logo
I Hosted a Memorial Day Cookout and This Steak Hack Stole the Show

I Hosted a Memorial Day Cookout and This Steak Hack Stole the Show

CNET26-05-2025
Memorial Day is here, and for me, that means it's officially grilling season. If you're like me, and planning to throw some steaks on the grill today, there are a few things you'll want to get right. Nothing kills the cookout vibe faster than a dry or undercooked steak.
I've learned the hard way that timing is everything when it comes to steak. Leave it on too long and it's tough and dry. Pull it off too soon and you're dealing with a raw center that might not sit so well. But with a few simple tricks, it's actually pretty easy to get that perfect balance: juicy, tender, and cooked just the way everyone likes it.
So if you're manning the grill today, here's how to nail your steak and impress your guests without breaking a sweat.To get the inside scoop on how pro chefs measure doneness of ribeye, strip or flank, I spoke to Joe Flamm, chef-partner and culinary director of Chicago's BLVD Steakhouse. "Doneness is such a preference and everyone has their own," he said. "For something as simple as steak, prepared with just salt and fire, you want it exactly how you want it."
We love using a meat probe for checking the temp on larger cuts of meat, chicken and other foods, but this gadget-free method works on steaks and burgers and saves you from having to pull out the thermometer. Here, we unpack a simple trick for testing steak doneness using only your hands, guaranteeing you'll nail it every time.
Read more: A Beef Expert Told Me the Best Cheap Steak Cuts to Look for at the Market
Practice makes perfect
Fancy meat thermometers do a nice job at reading internal temps, but you can save some money and learn to test doneness like the pros do.
James Bricknell/CNET
Doneness in steak is frequently associated with color, as the steak goes from bright red when rare, through various stages of pink, until it becomes well done and has the pink cooked completely out of it. (RIP, ribeye.) It's difficult to gauge color without cutting into the steak, which you don't want to do until it comes off of the heat and has a moment to rest. Otherwise, the juices spill out of it, making for a drier, tougher outcome, especially if you're going to put it back on the fire for additional cooking. It's even more important not to do this prematurely if your preference leans toward medium well or well done; you want as much juice left in the meat as possible.
Doneness is also associated with temperature, with the internal temperature of the inside of the meat typically graduating between 120 and 160 degrees Fahrenheit as you move between rare and well done. This can be accomplished with a meat thermometer, but there is another method frequently applied by chefs that doesn't require any gadgets.
Nailing the perfect doneness for your next steak takes nothing more than a few pokes.
Brian Bennett/CNET
With bigger cuts, such as a whole prime rib roast that will be sliced after cooking, "a thermometer is super helpful for consistency and accuracy," says Flamm, but "for smaller cuts and for speed, many chefs can check it by feel," he says. "If you're cooking 100 filets a night, every night, it begins to fall into place."
Understanding doneness in steak and why overcooking is bad
Overcooking steak is the fastest way to ruin a perfectly good piece of meat.
Tyler Lizenby/CNET
What's a home cook to do who isn't in the habit of cooking dozens of steaks on repeat, many times a week? Before we get to the shortcut trick to help you learn this, it's important to understand the transformation your steak undergoes as it cooks to higher and higher temperatures.
In basic terms, the longer a steak cooks, the firmer the meat becomes, which has to do with the chemical process the meat is undergoing. "Whenever you cook a steak for a longer period there's a breaking point where fat and muscle are done breaking down," explains Flamm, "and you're just drying out the steak and losing moisture, which gives the steak a tougher texture." This increasingly firmer or tougher texture is key to being able to check the doneness of steak without relying on a thermometer.
Read more: I Did the Math to See if Buying Meat Online Is Cheaper Than the Grocery Store
Technique for testing doneness
Learning to check for doneness by feel doesn't necessarily require hundreds of dollars of raw materials to get the requisite practice. Neither does it rely on any particular gadget. It's not exactly a one-handed method, but the method only involves the use of your hands.
Whether or not you have the means or mentality to quit your job and go to culinary school, here's a culinary school trick to understand doneness in meat, using the fleshy base of your thumb as a point of comparison in the resistance of the steak when poked.
Here it is: With one hand, gently touch your thumb and forefinger together, keeping the rest of your fingers relaxed, in a half-assed "A-OK" signal. You don't want to press your thumb and forefinger together -- simply make light contact between them. With the forefinger of your opposite hand gently poke the fleshy base of your thumb.
Pamela Vachon/CNET
You're not pressing down here, just giving it a quick jab. This is approximately the level of resistance you should feel for a medium rare steak when similarly jabbed in the center of the meat. (Quick aside here about clean and/or gloved hands. Also, the steak will be hot on the outside, yes, but again, a brief jab is all that's in order.)
Pamela Vachon/CNET
Subsequently, as you move your thumb to lightly touch your middle finger, the tension in the base of your thumb increases, and this represents how a medium-cooked steak should feel. As you stretch your thumb to reach the ring finger, now you've got medium well, and the tension in the thumb when touched with the pinkie finger reveals well done.
Pamela Vachon/CNET
Regardless of how you like your steak cooked, and how you'd personally define it, now you have a consistent point of comparison available to you at all times with which to practice, whether you're cooking steak once a week or once a year.
Pamela Vachon/CNET
What's the best way to cook steak?
Searing steak followed by some indirect heat to bring it up to the desired doneness is the preferred method of many professional chefs.
David Watsky/CNET
So, what's the best way to cook a steak? Opinions abound regarding direct heat versus indirect heat, hard searing and reverse searing, and even cooking steak in an air fryer. Flamm recommends a time-honored method: "For me, it's searing the steak hard, and then using indirect heat to slowly let it render and come up in temp to the place where you want it to be," he says, finishing your seared steak in the oven.
You can consult various recipes for time and temperature recommendations with the indirect heat method, just be sure to factor in that your steak will continue to cook while resting, and to take your steak out and give it a good jab every so often.
Read more: Avoid Dry Beef Syndrome: Here Are the Best Ways to Reheat Steak
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Elmo hack exposes serious social media cybersecurity threats
Elmo hack exposes serious social media cybersecurity threats

Fox News

time2 minutes ago

  • Fox News

Elmo hack exposes serious social media cybersecurity threats

As you scroll through X (formerly Twitter), you might come across Elmo, the lovable red monster cherished by children and parents, sharing cheerful, family-friendly content. However, recently, the official Elmo account had suddenly posted hate speech, racist slurs and political attacks. This shocking breach transformed a beloved feed into a source of confusion and pain. Sesame Workshop, the team behind Elmo, acted swiftly to remove the offensive posts, but for millions of fans, the damage had already been done. This was far more than a typical hack. It represented the digital defacement of one of the world's most trusted childhood icons. This incident underscores that in today's cyber landscape, no account, not even the most seemingly secure one, is immune to attackers. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Hackers crave reach and attention, and few targets offer more than a beloved global brand. When attackers seize control of an account with hundreds of thousands of followers, they gain immediate access to amplify their message, whether it be misinformation, hate speech or targeted harassment. The Elmo incident wasn't about stealing data or ransoming accounts; this was about causing chaos, sowing division and breaking trust. For years, Elmo's online voice was synonymous with joy and support. With a single breach, that reputation was battered, as followers questioned how such ugliness could appear from a character so trusted. Brand reputation, built over decades, was compromised in minutes. As Sesame Workshop stated in response, "Elmo's X account was briefly hacked by an outside party in spite of the security measures in place. We strongly condemn the abhorrent antisemitic and racist content, and the account has since been secured. These posts in no way reflect the values of Sesame Workshop or Sesame Street, and no one at the organization was involved." This incident underscores the importance of robust cybersecurity measures, especially when trusted brands serve as platforms for millions worldwide. To better understand what happened, we turned to Daniel Tobok, CEO of Cypfer, a leading global cybersecurity and incident response firm. Daniel has spent over 30 years guiding organizations through major cyber events. "Unfortunately, a lot of credentials are harvested and sold on the dark web between different threat actor groups despite strong passwords or MFA barriers. Maybe someone lost their password or an administrator had theirs saved on a laptop that was part of another breach. Once those passwords are collected, they get traded or sold," Daniel explained. While brute-force attacks still happen, most criminals don't waste time hammering away at complex passwords. Instead, they exploit simpler routes: snatching passwords from old breaches, targeting users directly or hijacking password vaults, especially those managed by social media admins. "Brute-force attacks make a lot of noise and can trigger alerts. It's not the most popular strategy anymore because it's so noisy," Tobok adds. Unfortunately, you might not get a warning that your account is being targeted. Tobok points out, "There really isn't public-facing software that notifies you. Sometimes, you might get an email saying, 'We noticed unusual activity. Was this you?' That typically comes through MFA channels. But most executives don't manage their own social media accounts. It's usually someone on their team or a designated admin. So, if something goes wrong, they're not necessarily the ones who will see it." Hackers can even set up rules that reroute security notifications away from your inbox, leaving you completely unaware that anything's wrong, until it's too late. Hackers are counting on you to get complacent. Daniel calls out pitfalls to avoid: Most alarmingly, Daniel added, "Most people's information has already been compromised at some point. There are over 4.8 billion passwords circulating on the dark web right now. And, finally, never reuse the same password across multiple platforms. I know it's tedious, but that's what proper hygiene looks like." Act fast. Here's Daniel's step-by-step plan: "If you still have access, change your password right away. Most threat actors, once they're in, will immediately change the password and the email linked to the account so they can take full control. If you're locked out, you need to contact the platform and provide proof that it's your account. Request that they shut it down or help you recover it. The good news is, most platforms will act quickly, especially if you tell them someone is posting offensive or racist content from your account." Protecting your social media accounts is more important than ever. Follow these steps to strengthen your cybersecurity and keep hackers out: Create passwords with at least nine characters, mixing uppercase, lowercase, numbers and symbols. Never reuse passwords across platforms, and update them regularly for maximum protection. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Also, use a password manager instead of sending passwords through unencrypted messages. Password managers allow you to share credentials when absolutely necessary and help prevent leaks securely. Check out the best expert-reviewed password managers of 2025 at Always activate MFA to add an extra layer of login protection. This makes it much harder for unauthorized users to gain access, even if your password is compromised. Take advantage of account alerts and limit unsuccessful login attempts to detect intruders quickly. Regularly review these alerts so you can respond immediately if something looks off. Apply for official account verification when possible to add an extra safeguard and make recovery easier. Verification can also deter impersonation and build trust with your audience. Check and keep your recovery email and phone number current to regain access if needed. Outdated information could lock you out just when you need to recover your account the most. Remove apps or services you no longer use; these can become weak points if they are compromised. Regularly audit connected apps to ensure your data isn't exposed through unused integrations. Use platform features or trusted tools to back up important data in case of account loss or lockout. This simple step can be a lifesaver if you ever lose access or your data is accidentally deleted. Install strong antivirus software on all devices used to access social media. Regular updates and real-time scanning protect you from malware and phishing that could compromise your accounts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Reduce your digital footprint and minimize risk by using services that remove your personal information from data brokers and people search sites, especially after a breach. These services make it harder for criminals to gather sensitive data used in social engineering attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting a free scan to find out if your personal information is already out on the web: Periodically review your social media privacy and security settings to ensure they match your current needs. Platforms often add new settings and features, and staying up to date gives you the best protection. Avoid logging into accounts on public Wi-Fi or always use a VPN. Public networks make it easier for hackers to intercept your information. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Regularly audit account access and revoke permissions for anyone who no longer needs it. This ensures that only trusted individuals can post or make changes on your behalf. The Elmo hack shattered more than just a cheerful digital persona. It reminded us that no brand, no matter how trusted, is immune to today's cyber threats. In an environment where trust is built tweet by tweet and lost in mere moments, protecting our digital presence has never been more urgent. Social media security is everyone's responsibility. Take action before you become the next viral lesson in what not to do. Do you think social media companies are doing enough to protect users and brands from evolving cybersecurity threats? Let us know by writing us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide -—free when you join my Copyright 2025 All rights reserved.

Why Dictionaries Still Define Us
Why Dictionaries Still Define Us

New York Times

time2 minutes ago

  • New York Times

Why Dictionaries Still Define Us

Have you ever obeyed the suggestions of a digital writing assistant to replace a word or restructure a sentence without knowing how, why or even if it made your writing better? Before the reign of digital tools, you'd probably have turned to a dictionary for the same assistance. Our parents and grandparents picked up a heavy book and looked up what words meant, how they're used, maybe glanced at their etymology — and then made a linguistic choice, however shaky or idiosyncratic, to express their ideas. In today's universe of spell-check, autocorrect and artificial intelligence — each of which is capable of making those choices for us — why should we keep producing and owning actual, cinder-block-sized dictionaries? Because dictionaries enable us to write not with fail-safe convenience but with originality and a point of view. While A.I. assistants manufacture phrases and statements so writers don't have to think them up, dictionaries provide us with the knowledge to use language ourselves in expressive and potentially infinite ways. They place choice — and authority — literally in human hands, forcing us to discover how we want to explain ourselves and our ideas to the world. Dictionaries aren't merely long lists of words and meanings; they're also instructions for how best to use those words. Since the debuts of Samuel Johnson and Noah Webster, English dictionaries have reflected the language of particular populations — the Oxford English Dictionary and Merriam-Webster don't quite say the same things. Simultaneously, by codifying the meanings, uses and connotations of words, those same dictionaries have shaped language. Lexicographers look to the public to determine words' meanings, and we in turn look to lexicographers to verify that our understanding of words is shared and mutually understood. The parameters of English are formed both top-down and bottom-up. Dictionaries amalgamate and standardize these two linguistic influences and, in doing so, define our most fundamental cultural medium. Standard English doesn't exist today the way it did as recently as the late 20th century. Thanks to the colloquial tone of ubiquitous internet-based communication, formal English has become essentially absent from most people's lives. Where my parents' letters to friends and colleagues would have adopted genial but brittle tones and structures, the vast majority of my social and professional correspondence is informal. Smartphone messaging conventions — like using exclamation points to indicate pleasant normalcy and ellipses to evoke impatience or indifference — routinely seep into follow-ups from artists and lawyers alike. It's almost as if the more informal one's writing is, the more capable, authoritative and trustworthy it reads. This acceptance of vernacular in contemporary mainstream English is new, but by no means uniform. English-speaking societies have always used an array of dialects, but until relatively recently, lexicographers arbitrarily viewed nonstandard Englishes as unsophisticated and therefore unworthy of regular inclusion in dictionaries. Today there is a general awareness that particular nations, for instance, speak not one but a group of different Englishes. Dictionaries are therefore no longer confronted with the task of defining a prestige dialect but rather with describing and legitimizing the contrasting ways people use words, a task for which they, unlike less deliberate digital alternatives, are well suited. Want all of The Times? Subscribe.

Puzzle solutions for Sunday, July 20, 2025
Puzzle solutions for Sunday, July 20, 2025

Yahoo

time29 minutes ago

  • Yahoo

Puzzle solutions for Sunday, July 20, 2025

Note: Most subscribers have some, but not all, of the puzzles that correspond to the following set of solutions for their local newspaper. CROSSWORDS USA TODAY crossword Play the USA TODAY Crossword Puzzle. Sunday Los Angeles Times crossword Sunday New York Times crossword Sunday Premier crossword SUDOKU Play the USA TODAY Sudoku Game. JUMBLE Answer: STREWN DARKER LUNACY UNDONE SHOULD NIBBLEWhen the brown bear began getting too close, the ranger knew — TROUBLE WAS 'BRUIN' (Distributed by Tribune Content Agency) Cryptoquip WHEN THE LEECHES AND NIGHT CRAWLERS ARRIVED AT THE PARTY, DO YOU SUPPOSE THEY WERE GIVEN A WORM WELCOME? (Distributed by King Features) OTHER PUZZLES Boggle BED SOFA CHAIR FUTON TABLE OTTOMAN DRESSER (Distributed by Tribune Content Agency) Lexigo BANANA, ALABAMA, ALBUM, METAL, LADYBUG (Distributed by Andrews McMeel) KenKen Scrabblegrams 7 Little Words SEUSS WATSON OCTAVIUS QUINN DOLITTLE PIERCE PEPPER (Distributed by Andrews McMeel) Find the Words It is music to my ears (Distributed by Creators Syndicate) Kubok This article originally appeared on USA TODAY: Online Crossword & Sudoku Puzzle Answers for 07/20/2025 - USA TODAY

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store