware inside the chip, and gain full access to the compromised systems.
AMD has acknowledged reported vulnerabilities and promised to roll out firmware patches for millions of affected devices in the coming weeks.
However, CTS Labs, the security firm that discovered and disclosed the vulnerabilities, claimed that AMD could take several months to release patches for most of the security issues, where some of them cannot be fixed.