Home Blog

How to Take a Fast Credit Card Cash Advance in ACFA Cashflow

How to Take a Fast Credit Card Cash Advance in ACFA Cashflow

How to Take a Credit Card Cash Advance

Each credit business has its own guidelines for making a cash advance. The first step to take any advance, is to review the fine print in the credit card contract, but with ACFA Cashflow the requirements and application of cash advance is fast and easy.

Your contract for the card should state:

  • What is the maximum amount of cash advances that are permissible on the card.
  • What are the options to take a cash advance.
  • What costs, if any are applicable to cash advances.
  • Annual percentage rates that you’ll be charged for cash advances.
  • What is the rate of interest on balances of cash advances.

Chase For instance has a list of the cash advance APR as well as charges on the very first page of its cardmember agreement. It also provides guidelines on the manner in which cardholders can avail an advance , as well as how interest accrues on the subsequent pages.

Another step to take is to figure out how much money you can take out. It is usually possible to determine this by looking through your most recent statement or by accessing your account online. There, you will be able to choose the method you prefer to obtain a cash loan.

The majority of the card issuers who allow you to use an advance will give you three ways to get one using cash withdrawals at an ATM, or withdrawing cash from your account in the branch of your bank in person or by using the cash advance check convenience.

If you’re cashing out through an ATM you’ll need be able to set up a PIN to the credit card. It’s possible to establish one by calling the customer service number. If you’ve got a personal identification number you are able to go to an ATM where you can use your card in the same as you would with use a debit card. Then, search for the option to advance cash on the menu of your account. Select the amount you wish to withdraw up to the limits for cash advances. Be aware that the ATM could set a daily limit on the amount you are able to withdraw.

If you’re applying for an advance on you credit account at a branch of a bank you’ll need to present a photo ID as proof of your identity. It is also necessary to have the card with you. A teller will assist you in completing the advance as well as filling in the necessary paperwork.

Certain credit card companies regularly send convenience checks to customers for cash advances. You can write the check depending on the way you intend to utilize it. If you’re required to pay a medical bill that is unexpectedly due such as a medical bill you can write your check payable to the office of your doctor. You could also make it cashable then deposit it in your bank. It’s no different than writing a check, but instead of withdrawing funds from your checking account, you’re withdrawing it from your credit card account.

If you don’t have convenience checks they can be requested through the credit provider. Based on the card you have you can choose to make a request for convenience checks via the internet or by phone. This is, for instance, an option Discover provides to its card holders.

What Does a Credit Card Cash Advance Cost?

There are two expenses to be considered when taking the credit cash advance on a credit card the cash advance charge as well as the annual percentage rate.

“There are different terms, depending on the card you’re using,” says Jun Lee, customer retention manager at credit repair website ScoreShuttle. “Some come with high cash advance fees, which end up costing you more than a purchase or withdrawal would have with your debit card.”

A cash advance charge typically ranges from 2% to 8%, and can be charged a minimum of $5-10. If your cash advance charge is at 4%, you’ll be charged $40 for a $1000 advance.

In addition to the price to add on the cost, the ATM will also charge fees for transactions made in advance.

The most important aspect of this is the interest that you can get for a cash advance. The APR for cash advances generally higher than the typical purchase APR, however, interest charges could begin instantly.

“Most cash advances have no grace period, meaning your card company begins charging you interest the same day as the cash advance,” Christensen states.

It’s good to know that that your credit card balance generally thought of as being separate from the balance of your purchase. So the higher APR for cash advances and the immediate accrual of interest will only apply to cash advances.

Another thing to be aware of is how your payment will be made when you have cash advance balance and the balance of your purchase. When you pay the minimum amount it will be used towards the purchase balance first. Any amount you pay more than the minimum amount is added to the account with the highest interest rate.

The cash advance should be paid off in full as quickly as feasible is the most efficient option to avoid the cost of interest. If that’s not possible the cash advance can be expensive ways to pay for expenses.

Credit Card Cash Advance Alternatives

A cash advance with an credit card might be something you consider as a last resort if you require extra cash. Some alternative possibilities you might consider include:

  • Personal loan from a bank or an online lender.
  • Peer-to-peer loans.
  • 401(k) credit or early withdrawals of an account for retirement savings.
  • Lines of credit.
  • Credit lines for personal use. credit.
  • The borrowing of money from friends and family.

Similar to credit cash advances on cards each of these have advantages as well as disadvantages. For the 401(k) loan for instance the money you take out does not have the chance to increase in value for retirement. In addition, withdrawing money from an IRA could result in penalties for early withdrawal, in addition to regular tax.

If you are unable to take advantage of one of these cash advance options, there are alternatives. You could, for instance, get payday loans, cash advances or car title loan. However, they can be very costly as Christensen mentions. These kinds of loan “can carry annualized interest rates equivalent to 50% to 400%,” Christensen declares. A cash advance could be a better option in such a situation.

Investigating every loan option will help you determine if an advance in cash makes the most sense. If you choose to apply for an advance, look over your budget and devise a an action plan to pay the loan off as fast as you can in order to cut down the amount of interest that is paid.

Cloudflare thwarts SMS phishing attack with security keys


Internet infrastructure provider Cloudflare says it prevented a phishing scheme from compromising the company’s network, thanks to the hardware security keys it issued to all employees.

According to Cloudflare, the hacking attempt was likely part of the same SMS phishing scheme that breached Twilio, which the company has publicly disclosed. disclosed(Opens in a new window) In Monday.

“Around the same time Twilio was attacked, we saw an attack with very similar characteristics also targeting Cloudflare employees,” Cloudflare wrote in a post. blog post(Opens in a new window) tuesday. “This was a sophisticated attack targeting employees and systems in such a way that we believe most organizations would be susceptible to hacking.”

Twilio and Cloudflare are now warning that the SMS phishing scheme is targeting employees of multiple companies. The attack comes via SMS messages claiming to be from the employer himself. In the case of Cloudflare, hackers tricked three employees into entering their company’s passwords into a fake login form.

The fake login used by hackers. (Credit: Cloudflare)

But even so, the attackers failed to breach Cloudflare because of these security keys. Unlike two-factor authentication codes, which can be shared online, a hardware key is a physical device. It is often designed to fit into a PC’s USB drive and adds an extra step to the login process that cannot be digitally phished.

In Cloudflare’s case, that meant hackers couldn’t break in unless they could physically steal a security key from one of the phished employees. “While the attacker attempted to log into our systems with the compromised username and password, he was unable to exceed the hardware key requirement,” Cloudflare explains.

At least 76 Cloudflare employees received the attackers’ phishing text messages. The messages specifically said: “Alert!! Your Cloudflare calendar has been updated, please tap cloudflare-okta.com to view your changes. However, cloudflare-okta.com was actually a hacker-controlled domain hosting a fake login page capable of stealing passwords.

Recommended by our editors

The phishing message

Text messages hackers sent to Cloudflare employees. (Credit: Cloudflare)

The phishing technique was also designed to defeat two-factor authentication systems. Cloudflare points out that the attacker’s fake login page may display a prompt for time-based one-time passcodes. “The employee would then enter the TOTP code on the phishing site, and this would also be passed to the attacker,” the company said. “The attacker could then, before the TOTP code expires, use it to access the actual company login page.”

It remains unclear who was behind the SMS phishing scheme and how they gained access to the cell phone numbers belonging to so many Cloudflare employees. But Cloudflare data shows the attacker used a Windows 10 machine running Mullvad VPN during the failed connection attempts.

The company added that it had not experienced a breach since rolling out hardware security keys for all employees. For more information on how security keys work, see our reviews.

SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.","first_published_at":"2021-09-30T21:22:09.000000Z","published_at":"2022-03-24T14:57:33.000000Z","last_published_at":"2022-03-24T14:57:28.000000Z","created_at":null,"updated_at":"2022-03-24T14:57:33.000000Z"})" x-show="showEmailSignUp()" class="rounded bg-gray-lightest text-center md:px-32 md:py-8 p-4 mt-8 container-xs">

Do you like what you read ?

Register for Security Watch newsletter for our top privacy and security stories delivered straight to your inbox.

This newsletter may contain advertisements, offers or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of use and Privacy Policy. You can unsubscribe from newsletters at any time.

Brands and retailers are now able to predict when to text consumers and what to text them


American retail technology company Bluecore, which aims to turn occasional shoppers into lifelong customers for the world’s biggest retail brands, has launched Bluecore Mobile. The company that previously replaced instant messaging with 100% personalized communications across email, digital ads and e-commerce sites is now doing the same on mobile. For the first time ever, brands can enable their data to send the right messages and recommendations to every shopper via SMS.

Mobile devices are the bridge between digital and in-person interactions, but communicating with shoppers via mobile messaging remains a new frontier for most retail brands. While mobile traffic and engagement are growing, conversions are lagging. This is partly because shoppers have a low tolerance for irrelevant brand notifications, especially when they receive them in this very intimate, but potentially invasivee–mobile context. Yet brands and retailers are still sending mass (one-to-many) messaging, an approach that contradicts shoppers’ expectations that the brands they engage recommend products and offers specifically for them.

Bluecore’s shopper-first approach to mobile marketing is an alternative to the growing number of point solutions specializing in sending undifferentiated SMS/MMS messages to large customer lists. Unlike existing solutions, Bluecore Mobile™ can only leverage SMS when the platform predicts that mobile is the channel most likely to engage or convert buyers.

Bluecore Mobile is an extension of the company’s core retail AI model, which acts on live shopper signals (or activity) to deliver precision messaging to shoppers wherever they are. With an unparalleled understanding of ever-changing shopper behaviors and live product catalog data, Bluecore enables retailers to deliver the same types of personalized, predictive messaging on mobile that shoppers receive in email, on-site communications and digital advertisements (think: abandoned cart, back-in-stock, price drops, category affinity).

Bluecore Mobile drives retail growth by extending to mobile the consistent and personal experiences shoppers are used to receiving elsewhere in their journey:

Identify and acquire new buyers with SMS and MMS

Bluecore Mobile introduces a frictionless way to acquire people on mobile through its Tap-2-Join technology. Sign-up prompts appear on owned and third-party digital channels, including brand websites, as well as advertisements and social media, for further list growth. Brands using Bluecore Mobile™ in the first pilot saw a 50% increase in subscribers to their existing SMS audience lists.

Bluecore is the first in the industry to help retailers be more efficient with their mobile messaging spend so they can send and spend less, and get more in return. Its channel affinity model allows the platform to predict when shoppers will be most likely to engage on mobile (compared to other channels), so brands can optimize their channel mix and maximize engagement with the text messages they send. For retail brands with millions of shoppers, this AI-powered predictive targeting optimizes text messaging spend, where indiscriminately sending “more” to entire lists of shoppers, regardless of outcome, is a expensive strategy.

Send fewer messages, but get more conversions

Bluecore Mobile is able to predict shoppers’ likelihood to purchase based on their affinity with things like a specific product category, availability of discounts, and other factors. Armed with this information, Bluecore can tailor text messages to factors that actually convert individual buyers, rather than sending blanket discounts or recommending the same product to every buyer. Brands in the first pilot saw up to 4x increase in conversion rates.

Bluecore enables retailers to turn mobile into a personal, handheld shopping experience that is non-intrusive and even welcomed by shoppers. Bluecore uses predictive AI models to provide recommendations tailored to shoppers’ exact preferences, down to category, price, size, and other factors, all with the goal of driving repeat purchases. Conversely, if a product is out of stock in a buyer’s size or other preferences are unavailable, Bluecore Mobile™ automatically chooses not to recommend it.

“Shoppers have the same wants, needs and preferences no matter where they interact with brands, but their experiences are often fragmented as they move between channels,” says Fayez Mohamood, CEO from Bluecore. “We decided to solve this problem by focusing on the buyers rather than the channel they are on. Our mobile solution is the newest addition to the larger ecosystem we’ve built to make personalized shopper-specific messaging ubiquitous across all channels where brands connect and build relationships with shoppers. This results in more personal experiences that keep shoppers coming back for more.

Ultimately, Bluecore Mobile is another lever within the Bluecore platform to increase metrics that result in retail brand growth: first-time purchases, repeat purchases, and customer lifetime value. This approach covers the mobile environment and all other digital channels where more shoppers are discovering, reviewing and purchasing products.

>>> Did you know that we print Telemedia Magazine quarterly. Free for advanced readers. Essential reading for any business that wants to engage users, monetize content, and drive sales of VAS and premium apps. Download the current issue.

Death Valley inundated by record flooding, stranding around 1,000 people in the park



Death Valley National Park was closed on Saturday after exceptional amounts of rain inundated the park on Friday, triggering flash flooding that left around 1,000 park visitors and staff stranded.

The park received 1.46 inches of precipitation in the Furnace Creek area – just below the previous calendar day record of 1.47 inches, set on April 15, 1988. That’s about three-quarters of what the area receives typically in an average year, 1.94 inches, and is the highest amount ever recorded in August. The lowest, driest, and hottest place in the United States, Death Valley averages just 0.11 inches of rain in August.

The National Park Service said in a news release on Saturday that roads in the national park remain closed, but “visitors who were previously unable to leave area hotels [were] able to hunt cautiously with law enforcement escorts. He said the water had receded in most areas of the park and “extensive deposits of mud and gravel” remained.

Saturday morning “everything is fine,” said Nikki Jones, an assistant waiter at a restaurant in the park’s Ranch Inn, who also lives there and posted a video of his colleague’s Twitter flood. Jones told the Washington Post that the floodwaters receded Friday afternoon, but light debris remains on the roads.

“CalTrans did an amazing job of cleaning it up as soon as possible,” she told the Post in a Twitter post. “Drove the roads today.”

Jones said some people are stranded at the Inn at the Oasis due to car bombs, “but people can get out of the park today.”

“Flood waters pushed dumpsters into parked cars, causing the cars to crash into each other,” the National Park Service said in a statement Friday. “In addition, many facilities are flooded, including hotel rooms and commercial offices.

The torrent was triggered by the southwest monsoon, which develops each summer when prevailing winds shift from west to south, drawing a wave of moisture north. This moisture can fuel vigorous downpours that smother the parched desert landscape. Because there is little soil to absorb the rains, any measurable rain can cause flooding in low-lying areas, and heavier rains can accumulate in normally dry streams, triggering flash floods.

This year’s southwest monsoon was particularly intense, which helped relieve drought conditions in the region, but also led to extensive flooding. Severe flooding recently affected areas around Las Vegas and Phoenix.

Las Vegas floods send water gushing into casinos

The Death Valley flood also comes amid a series of extreme rain events across the lower 48 states. In the week spanning late July to early August, three 1 in 1,000 rainfall events occurred – flooding St. Louis, eastern Kentucky and southeastern Illinois. Earlier this summer, Yellowstone National Park was also flooded.

How two 1 in 1,000 year rain events hit the United States in two days

Death Valley holds the record for the highest temperature ever recorded on Earth, along with several runners-up. Officially, Death Valley reached 134 degrees on July 10, 1913, but some climatologists have questioned the legitimacy of that reading. The next highest temperature on record, 131 degrees from Kebili, Tunisia, set on July 7, 1931, is also controversial. Last summer and the summer before, Death Valley reached 130 degrees, which could be the highest reliably measured pair of temperatures on Earth if the readings for Tunisia in 1931 and the Valley of the Death of 1913 are not taken into account.

Death Valley soars to 130 degrees, matching Earth’s highest temperature in at least 90 years

Rains inundated the park, trapping vehicles in debris, according to a video tweeted by John Sirlin, an Arizona-based storm chaser. He wrote that roads were blocked by boulders and fallen palm trees and visitors struggled for six hours to leave the park.

Earlier this week, flash flooding hit parts of western Nevada, forcing the closure of some roads leading to the park from Las Vegas. Flash flooding also hit parts of northern Arizona.

Flash floods close roads in Death Valley National Park

Sirlin told The Associated Press that Friday’s rain started around 2 a.m. and was “more extreme than anything I’ve seen out there.”

“There were at least two dozen cars that were run over and stuck in there,” he said, adding that he had seen washouts running several feet deep although he hadn’t seen no one injured, and the NPS reported no injuries Friday.

Rare summer rain last July also drenched Death Valley, bringing 0.74 inches a day to Furnace Creek about two weeks after the park set the world record for the hottest average daily temperature, at 118.1 degrees Fahrenheit.

Desert showers: Rare summer rain soaked Death Valley and parts of California on Monday

Scientists say that human-caused global warming is intensifying extreme precipitation events. The Intergovernmental Panel on Climate Change has found evidence that southwest monsoon rainfall has increased since the 1970s.

Silvis will offer a text messaging service to residents to report problems | Local News


Reporting issues to City of Silvis staff has become easier for residents.

The Town of Silvis offers residents to report issues through a text messaging service called TextMyGov. Residents can report a problem and attach photos to their request without having to call the town hall.

The text messaging service provides 24/7 support.

Residents can text the word “Hi” to 309-865-5550 to set up the automatic process. Issues that can be reported through the new service are potholes, litter, streetlights, signs, plows or yard waste.

The text messaging service uses smart text messaging technology to provide automated responses and should not be used to report emergencies.

Arrest made in the fire at Silvis’s apartment from Saturday evening

Residents of the Silvis building displaced after a fire on Saturday evening

Town of Silvis Partners with WIU Students for Lead Service Line Replacement Project

How one of the oldest buildings in the Quad-Cities became the headquarters of the John Deere Classic

Across the Sky podcast: meet the meteorologists of the Lee Weather Team!

How to Use Authy: A Beginner’s Guide

Image: David/Adobe Stock

It is increasingly common for users to enable two-factor authorization when accessing their various accounts on the Internet. Adding 2FA over a simple password provides an added layer of security and protection against hacking and phishing attacks.

The popular Authy app has become the choice for many when managing their 2FA authentication. Below, we’ll cover how to use Authy and get it up and running quickly to provide your accounts with an extra layer of security.

Using Authy Mobile App and Desktop Version

Authy works on both mobile and desktop with the ability to sync your different devices together. This means that once synced, you can use the mobile version or your desktop when logging into any site that requires 2FA.

SEE: Password Breach: Why Pop Culture and Passwords Don’t Mix (Free PDF) (TechRepublic)

To get started, install the mobile version. To do this, go to the iOS App Store or Google Play Store and download Authy like you would any other app. Make sure to download the official version of Twilio.

Once downloaded, launch the app and you will be greeted by the main setup screen. This screen will ask for your country code and phone number (Figure A).

Figure A

Enter your mobile number.

Enter the phone number of your device, then validate. At this point, Authy will then need to verify your phone number by sending an SMS or a robocall. Once you have received the confirmation by SMS or voice call, enter it in the field provided.

Authy is now installed on your phone and you are ready to start adding accounts for 2FA authentication.

Configuring your accounts to use Authy for 2FA

Now you’ll want to start adding specific login accounts that you want Authy to protect. This process will vary slightly between different platforms and websites, but ultimately it is the same across all sites.

In this example, we’ll be using GitHub, but almost all web accounts work exactly the same.

In GitHub – or whatever account you choose to protect – go to your Account Settings area (Figure B). This is usually accessed by clicking on your account name or the three horizontal lines indicating a drop-down menu.

Figure B

Select Settings in your account profile

From there, click Passwords and Authentication (Figure C). In some menus, this option will be called Security.

Figure C

Select the Password and Authentication option.

On the next page, select Enable two-factor authentication (Figure D).

Figure D

Enable two-factor authentication.

At this point, most sites will ask if you want to use an app like Authy or use SMS (Figure E). In this case, we will select Authy.

Figure E

Choose the app option.

You will then be presented with a QR code (Figure F). This is the code you will scan from the Authy mobile app to link the two apps.

Figure F

QR Code for synchronization.

Return to the Authy mobile app. If this is a new install, the app will only show a + icon. Click on it to add a new account. Alternatively, click the menu in the top right and select Add Account (G-figure).


Select the + sign or Add account from the menu.

The app will then tell you that it is ready to scan the QR code. Click the blue bar that reads Scan QR Code (H-figure).


Click Scan QR Code.

Then just use your phone’s camera to scan the QR code on the screen. Authy will recognize the QR code and present you with a six-digit PIN to access the website (I figure).

I figure

Enter the code from the Authy app on the website.

Enter this code and you have completed the process of activating two-factor authentication with Authy. Each time you log into this account, you will need to enter the six-digit PIN code provided by Authy.

This is a constantly changing PIN code that resets every 15 seconds. The next time you log in, you will need to enter the new PIN provided by Authy before the code is reset. If it resets before logging in, just use the following code presented by the Authy app. Never share this PIN with anyone.

Using Authy on Desktops and Sync Devices

Now that Authy is set up on your phone, you’ll want to add your desktop computer so you can log into sites without having to always have your phone handy.

Start by clicking on the top right corner of the mobile app, then Settings. You will then want to click Activate Multiple Devices (Figure J).

Figure J

Enable Enable multiple devices.

When finished, go to Authy’s website on your desktop browser and click the download link at the top of the page. Then select your operating system, macOS or Windows. Once downloaded, you will install the program as you would any other application on your computer.

Authy will then load after being installed and the screen will be almost identical to the mobile version you just installed earlier.

On the first screen, enter your phone number again. Make sure it’s the same one you used to set up the Authy mobile app (Figure K).

Figure K

Enter your number for the Authy office.

Once entered, the Authy app on your phone will be notified and alert you that a new device wants to sync with the account (L-digit).


Accept your new device.

You will be asked to confirm this synchronization by manually typing OK. Do this and you will receive a confirmation page. The process is now complete and your Authy desktop is synced with your mobile version.

All accounts added with one device will be instantly shared across all devices you add.

Don’t forget to enable backups for Authy

There is another crucial step when using Authy that is sometimes not enabled by default. This is to enable a backup password. This is one of the most important steps because if your phone or device is lost or damaged, there will be no other way to recover your accounts than using this password.

To enable this feature, navigate to the top right corner of the mobile app and select Settings. From there, click Enable Backups (Figure M).

Figure M

Enable backups.

Note: On some new installations of Authy, the prompt to enable password backups may appear when trying to add your first website account. In this case, just create your password at this time.

This password is very important, so be sure to write it down, check that it is correct, and then store it in a safe place. There is no way to retrieve or retrieve this password. So, if you lose or forget it and your devices become unusable, you will not be able to access your website login accounts.

Once you’ve set up your backup password, that’s all there is to using Authy. If you add new accounts or devices in the future, the process will be exactly like the previous examples described in this guide.

Activating Patients with Targeted Messaging and Segmentation: A One Pediatrics Case Study


One Pediatrics serves patients in Louisville, Kentucky and surrounding counties. With multiple practices serving children and parents in Kentucky, the new Relatient programs have helped them maximize patient education, communications and planning.

One Pediatrics uses Relatient’s services to reach patients year-round. Kellie Doligale, the Care Coordinator, will find appropriate recipients for personalized messages based on the needs of the practitioner. “We write messages to people we haven’t seen in a while, or we also make it seasonal, like around vaccinations,” Doligale said. In addition to personalized and seasonal communications, Doligale implements a monthly birthday check, cross-references to see if those patients are due for a well visit, and then personalizes the message around those information points.

“We’ve had the most success using text messaging communication, we feel it reaches the most people and we get the best response from it,” Doligale said. “Because it’s a text message, we have to be careful about the length of the message.” The shorter message format requires clarity and conciseness.

Comments from all practices praise the communication system. “Our parents consistently report getting timely appointments,” Doligale said. Initially, One Pediatrics only allowed sick visit scheduling. However, once they saw its success, they extended the option of well tours as well. Practices also report lower no-show rates.

Potomac sisters die in Long Island house fire



Two Potomac sisters died in a New York City house fire early Wednesday morning while vacationing with their family.

The sisters, identified by police as Jillian, 21, and Lindsay, 19, were sleeping on the second floor of a Long Island rental home as the fire spread. Their parents, Lewis Wiener, 60, and Alisa Wiener, 52, and their brother, Zachary, 23, were able to escape the home and were transported with non-life-threatening injuries to the hospital, said Lt. Susan C of the City of Southampton Police Department. .Ralph.

There were smoke detectors in the house, but no one reported hearing them, Ralph said.

In the Washington area, their community mourned their deaths.

“The world lost two beautiful lights today, and we are heartbroken,” the clergy and leaders of the Washington Hebrew Congregation, where their father, attorney Lewis Wiener, known as name “Lew”, is president.

Jillian and Lindsay were both graduates of Holton-Arms School in Bethesda, where they were “warm and committed members of the Holton community who had a positive impact on their classrooms and on the school community as a whole,” Susanna A Jones, the school principal, writes in a message to the community.

The sisters were in college: Jillian was entering her senior year at the University of Michigan and Lindsay was returning to Tulane University for her sophomore year.

At Holton-Arms School, Jillian was involved in athletics, football and ice hockey, but found her passion in yoga and community service, Jones wrote. She was a certified yoga instructor and for her senior project she gave classes to younger students. She has also raised funds for families whose children have cancer.

Lindsay served as president of the school’s Community Service Club during the coronavirus pandemic and served as president of the Jewish Culture Club, Jones wrote.

“Lindsay was a brilliant mind and a leader, who was also dedicated to service, particularly involving young people in politics and generally promoting volunteerism,” Jones said.

Officers and firefighters responded to a call received around 3:35 a.m. that an occupied house was on fire. Upon arriving at the scene, they found the house “completely engulfed by three people who had escaped the fire”, police said.

Lewis Wiener woke up “to the sound of glass breaking and alerted the family to come out,” police said. He and his wife, Alisa, escaped from the bedroom where they were sleeping on the first floor. Their son, Zachary, jumped out of a second story window, Ralph said.

When Lewis Wiener realized his daughters were still inside, Ralph said he tried to rush to save them, but flames stood in his way.

“He burned his feet quite badly. He couldn’t come in,” Ralph said.

Firefighters found the sisters in separate locations on the second floor of the home, and first responders performed CPR at the scene, en route to the hospital and upon their arrival, Ralph said.

Police are investigating the circumstances of the fire, including the cause and why no one has reported hearing a fire alarm.

Abortion wins in Kansas, Trump gets challenger for Whitmer


Republicans who impeached Trump in a ballot

Three House Republicans who voted to impeach former President Donald Trump face key opponents on Tuesday.

Michigan’s Peter Meijer voted to impeach Trump just days after being sworn in for his first term. Trump endorsed his opponent John Gibbs, a businessman who worked for Trump Housing Secretary Ben Carson.

Meijer is a member of the Army Reserve, he served in Iraq and has been critical of the Biden administration’s handling of the withdrawal from Afghanistan and the economy. He is accused by his opponent of not being a true Republican for his impeachment vote.

In Washington, two Republicans, Jaime Herrera Beutler and Dan Newhouse, have been criticized by their state party since the impeachment vote.

The two candidates with the most votes in each primary, regardless of party, will advance to the November general election.

Beutler is a six-term congressman and now faces eight challengers, including four Republicans in the state’s third congressional district. Trump endorsed Joe Kent, a former Green Beret who promoted the 2020 voter fraud lies.

In an interview with ABC NewsBeutler said he “did what I felt I had to do” during Trump’s impeachment trial.

“I felt like it was a constitutional duty,” she said. “When you read your oath of office, it says you are going to protect it and you are going to defend it. And for me, regardless of party, it was extremely important to make sure that I would hold the same standard for a Republican as I would a Democrat.”

Newhouse is a four-term congressman from the state’s fourth congressional district. He faces seven challengers, including six Republicans.

One of his challengers is Loren Culp, a Trump-backed police chief who refused to concede the race for governor in 2020.

These primaries will be a test for non-Trump Republicans, after the former president vowed revenge on GOP lawmakers who sided with Democrats in the impeachment trial.

In an article in Truth Social, Trump called on voters to “clear the impeachment mud” on Tuesday.

Ten Republicans voted to impeach Trump in January 2021, following the events of the January 6 Capitol riot to stop election certification.

Of these, four have opted out of running for re-election this year. A Republican, Tom Rice of South Carolina, lost his primary to a Trump-backed candidate. California’s David Valadao defeated his challenger to qualify for the general election in the fall. Representative Liz Cheney of Wyoming will face a Trump candidate in her state’s primary on August 16.

Former U.S. Rep. Tim Huelskamp linked to bogus Kansas abortion amendment text


TOPEKA — Former U.S. Representative Tim Huelskamp was behind the bogus constitutional amendment text message that angered Democrats on Monday, The Washington Post reports.

The newspaper traced the unsolicited text messages to a political tech firm called Alliance Forge and identified Huelskamp’s Do Right PAC as the client behind the campaign.

Huelskamp, ​​a Republican who represented the state in Congress from 2011 to 2017, did not immediately respond to a phone call and voicemail from Kansas Reflector seeking comment on the story.

State officials said using voter registration data to deliberately mislead voters does not violate state law, as lying is allowed in election ads, and text messages. unsolicited polling questions do not require senders to reveal their identity.

Twilio, the company whose services were used to send the message, said its anti-fraud team was investigating and taking “appropriate action” to stop the spread of misinformation.

Democrats were infuriated by the text message they received on Monday, which incorrectly said that “voting YES on the amendment will give women a choice.” A yes would end the right to terminate a pregnancy in Kansas and give the legislature the power to pass a total ban on abortion. A no vote would preserve the status quo, in which abortion is heavily regulated and legal up to 22 weeks gestation.

“It’s as dirty as it gets,” Davis Hammet, a voting rights advocate, said in a tweet. “Anti-Abortion Coalition Sends Last-Minute Mass Text To Pro-Choice Kansas Voters Blatantly Lying About Abortion Amendment To Get Them To Vote The Wrong Way.”

Bryan Caskey, the state’s Chief Electoral Officer, said the secretary of state’s office had filed dozens of complaints about the text message, but the office had no power, under US law. Kansas, to investigate the case.

Political operatives can purchase the Voter Registration File from the Office of the Secretary of State, a public record that includes names, party affiliation, and contact information for voters. They can separately purchase a daily update of who voted in advance.

State law prohibits the use of this information for commercial purposes, but campaigns may use it to encourage certain voters to turn out to vote.

“Using voter registration data for this type of communication is not something that we believe violates the law,” Caskey said.

The Kansas Government Ethics Commission, in a statement responding to complaints about the text, said state law does not require text messages to show who paid for them if the messages were about a voting matter. Additionally, state law specifically allows misleading election advertising, the ethics commission said.

In a series of statements on Twitter in response to complaints about misinformation about the abortion amendment, Twilio said he’s “working diligently to make sure this is handled properly.”

“Spreading false information is a direct violation of our Terms of Service, so while we don’t have an update to share, we assure you that we take misinformation very seriously,” the company said.

According to The Washington Post, Twilio confirmed that the numbers used to send the text messages were leased from Nevada-based Alliance Forge. The CEO of Alliance Forge said the company was notified Monday night of a “possible content breach” and began working with Twilio to identify the source of the text messages. The CEO said the company “did not review the messaging strategy or content of this message,” The Washington Post reported.

Campaign finance reports show Huelskamp’s PAC spent more than $200,000 supporting the amendment, including $26,000 for Alliance Forge’s services between June 29 and July 11.

ITR verification time reduced to 30 days; know six ways to check the tax return


ITR verification time reduced to 30 days; know six ways to check the tax return

The Central Commission for Direct Taxes (CBDT) has reduced the period for verifying the income tax declaration (ITR) to 30 days (instead of 120 days) from the electronic transmission of the ITR data. The new directive came into effect on August 1, 2022.

For ITRs filed on or after August 1, 2022, the verification period for these has been reduced to 30 days. If you forget to check your ITR within the prescribed time, then it will be considered void.

“Data electronically will be the date of submission of the return if Form ITR-V is submitted within 30 days of the date of data transmission electronically. In the event Form ITR-V is filed after the deadline mentioned above, it will be considered that the declaration for which the ITR-V form has been completed has never been submitted and it will be the responsibility of the person evaluated to electronically retransmit the data and follow up on it by submitting the new ITR-V form within 30 days,” CBDT said in its latest notification.

Look at the six ways you can check your tax return:

Aadhaar-based OTP

Before trying to verify your ITR using Aadhaar based One Time Password (OTP), you need to ensure that your mobile number is linked to Aadhaar and registered as such in the database. Unique Identification Authority of India (UIDAI) data and your PAN must be linked to Aadhaar.

On the ‘e-Verify’ page, select ‘I would like to verify using OTP on the mobile number registered with Aadhaar’ and click ‘Continue’. A pop-up window will appear on your screen. You will need to check the box that says “I agree to validate my Aadhaar information” and click on “Generate Aadhaar OTP”.

An SMS with the 6-digit OTP will be sent to your registered mobile number. Enter the received OTP in the box where it is required and click submit. Upon successful submission, your ITR will be verified. OTP is only valid for 15 minutes.

Net banking

The second method of verifying ITR is through Net Banking. On the ‘e-Verify’ page, select ‘Through Net Banking’ and click ‘Continue’. Select the bank you want to verify your ITR with and click ‘Continue’. A pop-up window will appear on your screen containing a disclaimer. Read and click ‘Continue’.

Bank account

For verification, the third option is to generate an Electronic Verification Code (EVC) through their bank account. You must have a pre-validated bank account to be able to generate EVC. Keep in mind that pre-validation of the bank account is essential to receive the income tax refund.

Related News

ITR electronic verification time reduced to 30 days Check what happens if submitted after that

ITR electronic verification time reduced to 30 days. Check what happens if it is submitted after that

Related News

Record RTI deposit 7242 lakh RTI deposited in one day around 583 crore returns deposited till July 31

ITR Deposit: Record 72.42 lakh ITR deposited in one day; approximately 5.83 million returns filed through July 31

Demat account

The process of verifying ITR through a demat account is similar to verifying through a bank account as mentioned above. On the e-Verify page, select “Via Demat Account” and click “Continue”. The EVC will be generated and sent to your registered mobile number and email id with your pre-validated and EVC-enabled demat account. Enter the received EVC on your mobile number and email id registered with your Demat account and click e-Verify.


The EVC can also be generated via an ATM bank card. This facility is available only through limited banks which are – Axis Bank, Canara Bank, Central Bank of India, ICICI Bank, IDBI Bank, Kotak Mahindra Bank and State Bank of India. Go to your bank’s ATM and swipe your ATM card; enter your ATM PIN and select Generate EVC for the tax return. An EVC will be sent to your mobile phone number and email address registered on the e-filing portal.

Sending signed ITR-V / Acknowledgment of receipt

If you cannot verify your ITR using one of the electronic methods mentioned above, you can send a signed copy of the ITR-V (acknowledgment of receipt) to the tax department.

When did our phone numbers become the new identifier of the day?


While celebrating the 4th of July weekend in the United States during a DJ set by Bob Moses, my iPhone was stolen from my bag; luckily I still had my wallet and keys. Although I was able to observe the thief through “Find My iPhone” going to another concert hall the same night for other small theft attempts, I knew there was not much I could do.

Along with the normal feeling of being taken advantage of, I was also starting to feel more and more frustrated. No phone meant no contact with the rest of the world. Social media was irrelevant, as well as constant contact with my friends and family through the various chat apps I use – only the ones I communicate with via iMessage, thanks to the program on my MacBook. And though it was nice to take a break from my slight dependence on the phone and its many wondershe presented life’s greatest challenges.

Without a phone, I was stuck on personal, financial, social, and business accounts. Many services require a secondary authentication service, which is usually via SMS associated with a mobile phone number. “SMS”, or short message service, is a standard text message sent using a cellular signal instead of an internet connection, unlike iMessage, WhatsApp, Signal or other web messaging services.

SMS 2FA is a authentication protocol that is used after entering the standard password for a service — it sends a short one-time password to the user via a text message. It was a nasty surprise when I found out that SMS 2FA doesn’t include iMessage.

New day, new ID

When did our phone numbers become the new id of the day? The United States does not have a specific identifier to use to manage its population; instead, multiple identity documents such as social security numbers, passports, or state ID cards have traditionally been used to verify a person’s identity. But with the explosive rise of data breaches and identity theftit has become difficult for businesses and consumers to rely solely on these highly sensitive pieces of data.

Phone numbers are connected to most aspects of our lives. Thanks to the massive adoption of personal cell phonesthe evolution of digital ecosystems, and public awareness of how sensitive identifiers can be used — verification services had to look for other identifiers. And while that number isn’t really static like an SSN, it rarely changes. Just ask anyone who has moved to another country what the challenges are here. So it makes sense that more and more services are adopting phone numbers as their primary identity compared to traditional identity verification services. “Phone-centric identity“, using your mobile number with a password, is now being touted as the new, modern way to identify consumers.

All this to say that the 2FA phone and SMS numbers have been proven be insecure and ineffective identifiers. Usurpation, SIM card exchange, Remote Desktop Protocol, Man in the middle attacks and Social engineering are all common methods that criminals can use to effectively gain access to people’s phones and take control of their digital lives. Also, unlike messaging apps with end-to-end encryption, the SMS is integrated into the architecture of the mobile networks themselves. So the security of the SMS messages we send is inherently dependent on the security framework that our mobile carriers have, hopefully, and sometimes not completed integrated. And although this insecure authentication method is widely used, Forrester Research believes that SMS 2FA stops only 76% of attacks.

Alternative authentication methods?

Following my Kafkaesque nightmarepeers in the privacy community have offered to look at some sort of authenticator app, instead of SMS 2FA, as a safer and more efficient method of authentication. This version of 2FA or multi-factor authentication works similarly in that it generates an OTP that users must enter to access a service. Authenticator apps are typically refreshed every 30 seconds, so even if a criminal somehow gains access to the OTP, the likelihood of it working for them is minimized.

Unfortunately, it’s not common knowledge or easy to set up for the average consumer. Not all services offer alternatives to the 2FA SMS code option, and even when they do, setting up authenticator app support involves scanning a QR code, entering different keys, which I really couldn’t figure out, or only works with specific authentication services.

Authenticator apps are more commonly used in an enterprise context to Purposes of single sign-on (SSO) than they are by individuals alone. A tech-savvy friend showed me three different authentication apps on his smartphone, which still didn’t cover all the services that require a secondary form of authentication. And to add insult to injury, I couldn’t even use those authenticator apps during the multi-day phone-free period.

The future of phones and IDs

Despite the relief I felt at having a cell phone again, the whole situation left me feeling uneasy about our overreliance on these numbers. It may be a paternalistic thought, but I don’t see how a “reasonable user“could easily take preventative measures to secure their number and manage their digital livelihoods in the event a criminal steals more than their physical device.

Ideally, there would be a multi-party effort between mobile networks, device manufacturers, operating systems and major digital service providers to create a more streamlined, secure and seamless method that average users could enable to access services and protect their accounts and identities.

More likely, we will see less effort from passionate speakers looking to make a difference in this space. An exciting proposal is around decentralized identity: Users would have a “wallet” that stores their credentials and personal information, which includes verified identity details that one would need to provide eligibility to complete a transaction. This information is “signed” by several trusted authorities to prove its accuracy. And instead of relying on passwords, non-phisifiable cryptographic keys would authenticate users to the services they use.

The technology is still new and would result in significantly less data companies process about users – which is arguably good for user privacy/security and not so good for companies monetizing user data. But perhaps there will come a day when digital services and the users who transact with them will widely embrace such a proposition.

Until then, I’m not taking my eyes off my new phone.

FCC: Fraudulent text messages on the rise


The Federal Communications Commission warns of a substantial increase in smishing and fraudulent text messages targeting consumers, with 2022 on track to nearly triple what was reported to the commission in 2019.

According to the FCC, which tracks complaints about fraudulent calls and texts, there were about 8,500 such complaints through June 30, 2022, which is expected to rise for the fourth consecutive year.

The commission says spam complaints have risen steadily, from around 5,700 in 2019, 14,000 in 2020 to 15,300 in 2021. If the second half of 2022 is as busy as the first half, complaints would triple almost what was reported in 2019.

The FCC says the smishing texts have included “false but credible claims” that use fear and anxiety to get the user to interact. The messages contain false information about unpaid bills, package delivery issues, back account issues, or law enforcement action against the user.

Read more: Concerned about phishing and smishing attacks? The ICP can help you.

While some are financially motivated, others try to collect personal information or confirm a number is active for use in future scams.

Users are requested not to reply or click on any links contained in the message. Instead, users should independently research contact information and contact the suspected sender directly to verify the message.

To identify a smishing attack, the FCC says users should look for unknown numbers, misleading information, misspellings, longer phone numbers, sales pitches, and incomplete information.

In addition to not interacting with suspicious text messages, the FCC advises users to delete all texts, update their mobile device and security apps, install anti-malware software, and review scanning tools. text blocking.

The FCC is currently considering a rule that would require cellphone companies to block suspected illegal bots and examine how caller ID technology can be applied to text messaging, in addition to other measures being taken in partnership with the state attorney general.

Utilities Marketplaces Take Bold Steps to Increase Awareness


To meet ever-changing customer needs, utilities are increasingly launching online energy markets. However, with an average conversion rate for e-commerce sites between 2% and 3%, utilities remain a small part of an already crowded market.

To increase customer awareness and drive traffic, utilities are taking bold steps to differentiate their marketplaces from the plethora of options in today’s e-commerce landscape.

“I think utilities are realizing that if they don’t bring energy efficiency solutions to their customers, someone else will,” says Ryan Prestel, vice president of business development at Questline. Digital. “Utilities are looking for ways to meet customers where they are and offer them choices. They want to be seen as trusted advisors who provide proactive solutions to their clients. »

Education meets e-commerce

According to Felicia Chiles, director of marketing at FirstEnergy Corp., utilities should first view their marketplace as an educational resource, and second as an e-commerce platform. FirstEnergy has partnered with ibex, a company focused on creating customer experiences, to create a comprehensive energy marketplace designed to guide customers through their journey to smart home automation.

“When we entered the marketplace space, we didn’t want to be a point solution like Best Buy or Amazon where a consumer buys one thing and moves on,” Chiles says. “Our goal was to create a marketplace where our customers can go to a trusted resource for more information on smart home automation and energy efficiency, as well as to purchase products.”

Smart home automation is a complex subject – that’s why educational content is key to giving customers the confidence to make big purchases, like a smart home security system. Marketplace resources can be purely educational or provide step-by-step instructions on how customers can install or use the products. FirstEnergy House is peppered with in-depth content, including blog posts, interactive infographics, and videos, to help answer common customer questions.

“E-commerce success takes more than selling — it also takes giving back,” says Charlie Garcia, editor at WP Dev Shed, a website development company. “By helping your target audience find answers to their everyday problems, you become useful.”

Build it and they will come?

While utilities build e-commerce sites with the best of intentions, marketplaces are not a “build it and they will come” solution. Before customers can visit a market, they must first know it exists. That is why ongoing promotions are essential for raising awareness.

“Utilities will wonder why they are not attracting visitors to their market. My question for them is, ‘Do your customers even know this exists? Have you done anything to educate them on the benefits and how to use it? “Says Prestel. “You can’t expect customers to find your market and discover it on their own. If you don’t make it easy for them, they’ll just go somewhere else.

FirstEnergy Home uses blog posts, videos and informational graphics to educate customers about products on the market and how they fit into their daily lives. Content is shared in emails, on social media and throughout the website to keep the market top of mind with customers. The utility also takes advantage of seasonal changes and milestones, such as moving, for relevant and timely product promotions.

“There are different ways to use smart home automation that customers haven’t really considered before,” Chiles says. “Back to school, for example, is the perfect time to promote the benefits of smart home products to parents whose children are going home alone. We invest a lot of time and effort in content and promotions.

The power of personalization

Utilities are leveraging personalized content to reach segments of customers, whether they are tenants, homeowners, new families or seniors. An example is sending personalized market promotions to tenants with energy efficiency products ideal for apartment living. With the right message, public services can deliver value to a target audience.

“If done correctly, email marketing can be a very effective consumer engagement approach,” says James Rehm, chief operating officer at Skuuudle, a retail analytics firm. . “The goal here is not to send an email to your customers, but to do it correctly and with the right message. Never overdo it.

The utilities also use behavioral emails, triggered when a customer leaves a page, abandons their cart, or makes a purchase. For example, when a customer purchases a smart thermostat from FirstEnergy Home, they automatically receive an email with information about the utility’s installation services.

“It saves customers from having a frustrating experience and helps us manage returns,” Chiles says. “Once they get home and find the installation a bit tricky, they know we have a service available to install the product for them.”

Taking customization a step further, FirstEnergy Home bundles select products and services to meet the unique needs of different customer segments. For example, the Utility’s Energy Efficiency Starter Kit includes a Google Nest, Google Nest Thermostat and Sengled Smart Wi-Fi LED bulbs. we know they work well together,” Chiles says. “It makes it easier for them to get into smart home automation.”

Customer experience expectations

Utilities are revamping their marketplaces to ensure customers have the kind of user experience they expect from other e-commerce sites. For example, utilities organize products into easy-to-find categories, provide customer reviews, use abandoned cart emails, and other e-commerce best practices.

“The consumerization of everything is upon us, and utility customers expect the convenience, flexibility and choice they’ve become accustomed to in their daily lives,” Prestel says. “Traditionally, utilities weren’t able to provide a comparable experience, but that’s changing. In the future, an exceptional customer experience will be a requirement, not an asset. »

A key component of a quality customer experience is an easy-to-use, intuitive website that makes it easy for visitors to find products, services and educational resources. The more complicated an e-commerce site is, the less likely customers are to return in the future.

“The easier a site is to use and use, the happier the customer will be and the more likely they are to come back to it,” says John Cammidge, CEO and founder of e-commerce and advertising firm JTC Consultants. “Your site is a reflection of your brand, so it’s vital that it works fully across all formats. Many companies neglect to optimize their sites for mobile use, which causes them to miss out. Usability is crucial.

According to Cammidge, using industry best practices in the payment process builds trust and ensures a smooth and streamlined process. Additionally, utilities should be clear about shipping and other potentially hidden costs at the outset of the transaction.

“It builds trust and allows the customer to make an informed decision,” says Cammidge. “Limit the number of clicks needed to complete the payment and make the process as easy as possible for your customer. Putting the customer journey at the center is the best way to increase your chances of success.”

great expectations

As more and more customers shop for smart homes and energy efficiency, online marketplaces will be an expectation in the future. Utilities must find ways to differentiate themselves from their competitors and provide customers with the personalized experience they want. With the right strategy and user experience, marketplaces are a great opportunity to deliver value, be a reliable energy resource, and improve long-term customer satisfaction.

“We don’t want to compete with the distribution giants. It would be a waste of time,” Chiles says. “What we can do is play our own game…Offer products and services in a unique way and be a trusted advisor to our customers.”

Now just scan the QR code to pay your electricity bills in Goa | Goa News

PANAJI: The Goa Electricity Departmentwhich continues to make technological advancements to improve the consumer experience, became the second government utility in the country to launch the dynamic QR code system for bill payment.
Through the system, which was launched on Saturday, a QR (quick response) code will be printed on each consumer’s electricity bill, allowing them to make payments in seconds.
“The consumer will simply need to scan the QR code using apps such as Google Pay, Amazon Pay, Bhim, PhonePe, etc. The invoice details along with the amount to be paid will appear on the screen. The consumer n just press the ‘pay’ tab and the payment will be complete,” said a department official.

“Payment details will appear on screen and the consumer will also receive an SMS alert. The whole checkout process can be completed in seconds. QR code-based payment is more efficient, less time-consuming, error-free, more secure and tamper-proof,” the official said.
Union Minister of State for Ports, Shipping, Waterways and Tourism, Shripad Naik, launched the QR code on electricity bills on Saturday during a program at the Menezes Braganza Institute in the presence of Food Secretary VYYJ Rajasekhar, Chief Electrical Engineer Stephane Fernandesand others.
The function was part of the grand finale of Ujjwal Bharat, Ujjwal Bhavish Mahotsav celebrated across the country to highlight achievements in the power sector over the past eight years and the vision to 2047.
Naik appreciated the department’s initiatives as part of the goal of making it easier to do business and to provide service to consumers even during difficult times.
The QR code, he said, will be an additional easy payment option for consumers.
Rajasekhar paid the first electricity bill using the program’s QR code. Fernandes gave a presentation on the workings and benefits of the QR code and various other payment initiatives offered by the department. He also said the department ranks second in the country in the number of digital transactions.

Callers say “Can’t get through”; Callies say “I don’t want to let them through” – OpEd [Eurasia Review] – InsuranceNewsNet

Callers say “Can’t get through”;  Callies say “I don’t want to let them through” – OpEd [Eurasia Review] – InsuranceNewsNet

Most of us play the two roles of caller and called. Guess which role reigns? La Callee. I’ve lost count of how many older adults tell me, week after week, how hard it is to hit powerful Callees. Especially over the phone! These include your local electricity, gas and telephone company, your bank and insurance company, your members (or their staff) of Congress, your local, state and federal government agencies. It has never been so.

Imagine the days when you picked up your phone, dialed a number and communicated with a human being. You couldn’t be misled by the evasive robotic operator who gives you the “press one, or two, or three or four” exercise. Unfortunately, when you select “one”, you often get another auto-save. At some point you get a voicemail opportunity which is really a voice fail.

Oh, say the younger ones – how about trying email or text messaging? Clutter, filters, distractions, and sheer overload cannot adequately describe the ways the Callees can keep you from communicating with a human. The harder it is, the more people repeat their attempts, and the more overload there is for digital gatekeepers. Call it the Callees power plays.

The Bureau of Labor Statistics measures white-collar labor productivity. If they measured the billions of hours wasted by people trying to get through to get their jobs done, white-collar labor productivity would be far below where it is today.

Here are some areas of abuse. Our Constitution The First Amendment protects more than freedom of speech, press, and religion. It adds the “right to request the government to obtain redress for grievances”. “Grievances” include more than personal slights or injustices, such as petitions to get the government to adopt or repeal policies, practices or other behaviors. I am sure to say that the members of Congress and their staff have never been more insensitive to serious petitions (letters, calls, emails and old-fashioned petitions) on important issues than they are today.

Their quick responses are reserved for donors and ceremonial requests (diplomas, birthdays, weddings, funerals and friends). Civic groups supporting legislative priorities already chosen by a member find that their staff has a working relationship with a congressional office. But try to reach a member of Congress to sponsor a congressional hearing or expand their portfolio into urgent new arenas – yes, keep trying.

It is almost impossible to reach even the friendly members (or senior staff) of Congress on serious issues of undeclared wars, starving IRS budget to aid and abet the massive tax evasions of the super-rich and big corporations, the serial and lawless dismissals of the authority of Congress under the Constitution speak White Houseor even reinstate congressional committee staff that Newt Gingrich cut in 1995 when he knocked down the House Democrats. No answers everywhere.

It is so serious that we have written to each member of Congress and asked them what their office’s policy was on responding to serious communications. Only one out of 535 offices responded.

Of course, there’s the absorbing activity known as “constituent service” — intervening for people at home who don’t get answers from federal agencies for their personal complaints. Some responsiveness to voters’ personal stories is widely seen as good for re-election. (See my column, Does Congress need an ombudsman to handle its case? https://nader.org/2022/04/30/does-congress-need-an-ombudsman-to -look-after-its-case -work/, published in the Capitol Hill Citizen newspaper – https://www.capitolhillcitizen.com/).

If the Congress in the sixties and seventies was as callous as Congress It was today, ironically in the midst of the communications revolution, that we could not have enacted key consumer, environmental, worker safety and health laws, the Freedom of information and other laws. Obviously, if you can’t communicate consistently with all 535 members of Congress and staff, who are given massive sovereign powers by “We the People” (right in the preamble of our Constitution), you can’t even start doing anything American parliament.

There is one exception that destroys democracy – corporate lobbyists who grease the system with campaign money and assorted incentives and temptations in real time and in the future. Lobbyists for the oil, gas and coal industries, banking, insurance and brokerage firms, military weapons manufacturers, drug, hospital and nursing home chains, medical practices corporate lawyers, corporate media and other similar greed have access to it. They obtain the private cell phone numbers of our elected officials as they invite members and staff to lavish gatherings and tour packages, as well as more formal fundraisers or political action committee venues (PAC).

This phenomenon of incommunicado of elected officials vis-à-vis civic communities is a process of control by the powerful over the less powerful. Don’t make a mistake. This same story of two access systems is everywhere. The big banks (Bank of America is one of the worst) and utility companies have algorithms that tell them how they can hire fewer customer service workers if they can keep consumers waiting on taped lines or not answering emails and to letters. Big companies want customers to give up.

The courts are also guilty. People have complained that they can’t even reach small claims court for hours on end. The Postal service not known for quick phone calls, still under control of Trump’s nominee Louis DeJoy. Not to mention what G.O.P. made at the IRS regular taxpayer response budget.

But some companies are a bit more responsive, like FedEx or your small local retail family business.

Lack of access is a serious problem that degrades quality of life with increased stress and anxiety. And in some cases, during an emergency or disaster, failure to respond can have disastrous consequences.

Fifty billion robocalls a year have severely disrupted people answering the phone, even those from neighbors down the street. (The FCC and FTC simply don’t aggressively pressure communications companies to use the latest software to thwart these robocall outlaws). These agencies themselves are notoriously secrecy.

What to do ? Be louder. Favor politicians and marketers who are committed to having humans answer the phone and not keep you waiting, waiting, and waiting to give them your thoughts, business, and complaints.

Your suggestions, readers, will be welcome.

Reeves’ message to TROY graduates emphasizes integrity and service to others


Alumnus, former President of the Student Government Association and Mayor of Troy, Jason Reeves, on Friday encouraged Troy University graduates to be people of integrity and to take care of themselves and others .

Reeves, who has served as mayor of Troy since 2012, addressed the approximately 500 graduates who took part in the opening ceremonies for the summer inside Trojan Arena on the Troy campus. Recalling the University’s founding motto, “To Educate the Mind to Think, the Heart to Feel, and the Body to Act,” Reeves focused his remarks on an acronym for the first element of this mission – “Think.”

“The T in think stands for Time,” he said. “Time is the greatest resource you have ever been given. I encourage you to invest your time in the things that are important to you and will make a difference.

The second word Reeves pointed to was home.

“I want you to consider Troy and this college as a second home forever,” he said. “Whether you come from a wonderful home or a home where things weren’t so wonderful, you can build your home, that place of refuge for yourself and those you love.”

The third word Reeves emphasized was integrity, encouraging graduates to invest their time wisely in building integrity.

“Be people of integrity,” he said. “Be someone people can count on to be there no matter what. Be a person of your word. The world needs people of integrity more than ever.”

Reeves also stressed the importance of being “nourishing”.

“Feed yourself. You have to make sure you take care of yourself,” he said. “You have to be able to take care of yourself before you can take care of others. Be kind – being kind is nurturing. Our world lacks and needs people who will take care of themselves and others.

Finally, Reeves used the K in “Think” to remind graduates of the importance of being lifelong learners.

“The K in ‘Think’ stands for knowledge. Although we often think of commencement ceremonies representing the completion of your degree, that is just the beginning. Embracing knowledge and becoming a lifelong learner is what will carry you through in so many ways throughout your life. As you seek this knowledge, think about what you want to do with it. Use this knowledge to build your home life, to strengthen your wholeness, and to care for yourself, your community, and your world.

Friday’s commencement ceremony included graduates from 28 U.S. states, one territory and the District of Columbia, as well as nine countries outside the United States.

List of mobile apps currently infected with malware and malicious code


Like any technology, mobile apps can be infected with malicious code, or malware, intended to gain access to your mobile phone when you download the app. Although app stores do their best to prevent malicious apps from entering the store, monitor apps once they are included in the store and remove those they deem to be malicious, malware-infected apps. Malicious code and malware have proliferated and are an ongoing problem for users. An estimated 2% of the App Store’s top 1,000 apps are malicious, according to a report speak Washington Post.

According to the website The state of security“Three million Android users may have lost money and their devices were infected with spyware, after the official Google Play store was discovered to be distributing apps infected with a new family of malware. “

The Autolycos malware “spy on SMS messages, contact lists and device information, and subscribes unsuspecting users to expensive Wireless Application Protocol (WAP) services”. A list of affected apps includes: Funny Camera, Vlog Star Video Editor, Creative 3D Launcher, Wow Beauty Camera, Gif Emoji Keyboard, Freeglow Camera and Coco Camera. Another reason not to download a camera app.

hot hardware suggests users to remove a larger list of infested Android apps, which are part of the Android HiddenAds family, which have been installed over 10 million times:

“Here is an overview of the full list of apps that fall into the HiddenAds category…

  • Photo editor: beauty filter (gb.artfilter.tenvarnist)

  • Photo editor: retouch and crop (de.nineergysh.quickarttwo)

  • Photo editor: artistic filters (gb.painnt.moonlightingnine)

  • Photo Editor – Design Creator (gb.twentynine.redaktoridea)

  • Photo editor and background eraser (de.photoground.twentysixshot)

  • Photo & Exif Editor (de.xnano.photoexifeditornine)

  • Photo Editor – Filter Effects (de.hitopgop.sixtyeightgx)

  • Photo filters and effects (de.sixtyonecollice.cameraroll)

  • Photo Editor: Blur Image (de.instgang.fiftyggfife)

  • Photo Editor: Cut, Paste (de.fiftyninecamera.rollredactor)

  • Emoji Keyboard: Stickers and GIFs (gb.crazykey.sevenboard)

  • Neon Theme Keyboard (com.neonthemekeyboard.app)

  • Neon Theme – Android Keyboard (com.androidneonkeyboard.app)

  • Cashe Cleaner (com.cachecleanereasytool.app)

  • Fancy Loading (com.fancyanimatedbattery.app)

  • FastCleaner: Cashe Cleaner (com.fastcleanercashecleaner.app)

  • Caller Skins – Caller Themes (com.rockskinthemes.app)

  • Funny Caller (com.funnycallercustomtheme.app)

  • CallMe Phone Themes (com.callercallwallpaper.app)

  • InCall: contact background (com.mycallcustomcallscrean.app)

  • MyCall – Call Personalization (com.mycallcallpersonalization.app)

  • Caller theme (com.caller.theme.slow)

  • Caller theme (com.callertheme.firstref)

  • Funny Wallpapers – Live Screen (com.funnywallpapaerslive.app)

  • Auto Wallpaper Changer 4K (de.andromo.ssfiftylivesixcc)

  • NewScrean: 4D Wallpapers (com.newscrean4dwallpapers.app)

  • Wallpapers and Backgrounds (de.stockeighty.onewallpapers)

  • Notes – reminders and lists (com.notesreminderslists.app) »

Beware of these specific apps, but in general, research apps before downloading them, download only necessary apps, understand what data apps collect from you, and delete apps when you no longer use them.

Copyright © 2022 Robinson & Cole LLP. All rights reserved.National Law Review, Volume XII, Number 209

MLB Rumors: Is Yankees’ Joey Gallo finished thanks to Andrew Benintendi trade?


NEW YORK – As Joey Gallo’s struggles went from bad to worse to desperate, Aaron Boone pulled him aside.

“I try to remind him from time to time that he has all the equipment to still be good at it,” the Yankees manager said.

More than ever, it looks like Gallo will have to try and make it anywhere but the Bronx.

That’s because late Wednesday night — minutes after a 3-2 loss to the Mets at Citi Field — the Yankees acquired left fielder Andrew Benintendi from the Royals in exchange for a trio of lower-tier pitchers.


Benintendi will take over as the Yankees’ starting outfielder.

Gallo will be pushed out of the outfield rotation.

There will be no more places and the deadline for exchanges is Tuesday.

Want to bet on MLB?

See Top NJ Sports Betting Sites

Sure, the Yankees could keep Gallo for a few days. The easiest way for the Yankees to get Benintendi on the 26-man roster would be to go for Tim Locastro against Triple-A Scranton/Wilkes-Barre.

This could buy GM Brian Cashman time to move Gallo via trade rather than singling him out for an assignment, letting him go through waivers (because no team would want to claim him and his $10.2 million salary). for this year) and lose it for nothing via free agency. The Padres and Rangers are reportedly interested in Gallo, who the Yankees acquired from Texas for a prospect package in July 2021.

In 80 games, Gallo hit .161 with 12 homers and 103 strikeouts. It posted a .629 OPS and an 80 OPS+. Since joining the Yankees, he’s only posted a .664 OPS. In seven seasons with the Rangers, he had an .833 OPS.

Although he’s still considered a solid defenseman in right field, he hasn’t maintained his weight at the plate, and it’s not a question of if the Yankees will dump him, but when.

Please subscribe to us now and support the local journalism YOU rely on and trust.

Brendan Kuty can be reached at [email protected].

Hacked your social media account? You’re not alone, experts say – NBC Chicago


Whether you like to admit it or not, Facebook has become an integral part of many lives.

It’s a way to connect with family and friends, or for businesses to thrive and reach new customers. But frustration is growing for many Facebook users who say they were locked out of their accounts after hackers hacked into their login details and changed their passwords.

Many cybersecurity analysts say these types of social media account takeovers are happening more often these days, in part due to the value associated with social media account information being sold on the dark web.

Social media credentials, according to some accounts, are more valuable than social security numbers and other personally identifiable information, experts say.

For users who lose their account, starting a new page is not an easy solution after spending so much of their life tied to their social identity.

“Facebook is good for networking, building relationships and maintaining relationships,” life coach Koren Utley said, adding that her page has helped her connect with many members of her community who rely on her. she. “I am a trusted voice in my community, I am a trusted business owner.”

Utley said her profile is also the repository of her most meaningful memories.

“My mother passed away two years ago,” Utley explained. “And so I have a lot of memories, pictures of my mom on Facebook.”

You can imagine her anxiety when this month Utley said she had been removed from her profile, which was also used for her ‘Bold and Brilliant’ life coaching business.

Utley’s account was hacked by hackers, and it happened within minutes, she says. It all started with a direct message to his Facebook Messenger inbox.

“Someone from my church reached out and said, ‘Hey Koren.’ Very simple message,” Utley explains. “And I said, ‘Hey, how are you?’ And in 60 seconds, my page was hacked.”

Utley is adamant she didn’t click on any links or share any account information with the person. She said all she did was respond to the direct message, and that was all it took.

Experts say a “chain of victimization” can occur when hackers use a Facebook account to compromise other followers.

Come and find out, Utley said, the “old friend from church” who reached out had also had his Facebook account hacked days before, causing a domino effect from one profile to another.

“I just never thought this would happen to me,” Utley said now, reflecting on that whole ordeal. “I thought my page was secure. It just didn’t happen.”

Utley is not alone. NBC 5 Responds has heard from many Facebook users over the past month who said they don’t have access to their profiles.

Libertyville teacher Tracy Aleckson contacted NBC 5 after her 12-year-old’s account was hacked last month.

“Honestly, I literally cried,” Aleckson said. “I was so frustrated.”

Adding insult to injury, Aleckson said the hackers, impersonating her, shared material that violated Facebook’s “child sexual exploitation standards.” She only knew this because she had received an email informing her that the account was suspended.

Tracy Aleckson said Facebook deactivated her account before she could explain what happened.

For Utley and Aleckson, they both said in the days following the hacks that they couldn’t reach anyone on Facebook, now called Meta, for help.

“You have this billion dollar company and you have no way to contact them,” Aleckson said.

“Hundreds of people tried to contact them to report the page,” Utley said. “And they all got the same message: there’s nothing they can do.”

After NBC 5 Responds contacted Facebook about Utley and Aleckson’s profiles, Utley was able to get his account back. Aleckson is still trying to get his account back.

The social media giant wouldn’t comment on what might have happened, or the situation Utley detailed about hackers accessing his account through a direct message.

Koren Utley turned to NBC 5 Responds for help when she couldn’t get in touch with Facebook.

Cybersecurity experts we spoke to said they hadn’t heard of this specific iteration of fraud, but admit that hackers are constantly evolving in their tactics.

These same experts had heard of hackers sending images via messages that could contain malware that could take control of a person’s device, but in Utley’s case, she said no images had was shared before his account was hacked.

Yet the issue of “social media account takeovers” has become rampant in many forms over the past few years.

“It’s really exploded in the last 24 months,” said Eva Velasquez of the Identity Theft Resource Center, adding that the center has seen first-hand a dramatic increase in cases.

“We’ve spoken to thousands of people over the past two years who are going through this experience,” Velasquez said. “Victims whose social media accounts – Facebook, Instagram, among others – were taken over.”

A common trend has emerged, Eva said, of hackers taking advantage of a user’s followers on their profiles, much like what happened in Utley’s case.

“Bad actors have found they do much better when an individual feels like they’re talking to a friend,” Eva said. “And so taking over those accounts can lead to that chain of victimization.”

Protect your social media account against attacks

Most of the ways NBC found 5 to protect your social media accounts are preventative measures to take before this happens.

It’s all about good digital hygiene.

Strengthen your password

The Identity Theft Resource Center recommends using a strong, unique password, up to 12 characters or more.

“Don’t use a password you’ve used on other accounts,” Velasquez said. “It can be a passphrase or something you can easily remember.”

Additionally, setting up two-factor authentication for profile changes, like passwords, can alert you to an account invasion and keep hackers out.

Back up your photos and information

Another important point to consider is storing your information in multiple places.

Having photos and other information you might need saved somewhere other than your account can help in case something happens to your profile.

“Do a health check of your social media accounts,” Velasquez said. “Make sure you have no stored data, photos, contacts and items only [on your social media account] so that if the worst happens, you have backups.

For really meaningful photos, videos, and important information, it is also recommended that you store these backups separately from your device.

“If you only have your photos stored on Facebook, get a thumb drive, hard drive, store them somewhere else, so you have a copy if anything happens to that account,” Velasquez recommends. “It will certainly make it less traumatic if you are unable to recover the account.”

Are you eligible for “Facebook Protect”?

Some Facebook users are eligible for something called Facebook Protect, an enhanced security feature the company rolled out last March.

Facebook Protect adds more security to a user’s account, including two-factor authentication and additional staff checks for hacking threats.

This feature is not available to all users. The company’s website said it was “a security program for groups of people most likely to be targeted by malicious hackers, such as human rights defenders, journalists and government officials”.

It’s unclear if Facebook plans to roll out the feature more widely.

To learn more about Facebook Protect and whether you can use it, click here.

If your account is already hacked, what can you do?

Many Facebook users who contacted NBC 5 for help said their attempts to get help on Facebook after their accounts were hacked were unsuccessful.

This has also been noticed by cybersecurity experts.

“They don’t have dedicated customer service. You can’t actually talk to a person,” Velasquez said. “It’s good when things are going well. But when there is significant fraud or litigation, it creates a real problem.

Users are encouraged by the company to visit this webpage to attempt to recover their account.

If your profile is a business account or is used for your business, be sure to highlight this when contacting Facebook for assistance. This can speed up a response from Facebook’s side.
More useful information from Facebook can be found here.

Free useful resources

Experts also say users shouldn’t feel embarrassed or ashamed if this happens to them.

“We really want to encourage people not to be embarrassed or ashamed, not to think they should know or understand these things, and to get help if they need it,” Velasquez said. “It’s a really complicated space and not everyone can know everything about it.”

To learn more about the Identity Theft Resource Center, including how to access its many free services and advice, click here or call 1-888-400-5530

Do you have a consumer complaint? Call 1-844-NBC-RESP or click here to let us know so we can help you.

Vodafone Idea customers can now send outgoing SMS without a dedicated SMS plan


Vodafone Idea will finally allow users to send forwarding messages even without a plan that offers SMS benefits. This is a significant development as Vi customers were previously forced to get more expensive packages to receive SMS. This new move will give users more freedom to move outside the network, if necessary. Also Read – Vodafone-Idea updates its Rs 409 and Rs 475 recharge plans with more daily data

Vodafone Idea’s new decision comes months after TRAI asked the country’s telecom operators to allow users to send text messages without a dedicated texting plan. The TRAI announcement was made in December last year. Also Read – Google and Vodafone team up to extend Wear OS smartwatch battery life

What is a forwarding message?

After the introduction of Mobile Number Portability (MNP) support in India in 2011, users were able to exit their current network by transferring to another. In order to trigger a port request, the user can send a message to the number 1900. This message is called a port-out message. Read also – Vodafone Idea prepaid top-up plans: Free Disney+ Hotstar offered with these data packs

However, there was a big flaw for those who had a valid top-up plan that didn’t support texting. They couldn’t send a transfer message from their phone even if they had a balance. This problem has been solved. However, it should be noted that SMS will not be free. Charges will be deducted from the user’s talk time.

How to wear

Now, if a Vodafone Idea customer wants to port, they can follow these steps:

Send message PORT at 1900

Once you send it, you will receive a message with UPC (Unique Porting Code)

Take this UPC code to the carrier you wish to transfer to

There they will ask you for some basic documents in order to complete the porting process

At the end of the process, you will get a new SIM card from the other operator.

It will be activated after some time

The same process can be repeated when transferring from any other network operator to Vodafone.

US watchdogs scrutinize UBS over staff messaging


ZURICH (Reuters) – U.S. regulators are examining whether UBS Group properly documented communications between staff as part of a broader industry investigation, the Swiss bank said in notes to its second-quarter results on Tuesday.

Last year, Reuters reported that the U.S. Securities and Exchange Commission (SEC) was investigating whether Wall Street banks had adequately documented employee work-related communications, such as text messages and e-mails. -mails, during the pandemic work-from-home period.

In December, the SEC and the Commodity Futures Trading Commission (CFTC) fined JP Morgan Securities $200 million for “widespread” failures to safeguard staff communications on personal mobile devices, messaging apps like Whatsapp and emails.

“The SEC and the CFTC are investigating UBS and other financial institutions regarding compliance with document retention requirements relating to commercial communications sent via unapproved email channels. UBS is cooperating with the investigations,” UBS said in a statement. its quarterly report.

Bank of America said last week it had set aside about $200 million for a regulatory matter related to the unauthorized use of personal phones.

(Reporting by Michael Shields; Editing by Kirsten Donovan)

Copyright 2022 Thomson Reuters.

Hulu does not run political ads on major issues in the Democratic midterm campaigns



Disney-backed streaming service Hulu is refusing to air political ads on central themes of the Democratic midterm campaigns, including abortion and guns, angering candidates and party leaders.

The streaming service popular among young voters, which has a policy against airing content deemed controversial, is like other digital providers in that it is not bound by the Communications Act 1934, a law that requires television networks to provide politicians with equal access to the airwaves.

The Democratic Senate Campaign Committee, the Democratic Congressional Campaign Committee, and the Democratic Governors Association attempted to buy joint abortion and gun ads with Hulu on July 15, as well as identical placements on a Disney-affiliated ABC affiliate in Philadelphia and on the company’s ESPN cable sports channel. The Hulu commercials never aired, unlike the others.

“Hulu’s censorship of the truth is outrageous, offensive, and another step down a dangerous path for our country,” the three committees’ executive directors, Christie Roberts, Tim Persico and Noam Lee, said in a statement provided to the Washington Post. “Voters have a right to know the facts about MAGA’s Republican agenda on issues like abortion — and Hulu is doing the American people a huge disservice by preventing voters from learning the truth about the tally of the GOP or refusing to allow these issues to even be discussed. ”

The party committees join a growing list of Democratic candidates who have had spots mentioning gun violence, abortion or political violence rejected by Hulu.

Suraj Patel, a Democratic candidate for Congress from New York, posted a protest letter, first reported by Jezebel, to Disney CEO Bob Chapek and Hulu President Joe Earley complaining that a representative of Hulu had told his campaign that there was an “unwritten Hulu policy”. who deemed the subjects of one of his advertisements too “sensitive” for the platform. The ad in question mentioned Republican successes on abortion, climate change and gun violence, while showing footage of the violence from the January 6, 2021 attack on the US Capitol.

“Failing to address these topics in my campaign announcement is failing to address the most important issues facing the United States,” Patel wrote. “Your ban on mobilization messages has a perverse effect on democracy.”

Patel said in an interview on Sunday that the ad was cleared to run after editing it, replacing the word “climate change” with “democracy” and replacing images of violence in the US Capitol with images of the former President Donald Trump. He did not receive a response from Chapek or Earley, he said.

“This policy has incredible implications for people nationwide, both voters and candidates,” Patel said. “You need to communicate with young voters about the media they watch. The cable is not where they look.

Hulu contacted Patel’s campaign on Monday afternoon, after this story was initially published that morning, to say that his original ad would be accepted, including the January 6 violence footage.

“I want to thank Hulu for connecting Americans with the most pressing issues of our time,” Patel said in a statement after the approval. “Sometimes a simple conversation can change things.”

A person familiar with Hulu policies, who spoke on condition of anonymity to discuss internal matters, said the decision to approve Patel’s ad was made before Monday, although she did not was immediately communicated to his campaign. This person said the company does not publicly disclose its advertising guidelines, but does prohibit advertising that takes a position on a controversial issue, whether or not it is political advertising. Ads are reviewed on a case-by-case basis, with changes sometimes recommended to advertisers.

In recent months, the company has reassessed its policy implementation to give candidates greater flexibility in explaining their positions, the person said.

“We welcome job postings from candidates that reference these topics,” this person said of abortion and gun violence. “It has to be in context.”

Disney and Hulu declined through a spokesperson a request for comment.

Blocked ads do not use violent or discordant images. A spot lists statistics on the harms of gun violence and criticizes Republican efforts to block more gun regulations. The other warns that Republicans are trying to “snatch” access to abortion without exception for rape, incest or the lives of those who are pregnant.

Disney faced a distinct backlash from employees earlier this year after company leaders declined to make a public statement opposing a Republican bill in Florida that banned teachers from discussing sexual orientation or gender identity with young students. Chapek then backtracked, apologized to his workers, criticized the Republican measure and froze campaign contributions in Florida.

Florida Governor Ron DeSantis (right) responded by signing a bill to strip Disney World of its special tax status near Orlando.

“It’s really problematic that a company has been so synonymous with parents of young children to speak out against the Parents’ Rights Bill,” DeSantis said.

Tracking firm Kantar Media predicts $7.8 billion will be spent on political advertising for the 2022 election season, including about $1.2 billion for over-the-top and connected television spending, a category that includes ads served through streaming services and set-top boxes. like Roku. Streaming spending, according to Kantar, is “the new darling of politics.”

But streaming services have proven more difficult for political buyers to negotiate. Disney has told advertisers that political and alcohol ads will not be accepted on Disney Plus, a separate streaming service, when it launches an ad-supported version later this year. Netflix announced this month that it was developing an ad-supported version with Microsoft, although the company did not elaborate on its advertising policies.

Democratic concerns about Hulu’s advertising policies have been exacerbated by the company’s vague and sometimes contradictory communications with ad buyers. Three days after placing the ad buy, the three Democratic committees were notified by Hulu through a provider that the delay was “content-related,” according to a person familiar with the events, who also spoke on condition of anonymity to discuss the internal process. .

The following day, Democrats scheduled a call with Hulu to discuss the matter, but Hulu officials canceled the call just as it was about to begin, suggesting over email that they reschedule “more late in the day,” the person said. Hulu officials did not communicate further that day.

A lawyer for the Democratic committees sent two emails and called twice the next day, in an attempt to restart the discussions, without receiving a response, the person said. The next day, Thursday, Lance Delaney, account manager in Disney advertising sales, emailed to say, “We have received creative approval,” only to follow up a few hours later with a message stating “This message was sent in error.”

Patel’s campaign received a similar message from a Hulu representative on Thursday, asking him to resubmit the original ad. He said the Hulu executive suggested “they were having some kind of meeting and the standards were changing.” The next day, Patel said, the campaign was notified that the original ad would still not run. On Monday he found out it would work.

This isn’t the first time Democrats have been angered by digital vendors refusing their ads. During the 2020 campaign cycle, Priorities USA Action and Color of Change PAC, two independent liberal groups, had ads rejected by Hulu, Google and Verizon that showed clips of police beating protesters during protests this summer against the police brutality.

“Anti-violence content policies were clearly put in place for good reasons, but we are not living in reasonable times,” Jenn Stowe, deputy executive director of Priorities USA, said in a statement at the time.

Roaming Mantis Financial Hackers targeting Android and iPhone users in France


Mobile threat campaign tracked as wandering mantis has been linked to a new wave of compromises directed at French mobile phone users, months after expanding its targeting to include European countries.

As many as 70,000 Android devices are believed to have been infected as part of the active malware operation, Sekoia said in a report released last week.

Attack chains involving Roaming Mantis, a financially motivated Chinese threat actor, have been known to deploy a piece of banking Trojan named MoqHao (aka XLoader) or redirect iPhone users to malware collection landing pages. credentials that mimic the iCloud login page.

cyber security

“MoqHao (aka Wroba, XLoader for Android) is an Android Remote Access Trojan (RAT) with information-stealing and backdoor capabilities that likely spreads via SMS,” Sekoia researchers said. . said.

Roaming Mantis Malware

It all starts with a phishing SMS, a technique known as smishing, tricking users with parcel delivery-themed messages that contain malicious links, which, when clicked, proceed to download the malicious APK file, but only after determining if the victim’s location is within French borders.

Roaming Mantis Malware

If a recipient is located outside France and the device’s operating system is neither Android nor iOS – a factor verified by checking the IP address and the User agent string – the server is designed to respond with a “404 Not found“status code.

cyber security

“The smishing campaign is therefore geo-fenced and aims to install Android malware, or collect Apple iCloud IDs,” the researchers point out.

MoqHao generally uses areas generated through the Duck DNS dynamic DNS service for its first stage delivery infrastructure. Additionally, the malicious app impersonates the Chrome web browser app to trick users into granting it invasive permissions.

The spyware trojan, using these permissions, provides a pathway for remote interaction with infected devices, allowing the adversary to stealthily harvest sensitive data such as iCloud data, contact lists, history calls, SMS messages, among others.

Sekoia also assessed that the data amassed could be used to facilitate extortion schemes or even sold to other threat actors for profit. “more than 90,000 unique IP addresses that requested the C2 server distributing MoqHao,” the researchers noted.

Lifesaving devices appear on the shore of Oak Island, as the community rallies for safety on the beach

Community members are taking concrete steps to improve beach safety, including people setting up lifeguard stations in front of their homes and organizations seeking to raise money to equip city-approved stations at all 65 beach access points. ‘Oak Island. The move comes as the island experiences four drownings in the first month and half of the season. (Courtesy picture)

OAK ISLAND – Weeks after the fourth tourist of the season drowned on Oak Island, community members are taking concrete steps to increase safety on the beaches.

Island spokesman Mike Emory told the Port City Daily that if funds were provided by local organizations to install lifesaving devices, the city council would likely review its implementation. The opportunity did not take long to present itself.

READ MORE: ‘Four deaths this year is so devastating’: The cost of no lifeguards on Oak Island

Beachgoers may soon see a water rescue station at all 65 public beach accesses, thanks to an initiative brought to the city by the Jack Helbig Memorial Foundation (JHMF).

Last week, Foundation President Melanie Roberts and Executive Director and Founder Kelly Helbig met with City Manager David Kelly, Oak Island Water Rescue (OIWR) Chief Peter Grendze and Police Chief Charles Morris to discuss the station funding. According to Helbig, the proposal was “welcomed” and Roberts said they expect a response from the city early next week.

JHMF has already installed and funded 14 rescue stands on Caswell Beach and five rescue rings on the Southport waterfront in conjunction with Eagle Scout candidate Jackson Enis. Adding them to Oak Island comes as controversy over whether the city should have lifeguards continues.

Lifeguards were once stationed on a section of the island called Long Beach in the early 1990s, before it merged with Yaupon Beach to form Oak Island. Officials say it would be too expensive to cover its 10 miles of beach with current tax limitations.

At the Oak Island council meeting on July 12, Pro Tempore Mayor John Bach suggested the city add warning signs to its “comprehensive messaging plan.” Organizations like JHMF, Southport Rotary Club and OIWR have already installed signs at each beach access to educate the swimming public, each equipped with QR codes that link to a virtual rip current hazard flag. Council did not discuss funding or take a formal vote on adding warning signs.

JHMF donated $1,800 to the signage initiative. Adding salvage canisters to Oak Island’s 65 beach accesses will be a bigger undertaking. Each station will be equipped with red rescue tubes, similar to those already installed at Caswell Beach, and will cost around $250 each.

Total funding could exceed $16,000 and JHMF’s proposal includes a start-up grant of $10,000 for installation costs and an annual maintenance budget of $2,000. Helbig says the community seems keen to fill in the gaps for anything that JHMF or the city wouldn’t cover.

“I’ve seen so much support from the community through social media,” she said. “I’ve already had a few people want to donate and sponsor, which is amazing.”

As details continue to be ironed out, Helbig said a “take a stand” initiative has been discussed as a way for community members to get involved. The idea is that with a donation of $250 or more, a donor will have a plaque affixed to their sponsored post with an inscription or dedication.

JHMF’s proposal wasn’t the only one shared with the city this week.

Bruce Ivers considers Oak Island his home beach even though he lives in St. James Plantation, a community less than 8 km from the island. He, too, reviewed the installation of a water rescue station between 71st and 72nd streets near the St. James community’s private oceanfront beach house in May, before the last three drownings this year. have not taken place.

Ivers said he mentioned the idea to Oak Island Mayor Liz White on May 25, who in turn seemed receptive, aside from a few questions about logistics. After the July 3 drowning, Ivers penned an 11-page proposal in hopes of addressing the mayor’s concerns and further considering the plan.

Last week he met with St. James Mayor Jean Toner, who backed him up, Ivers said. He also sent an official copy of the proposal to White. The city and Mayor White did not respond to a Friday request from the Port City Daily for confirmation of receipt of Ivers’s proposal.

Ivers consulted with members of the United States Coast Guard (USCG) and Oak Island Water Rescue (OIWR) Chief Peter Grendze to design the station, which included two lifebuoys, a rescue tube from 4 feet, a water rescue bag and corresponding signage.

He planned “to build, install, finance and maintain the station”, in the hope that it would increase his chances of being approved. Dropping all costs from local municipalities, Ivers estimated an initial investment of $800, with the intention of “personally accepting all long-term costs.”

His proposal included renderings, a list of 15 people and organizations consulted in its development, and information on various phenomena that may justify the use of a lifesaving device on the beach.

It also included a summary of North Carolina’s General Statutes that limit the liability of “good Samaritans.” Good Samaritan laws are intended to protect those who offer assistance in an emergency, even if the victim is injured or dies despite rescue efforts. Yet liability is a major concern shared by many critics of the installation of lifeguards and lifesaving stations.

Ivers hoped his careful planning would allow for quick approval and is “disappointed that he hasn’t been received more enthusiastically by the city” at this point.

However, local resident Richard Gephart did not approach the town to take matters into his own hands. Beachgoers may have already noticed a new lifesaver station with life ring installed near the NE 39th St. public access.

Gephart of Raleigh owns a beachfront home near the access that he rents out most of the year. Earlier in the season after a drowning, Gephart saw a social media post about beaches installing lifesaving devices in light of a shortage of national lifeguards.

Resident Richard Gephart set up a lifeline post near his home on Oak Island in response to multiple drownings that occurred on the beach in 2022. (Photo courtesy)

He said he was further coerced after a close friend drowned at Salter Path beach – which also has no lifeguards – as he tried to save his son. Gephart said the terror of the situation has hit closer to home, compounded by the Oak Island drowning incidents and with his own family vacation approaching the week of July 4.

“If I was sitting on the beach and my 10-year-old was in distress, how would I handle that, and how would my wife and I handle that?” Gephart says he wondered. “And I was like, one of us goes in the water regardless, and if there’s a flotation device that’s very visible nearby, the other one is going to get the flotation device.”

So he spent $130 on materials to build a rescue station with a lifeline. Accessibility and visibility were priorities in the installation. The lifeline stand is at the end of a private access in front of his house, approximately 170 feet from the nearby public access. While his property line is technically on a dune, Gephart installed it beyond the dune directly on the public beach without prior permission.

He said photos once appeared on his social media feed, posted by the OIWR, showing Gephart station and another unauthorized rescue station in Sherill Street.

“Although this is a good faith effort, it is important that the devices are of the correct type and size for sea rescue,” the OIWR said. “Likewise, it’s best if they’re part of a city-organized and sanctioned program. The good news is that the city has indicated that it is willing to consider a proposal if funded from outside sources. »

City spokesman Emory said the city has not officially reached out to unauthorized rescue stations at this time.

Gephart said he wondered if he would be pushed back.

“I was hoping that I wasn’t doing anything that would be perceived as wrong,” he said. “I was just doing what I could to help.”

As you pass most houses while walking on the beach, visible rip current signs are not displayed for bathers. Signs with QR codes leading to virtual warning flags are displayed only at beach accesses.

In early July, beach patrols began scouring the shoreline, displaying warning flags attached to UTVs. Visitors can also download OKInformation, a text messaging service that will notify mobile subscribers of surfing conditions.

While Gephart said personal responsibility is in addition to drowning prevention, he’s also unsure if that’s enough.

“There’s a difference between ‘realistic’ and what’s ideal,” Gephart said. “Most people who come here from out of town just don’t understand the ocean.”

Advice or concerns? Email [email protected]

Want to know more about PCD? Subscribe now then subscribe to our newsletter, Wilmington Wireand get titles delivered to your inbox every morning.

Domestic violence, coasters and the small town that launched life-saving legal reform


Jane Hughes would like to hear more conversations about toxic relationships around the table in bars and restaurants.

In her 25-year career working with high-risk youth, foster care, homeless services and supporting women in crisis, domestic violence has always been at the heart of her work. .

“It’s so pervasive and so damaging, and there isn’t necessarily funding to support people dealing with violence – unless they have an associated issue like homelessness or mental health. “

Jane Hughes of the Bega Women’s Resource Center hopes the coasters will spark conversations.(ABC South East NSW: Vanessa Milton)

Frontline workers and activists in the Bega Valley on the NSW south coast hope new coasters distributed at hospitality venues across the region will spark discussion about signs of relationships coercive and see more people speak out against unacceptable behavior.

Using coasters to raise awareness about domestic violence is not a new idea.

The message ‘Domestic abuse is not Australian’ appeared on coasters in Sydney’s eastern suburbs around Australia Day in 2017.

And venues in Ballina County on the NSW North Coast have been handing out coasters designed by Year 10 students as part of the Love Bites Respectful Relationships education programme.

Coasters designed by Year 10 students have been distributed to pubs and clubs on the NSW North Coast.(ABC North Shore: Samantha Turnbull)

But the continuing lack of awareness worries veteran domestic violence activist Ludo McFerran.

“It’s been almost 50 years since we opened the first women’s shelter in Australia [the Elsie women’s refuge in Sydney] and started the community conversation about domestic violence,” says Ms. McFerran.

Bringing about life-saving national reform

In 2020, Ludo McFerran received an Order of Australia medal for his significant service to women and children and social justice.

She developed the Staying Home, Leaving Violence program to help women and children stay safe in their homes, first piloted in the Bega Valley.

From that experience, she developed paid domestic violence leave to help women experiencing domestic violence stay safe in their jobs.

After a sustained campaign by activists and the labor movement to make paid domestic violence leave a universal right for all workers, Federal Employment and Labor Relations Minister Tony Burke announced in June this year that legislating 10 days paid leave for family and domestic violence as a universal right would be his first parliamentary act.

Violence rates still high

Ludo McFerran thinks domestic violence is a symptom of a much bigger problem.

“We can reduce the impacts of violence by reducing homelessness and unemployment, helping people who experience violence stay home and work.”

She commended those who continue the campaign against domestic violence and welcomed all awareness-raising efforts.

But Ms McFerran also thought it was time to have a national debate about what has been achieved over the past 50 years and why rates of violence remain so high.

Ludo McFerran wears a blue shirt and smiles at the camera
Ludo McFerran, received an OAM for his significant contribution to women and children, and to social justice.(ABC Southeast: Claire Wheaton)

Jane Hughes is encouraged by the momentum for change signaled by the new Labor Federal Government and said she hoped to see more direct investment in targeted early intervention and recovery programmes.

In her current role as coordinator of the Bega Women’s Resource Centre, three quarters of the women she met were fleeing or recovering from domestic violence.

“It could even take five years, they still experience the difficulties associated with leaving an abusive relationship – poverty and homelessness, physical and mental health, drug and alcohol problems, behavioral problems with children,” said said Mrs. Hughes.

“It can take a long time to get through, especially if they don’t have support.”

Google Play Store Removed 50 Apps Infected With Joker Malware


50 Apps Removed By Google Play Store

According Zscaler Threatlabz, 50 apps on the Google Play Store was infected with Joker Malware. However, Google Play Store has banned and deleted several apps who have been infected with the Joker Malware.

Buy Prime Test Series for all Banking, SSC, Insurance and other exams

What is Joker Malware?

Joker Malware is one of the most notorious malware that exploits Android devices. He manages to take advantage of The official Google app store with the help of his track signatures which includes virus code update, execution process and payload recovery techniques. This malware is able to steal personal information of users including contact details, device data, WAP services and SMS messages.

List of deleted apps

The apps included in this list are removed by Google Play Store and it recommends the user to uninstall the app if downloaded.

  1. Universal PDF scanner
  2. Private message
  3. Premium SMS
  4. Smart Posts
  5. Text Emoji SMS
  6. blood pressure checker
  7. funny keyboard
  8. Memory silent camera
  9. Custom theme keyboard
  10. Light messages
  11. Photo Keyboard Themes
  12. Send a text message
  13. Messenger Chat Themes
  14. Instant messaging
  15. Nice keyboard
  16. Emoji Font Keyboard
  17. Mini PDF scanner
  18. smart texting
  19. Creative Emoji Keyboard
  20. fancy sms
  21. Emoji Keyboard Fonts
  22. Personal message
  23. funny emoji message
  24. Magic photo editor
  25. Professional messages
  26. All photo translators
  27. text chat
  28. Smile Emoji
  29. Wow Translator
  30. Translator all languages
  31. cool posts
  32. blood pressure diary
  33. SMS Text Chat
  34. Hi Text SMS
  35. Emoji theme keyboard
  36. iMessenger
  37. SMS text
  38. camera translator
  39. Come Messages
  40. Painting photo editor
  41. Rich thematic message
  42. Quick chat message
  43. Advanced SMS
  44. professional courier
  45. Classic game messenger
  46. style post
  47. Private game messages
  48. Timestamp camera
  49. social post
  50. Simple note scanner

More Sci-Tech newse

Get Rid Of These Apps With Over 300,000 Installs Google Just Launched The Play Store To Be Dangerous

Although the Google Play Store is supposed to be a safe source for app downloads, bad actors are getting smarter every day and finding new ways to evade the measures designed to keep them out.
The research team at cloud security firm Zscaler ThreatLabz discovered numerous apps on the Play Store that were associated with Joker, Face thief, and Coper malware families. The Google Android Security team removed them, so if you have downloaded any on your Android phone, you should delete them immediately.

Android Joker Apps Removed From Google Play Store

Joker was first discovered in 2019 and we’ve seen many variants of this spyware that stealthily subscribes people to premium services and steals text messages, contact lists, and device information, among other things. It continues to find its way to the Play Store by regularly changing its trace signatures. In the past two months, the following Joker apps were found on the official Google app store.

  1. Simple note scanner
  2. Universal PDF scanner
  3. Private messenger
  4. Premium SMS
  5. Smart Posts
  6. Text Emoji SMS
  7. blood pressure checker
  8. funny keyboard
  9. Memory silent camera
  10. Custom theme keyboard
  11. Light messages
  12. Photo Keyboard Themes
  13. Send a text message
  14. Messenger Chat Themes
  15. Instant messaging
  16. Nice keyboard
  17. Emoji Keyboard Fonts
  18. Mini PDF scanner
  19. smart texting
  20. Creative Emoji Keyboard
  21. fancy sms
  22. Emoji Keyboard Fonts
  23. Personal message
  24. funny emoji message
  25. Magic photo editor
  26. Professional posts
  27. All photo translators
  28. text chat
  29. Smile Emoji
  30. Wow Translator
  31. Translate all languages
  32. cool posts
  33. blood pressure diary
  34. SMS Text Chat
  35. Hi Text SMS
  36. Emoji theme keyboard
  37. iMessenger
  38. SMS text
  39. camera translator
  40. Come Messages
  41. Painting photo editor
  42. Rich thematic message
  43. Quick chat message
  44. Advanced SMS
  45. professional courier
  46. Classic game messenger
  47. style post
  48. Private game messages
  49. Timestamp camera
  50. social post
A total of over 50 Joker download apps have been found on the Play Store by ThreatLabz so far with a combined download count of over 300,000. They generally fall into the Communication, Health, Personalization, Photography, and Tools categories.

The mode of attack is that many applications are released together and hide malicious payload within them. Joker malware often hides in messaging apps that require you to grant enhanced access permissions. It then uses these permissions to achieve its goals. For example, in the Enjoy SMS app, the payload is hidden in an obfuscated path.

Facestealer Malware

The Facestealer malware is used to steal Facebook IDs with fake login screens. One of the applications encountered by ThreatLabz was cam.vanilla.snapp and it has been downloaded over 5,000 times.

Coper Trojan

This banking trojan uses a multi-step chain of infection to compromise Android smartphones and perform harmful activities. It targets banking applications in Europe, Australia and South America. They are disguised as legitimate applications and once a user downloads them from the Google Play Store, they release the malicious infection that is capable of intercepting and sending SMS messages, logging keystrokes, locking and unlock screens, prevent uninstalls and allow bad actors to take control of infected phones. This ultimately leads perpetrators to access the information they need to steal their money from victims.

For example, an app called Unicc QR Scanner prompts users to update the app as soon as it is installed. After that, a backdoor or malware gets installed in the device to help the attacker take full control of the phone.

Such applications continue to appear on the Play Store and even Apple’s App Store, so it’s best to be vigilant and only install apps from trusted developers that have been downloaded multiple times. To be on the safe side, you should also check the reviews posted on the apps.
It is recommended not to install messaging applications. You should also avoid granting a notification listener and increased accessibility permissions to apps that seem dodgy.

Ukrainian radio stations hacked to spread false information about Zelenskyy’s health


Ukrainian radio operator TAVR Media was the latest victim of a cyberattack on Thursday, leading to the broadcast of a fake message that President Volodymyr Zelenskyy was seriously ill.

“Cybercriminals spread information that the President of Ukraine, Volodymyr Zelenskyy, is in intensive care and that his duties will be carried out by the Chairman of the Verkhovna Rada, Ruslan Stefanchuk,” the State Communications Service said. Special and Information Protection of Ukraine (SSSCIP). said in an update.

The radio holding company oversees nine major radio stations, including Hit FM, Radio ROKS, KISS FM, Radio RELAX, Melody FM, Nashe Radio, Radio JAZZ, Classic Radio and Radio Bayraktar.

cyber security

In a separate Facebook post, TAVR Media revealed that its servers and networks were targeted by a cyberattack and it is working to resolve the issue. The company also pointed out that “no information about Ukrainian President Volodymyr Zelenskyy’s health problems is true.”

The false reports, which were released between noon and 2 p.m., also prompted Zelenskyy to take to Instagram, saying, “I have never felt healthier than I do now.”

cyber security

The origin of the intrusion still remains unknown, although several threat actors have taken advantage of the ongoing conflict between Russia and Ukraine to carry out a deluge of cyberattacks, with hacking groups taking sides.

In a related development, the Computer Emergency Response Team of Ukraine (CERT-UA) has also warned against the use of macro-laden PowerPoint documents to deploy the Agent Tesla malware targeting state organizations in the country.

Opening day includes the Connacht Hotel Handicap for a week of flat and jump meeting


Galway hosts a fascinating reunion next week as Goodwood Festival also graces the racing calendar.

The festival itself is a gigantic seven-day event, from Monday July 25 to Sunday July 31, which includes both obstacle courses and flat action in Ireland.


Silvestre De Sousa wins with Scaramanga the Bahrain Turf Series Handicap in Newbury

888Sport: 100% bonus up to £100*

Although there are seven days of action, there are huge races every day and there are also big fields, which is great news for one-sided bettors.

Each midweek card kicks off in the evening at 5.10pm and there are great races to watch each day.

On Monday, the festival kicks off with a four-year-old novice hurdle and Galileo’s much-loved HMS Seahorse.

5.10 Tip for Novice Hedge Betting

HMS Seahorse

It’s still early in the bets, but it’s worth watching this field and highlighting this 132-ranked Paul Nolan-trained horse.

He took a step forward on his sixth flat appearance last time out winning by more than six lengths.

And the last hurdle attempt was at Punchestown in April in the Grade 1 Ballymore hurdle, but came a respectable third not too far behind top Vauban and Fil Dor.

He also had a good place behind Brazil at the Cheltenham Festival behind Brazil in the Boodles and should therefore be the one to beat in a largely under-run field.

6:40 p.m.: Connacht Hotel Handicap


There are 50 runners still in contention at the time of writing, but the ante-post odds still give a good indication of the field for this star race on opening day.

The favorite, Echoes In Rain, is a formidable hurdler and recently placed just behind Honeysuckle at Punchestown in April, but came second by more than three lengths as the overall favorite last time out.

There’s a lot to love about most of the other favorites in betting, but the main shoutout will come from Scaramanga.

One of many starters for Willie Mullins but he wasn’t too far from Coltrane last time out and may have needed the flat run and this is his first outing for this great coach after leaving Paul Nicholas.

Scaramanga should also prefer travel recoil at 2m1f.

He won at Newbury in July last year over a similar distance in Class 2 Bahrain Turf Series Handicap.

Now he could step up to Ireland for his new coach and over a distance he has proven himself well.

His hurdle form is also excellent, although he came fourth out of four at Sandown in April he was beaten by just six lengths against McFabulous, Indefatigable and Fusil Raffles.

New Customer Sign-up Offers

Bet365: bet €10, get €50 – CLAIM HERE

Minimum deposit requirement. Free bets are paid out as betting credits and can be used when settling qualifying bets. Minimum odds, betting and payment method exclusions apply. Returns exclude wagering bet credits. Deadlines and terms and conditions apply 18+ Begambleaware.org

888Sport: 100% match bonus up to £100 – CLAIM HERE

Deposit £/$/€10 min using promo code ‘TOP100’ • Bonus will be applied once full deposit amount has been wagered at least twice with cumulative odds of 1.50 or more • To withdraw your bonus winnings, you must wager the bonus amount up to 5 times • All deposit and bonus wagering requirements must be met within 60 days • This offer cannot be combined with any other offer • Limit of £/$/€50 stake per bet Applies • Restrictions apply on withdrawals, payment methods and countries and full terms and conditions apply. 18+ Begambleaware.org

Betfred: Bet £10, get £60 bonus – CLAIM HERE

New UK customers only. Sign up using promo code BETFRED60, deposit and place first £10+ sports bet (cumulative Evens+) within 7 days of sign up. The first bet must be on sports. £20 free bet to use on sports, £10 free bet to use on lotto and 50 free spins (20 pence per spin) credited within 48 hours of bet settlement. Additional £20 free bets credited 5 days after settlement. Bonuses have a 7 day expiration. Payment restrictions apply. SMS verification and/or proof of identity and address may be required. Full terms and conditions apply. 18+ begambleaware.org

BetVictor: bet €10, get €40 bonus – CLAIM HERE

18+ New customers only. Register and place a £10 bet on horse racing at odds of 2.00+ within 7 days of opening a new account; excludes cashed bets. Receive 3 x £10 free horse racing bets, only valid on defined events with odds of 2.00+. Plus a £10 slot bonus, selected games, wager 20x to cash out a maximum of £250. Bonuses expire in 7 days. Card payments only. Terms and conditions apply. begambleaware.org.

Commercial Content Notice: Taking any of the bookmaker offers featured in this article may result in payout to talkSPORT. 18+. The T&Cs apply. begambleaware.org

Remember to gamble responsibly

A responsible player is a person who:

  • Set time and money limits before playing
  • Only plays with money he can afford to lose
  • Never chase their losses
  • Don’t play if upset, angry or depressed
  • GamCare– www.gamcare.org.uk
  • Aware of the bet – www.begambleaware.org

For help with gambling problems call the National Gambling Helpline on 0808 8020 133 or visit www.gamstop.co.uk be excluded from all UK regulated gambling websites.

SBI WhatsApp banking: how to use, what services are available

The (SBI) has started offering WhatsApp-based banking services to its customers. Now, SBI customers can check their account balance and view mini statements using WhatsApp.

According to an official

tweet, “Your bank is now on WhatsApp. Get to know your account balance and view mini statement on the go.”

Here is an overview of using SBI’s WhatsApp service.

Step 1- Registration

You must first register to use this service through SBI WhatsApp Banking. To do this, type WAREG, then your account number separated by a space, and send an SMS to 7208933148. You must keep one thing in mind: send this message from the same number that is registered in your SBI account.

Step 2: Send WhatsApp message number 90226 90226

After successful registration in SBI WhatsApp Banking, your WhatsApp number will receive a message from SBI number 90226 90226. You can save this number.

Step 3- Start WhatsApp banking

Send ‘Hi SBI’ to this number 90226 90226 or reply to the message you received on WhatAapp. Once you send a message, you will receive the message below.

Dear Customer,

Welcome to SBI Whatsapp Banking Services!

Please choose one of the options below.

1. Account balance

2. Mini statement

3. Unsubscribe from WhatsApp Banking

You must send ‘1’ to get your bank balance details and ‘2’ to get your Mini statement details. To unsubscribe from SBI WhatsApp Banking, you must type 3.

Other banks that offer WhatsApp banking service include

, and .

SBI WhatsApp card

The State Bank of India also provides its credit card holders with WhatsApp-based services through the platform. Customers with SBI credit cards can use it to check their account overview, reward points, outstanding balance, etc. Cardholders must send the WhatsApp message “OPTIN” to 9004022022 in order to enroll in the system. To register for the service, they can also make a missed call from the registered mobile phone at 08080945040 or use the mobile application.

What is passwordless authentication and how to implement it


Passwordless authentication is a user management method in which the user logs into a system or application without using a password or secret. Instead of using a knowledge based factor (e.g. password), it validates a user’s identity either ownership factors (e.g. email account), or inherence factors (e.g. facial recognition).

This article was created in partnership with Frontegg. Thank you for supporting the partners who make SitePoint possible.

There are many authentication methods used as alternatives to passwords:

  • Single Use Code (OTC)
  • magic links
  • Biometric login (fingerprints, FaceID, voice recognition)
  • Smart cards or physical tokens
  • Digital certificates

Popularity of Passwordless Authentication

You may already be using “passwordless authentication” without knowing it. Many banking apps use fingerprint and voice recognition to verify users. Slack uses magic links to authenticate users.

The use of passwordless authentication has grown steadily over the past few years. Auth0, an authentication provider, predicts that passwordless authentication exceed the use of passwords by 2027. Gartner predicted that by 2022, “60% of large global enterprises and 90% of midsize enterprises will implement passwordless methods in more than 50% of use cases, up from 5% in 2018.”

Major web players are also doing their best to accelerate technology adoption. On World Password Day 2022, Google, Microsoft, and Apple announced plans to expand support for a common passwordless login standard established.
In June 2022, Apple announced its new ‘Passkeys’ function to use to log in to websites and applications. This announcement basically means that Apple will use Touch ID or Face ID to create a digital key for this website. This removes the need to create and write down a password.

Benefits of Passwordless Authentication

Passwordless authentication offers advantages in terms of security and user experience:

  1. Reduces the risk of phishing and password theft: Users are not susceptible to phishing attacks when directed to fake websites and enter their login credentials. If a user does not enter a password, they will not be vulnerable to brute force attackspassword data breaches and other types of credential theft.
  2. Reduces credential reuse: Reusing passwords across multiple services and accounts creates increased risk to users and your systems that cannot be avoided. It was reported that 64% of people have used the same password exposed in a breach for other accounts.
  3. More memory exercises: Your users don’t need to remember usernames and passwords for so many accounts. Sometimes they have to reset their passwords again and again after many failed login attempts.
  4. Faster connection: We are all busy. A strong password is suggested to be at least 16 characters long and takes a long time to type compared to scanning a fingerprint or opening a magic link.

Limitations of Passwordless Authentication

Passwordless authentication is not perfect and has some limitations from a security and experience perspective.

  • Unknown user experience: Many people have a habit of automatically typing or auto-filling passwords. A change to a magic link or OTC can come as a shock to users.
  • Stolen Devices or SIM Swapping Risks: Sending unique codes via SMS can leave your users vulnerable if their phone is stolen or if they are the victim of a SIM swap scam.
  • Biometric security is not perfect: Fingerprint readers, TouchID and FaceID have been successfully hacked over the years.

Relying on a single factor for authentication, password or not, always presents some level of risk. We recommend that you always use multi-factor authentication (MFA) whenever possible.

Is passwordless authentication secure?

Yes, passwordless authentication is considered safe, but it’s not completely risk-free. An account without a password will not have to fear that this password will fall into the hands of a malicious person. This can happen through data breaches, brute force hacks, lost devices, or misplaced post-its.

Many of the risks associated with passwordless authentication apply equally to other methods.

If a hacker has access to your email account and you are using Magic Links for passwordless authentication, they will be able to log in easily. This risk, however, is the same if you use a normal password. The bad actor would just need to click “reset password” and send the reset link to that same email address.

Finally, like any other system, a passwordless authentication system is also vulnerable to direct attacks aimed at circumventing or circumventing security measures. No matter how secure you act, the systems that store and verify your credentials are never completely secure.

Fingerprint verification and other biometric factors are much more difficult but not impossible to cheat and offer a very secure way to authorize yourself.

Passwordless Authentication vs Multi-Factor Authentication (MFA)

Multi-factor authentication is a method of using multiple authentication factors when logging in. This very often happens when you log into an account with a username and password and then receive a 6-digit one-time-use code (OTC) to confirm your ownership of the device.

In this example, the OTC factor is passwordless. Instead, if you were to use a fingerprint and one-time passcode, you have an entirely passwordless MFA setup.

How to Implement Passwordless Authentication on Your Website

Integrating passwordless authentication into your app or website is easier than ever. Depending on your existing infrastructure, you have many options:

  • User management solutions: These providers offer a fully managed service that not only provides traditional and passwordless authentications, but also user management and permission management.
    • When to use: New system releases, startups, and teams looking to avoid all low-value, high-risk development work.
    • When not to use: If you have a very custom set of authentication or user management requirements that may not match their systems.
    • Suppliers: Frontegg, Okta/Auth0, MergeAuth, Trusona, AppWrite
  • Authentication service provider: These services provide user authentication, access management and other services such as session management.
    • When to use: You have existing user management services and want someone to handle passwords and authentication.
    • When not to use: You have limited development experience or resources. If you have a simple identity and access management model, you might want to consider a fully managed solution, as mentioned above.
    • Suppliers: AWSCognito, Google Identity Platform, Microsoft AzureAD

Passwordless Authentication with React – Speedrun

To demonstrate how easy it is to introduce passwordless methods to your users, we’re going to show you a 5-minute tutorial with a provider called Frontegg. A standalone, end-to-end user management platform that, among other user management features, provides a few forms of passwordless login methods.

Creating login and authentication services is extremely time consuming and doesn’t add value to user flows, but can be detrimental if you get it wrong. As services offering authentication get better and cheaper, there shouldn’t be much reason to build your own password validation systems for your apps.

  1. Create your free Frontegg account

Create your Frontegg account through their website. Be sure to select Magic Code or Magic Link as passwordless options during the onboarding process!

Options without password

  1. Start the onboarding process

Once you have finished creating your login box and selected your passwordless methods, you will see an option to Publish to Dev.

Frontegg uses Environments (Dev, QA, Staging, Production) with unique subdomains, keys and URLs for your authentication environments.

You will now be taken to a page with sample code, and more importantly, your `baseURL` and `’clientID`. Leave this page open and proceed to your IDE for the next step.

  1. Create the React app (skip this if you already have your own app)

In your terminal, type the following commands to create a new Reactreact application and navigate to the new directory.

npx create-react-app app-with-frontegg
cd app-with-frontegg
  1. Install and import Frontegg

Run the following command to install the Frontegg React library and react router. You can skip installing react-router if it is already installed in your application.

npm install @frontegg/react react-router-dom
  1. Configure connection settings

In the src/index.js file, add the code below. Then go back to your Frontegg page and find `baseUrl` and ‘clientID’ in the code samples.

Note: These values ​​are still in the Administration section of your workspace after this onboarding flow is complete.

import React from 'react';
import ReactDOM from 'react-dom'; 

import App from './App';
import './index.css';

import { FronteggProvider } from '@frontegg/react';

const contextOptions = {
  baseUrl: '## YOUR BASE URL ##',
  clientId: '## YOUR CLIENT ID ##'

    <FronteggProvider contextOptions={contextOptions} hostedLoginBox={true}>
        <App />
  1. Redirect to login

Using the Frontegg useAuth hook, you can determine whether a user is authenticated or not. If the user is not authenticated, you can redirect the user to login via the useLoginWithRedirect hook (as shown in the example below).

import './App.css';

import { ContextHolder } from '@frontegg/rest-api';
import {
  useAuth, useLoginWithRedirect
} from "@frontegg/react";

function App() {
  const { user, isAuthenticated } = useAuth();
  const loginWithRedirect = useLoginWithRedirect();
  const logout = () => {
    const baseUrl = ContextHolder.getContext().baseUrl;
    window.location.href = `${baseUrl}/oauth/logout` +
                           `?post_logout_redirect_uri=` +
  return (
    <div className="App">
      { isAuthenticated ? (
            <img src={user?.profilePictureUrl}
            <span>Logged in as: {user?.name}</span>
            <button onClick={() => alert(user.accessToken)}>
              What is my access token?
            <button onClick={() => logout()}>
              Click to logout
      ) : (
          <button onClick={() => loginWithRedirect()}>

export default App;
  1. Login

To run npm start or open http://localhost:3000 in your browser and click on the Login button. You should see your newly created login and registration pages.

Note, there is no password field here 🎉

Registration at Frontegg

Click on Register, access your email and click on Activate my account.

Frontegg unique code

When you want to sign in, you just have to enter your email, wait for the six-digit code to arrive, and you’re connected. No password, no worries.


I hope this guide to passwordless authentication has helped you not only understand how accessible this technology is, but also how important it will become in the next few years.

How your texts can be used as evidence against you in court


Meveryone assumes that text messages are private, but that’s not necessarily the case, as recent memorabilia has shown. Text messages played a central role in the January 6 hearings and could form the basis of legal action against those under surveillance. Last week, a watchdog revealed that the US Secret Service deleted important text messages related to the attack, showing how important text message evidence can be.

Texting has also figured in high-profile legal proceedings like Michelle Carter’s “suicide by text message” trial, Anthony Weiner’s sexting trial and, more recently, the Amber Heard-Johnny Depp libel trial.

Like social media posts and other forms of digital communication, text messages can be used as evidence in court and can be instrumental in the outcome of criminal and civil cases.

“People say things in texts that they later regret,” says Larry Buckfire, president of Michigan law firm Buckfire Law. “It’s so easy to say things you shouldn’t say or say things impulsively that you can’t take back once they’re documented.”

Here’s what to know about how text messages can be used as evidence.

How can text messages be used as evidence?

Text messages can be used to prove wrongdoing or support a defense position in a wide variety of court cases, ranging from family law cases like divorce and child custody to personal injury lawsuits to criminal trials. .

Once a text message is admitted in court, it’s fair game and can potentially make or break a case. “In a legal proceeding, a text message is essentially a recorded conversation or, at least, a written expression of your intention to say something or do something,” Buckfire says. “They document your thoughts, ideas and expressions.”

In criminal cases, Buckfire says text messages are often used to show a person’s motive, intent to commit an alleged crime, or state of mind in advance. “You usually have to prove that a person intended to commit a crime. So if they argue it was unintentional or inadvertent, the text messages can show they intended to do something,” he says. “If they send threatening text messages to someone or explain a plan to commit a crime or cover up something, that’s preserved.”

Following the Supreme Court’s decision in June to overturn Roe v. Wade, concerns are growing about the potential use of text messages, location data and other digital information to punish people who discuss or seek information about abortion access. services. In the past, text messages have repeatedly been used as evidence against women facing criminal charges related to the termination of their pregnancy.

As the January 6 hearings demonstrated, text messages can also be used as evidence in congressional hearings, which can ultimately lead to litigation. The House Jan. 6 committee obtained thousands of text messages regarding the actions of senior White House officials in the weeks leading up to the 2021 attack on the Capitol. During Tuesday’s hearing, the committee revealed text messages between former Trump campaign manager Brad Parscale and former Trump spokeswoman Katrina Pierson in which Parscale said the speech of the Trump’s Jan. 6 rally “demanded civil war.”

Text messages have also been used to indict some of the people who participated or attempted to participate in the insurrection. A man, who arrived in Washington that day with 2,500 rounds, sent text messages threatening to kill Washington Mayor Muriel Bowser and House Speaker Nancy Pelosi and said in a text that he was ” ready to remove several skulls from the shoulders. Another texted a friend bragging about being “one of 700 inside” the Capitol.

As Darrell M. West, vice president and director of governance studies at the Brookings Institution, wrote in the weeks following the attack: “Taken together, the information gathered before, during and after the riot show how technology enables both insurgency and legal accountability. .”

When can SMS be used in court?

Before text messages can be introduced into a case, they must be legally obtained as evidence. Buckfire says that if a person does not voluntarily provide their cell phone, an attorney can obtain a court order or subpoena to access the relevant messages. Even if a phone owner has deleted some messages from their own device, those texts are still accessible from the phone of the person who received the messages. Most major cellular service providers also keep a record of the content of text messages sent and received by their account holders for a short period of time.

If a person has not yet been charged with a crime, Buckfire says law enforcement can seek a warrant from a judge or magistrate to search a phone. “You have to prove why the police need the phone and why it’s needed for the investigation,” he says. “Once there is a warrant, the police can go and confiscate the phone, have it examined and downloaded [its data].”

Encrypted messages sent through secure messaging services like iMessage and WhatsApp are harder for law enforcement to get their hands on. But if you use cloud-based backup for these messaging apps, the content is still accessible using special “cloud-mining” technologies, according to Privacy International.

Text messages must also be authenticated to be properly admitted into evidence. This means that a lawyer must prove that a text was actually written and sent by the person it claims to be. According to the American Bar Association, text messages can be authenticated by testimonials or by circumstantial evidence such as “the author’s screen name or nicknames, habitual use of emoji or emoticons, author’s known telephone number, reference to facts specific to the author, or reference to facts that only the author and a small number of other people may know”.

There’s a lot of scrutiny of what evidence is admissible in court, Buckfire says. “You can’t just bring a phone and say, ‘Here’s this phone and this message,'” he says. “You have to show that a text is reliable, that it has useful value in a case, and that it is not unfairly prejudicial.”

One of the most valuable lessons Buckfire says he learned from practicing law is to be careful how you communicate things. “What you write down will come back to haunt you,” he says.

More Must-Try Stories from TIME

Write to Megan McCluskey at [email protected]

Op-ed: A message to veterans and their families


We are committed to making the UK the best country in the world to be a veteran by 2028.

It is an ambition that we must achieve.

And having just been appointed Minister of Veterans Affairs, it is my job to move it forward and I will hold myself accountable to veterans and their families.

Although veterans care has come a long way over the past fifteen years, I recognize that this has not been felt in the same way by everyone, nor experienced in the same way in all communities across the UK .

Today’s announcement of a £5m investment in veterans healthcare will be helpful. And tremendous progress has been made in meeting the increased demand for support since 2003, with thousands of brilliant people working incredibly hard – often as volunteers – to improve the after-service lives of our veterans.

We know that the vast majority of our veterans lead fulfilling and empowered lives after service. They make fantastic employees, pursue great careers, give back to their communities, and benefit immensely from their time in military service.

But some veterans face deep difficulties. And in this role, I will relentlessly strive to lead the way to ensure that everyone who needs help knows where to turn and receives good quality, evidence-based care that will improve their lives. .

The Veterans Affairs Bureau has accomplished great things since it was launched by the Prime Minister in 2019.

We are already taking steps to protect veterans from vexatious lawsuits into old age.

We offer the first comprehensive mental health care pathway for veterans in England and we have a bold set of commitments in the Veterans Strategy Action Plan to improve healthcare, jobs, life. access to digital services and more.

We may well find ourselves at a point of political uncertainty right now.

But regardless of the outcome in the weeks to come, I will continue to push for the government to make this step change in support for veterans so that it will be felt by all who have served and sacrificed so much.

Incredible Benefits Of SMS Marketing That Can Help Your Business Grow


There are several ways to market your business. But one of the most cost-effective and effective ways to reach customers and promote your business is through SMS marketing.

Let’s see some of the amazing benefits of SMS marketing that can help your business grow.

Functional and flexible

Text messaging is very functional and convenient as it can be used to send reminders, updates, coupons, and marketing messages. Without speaking about Text messaging API, which can help you provide PINs, business notifications, and other important information to your customers. And since people always have their phones with them, you can be sure that your message will be received and read.

This flexibility makes it easy to use SMS marketing to achieve a variety of different goals. For example, you can use it to increase brand awareness, promote a new product or service, or increase sales.

So it’s easy to see how this immediate and personal form of communication can benefit your business. People are more likely to act on a message they receive via SMS than one they see in an email or social media post, and they appreciate the convenience and straightforwardness of SMS marketing.

SMS marketing is personal

Another advantage of SMS marketing is that it is very personal. Unlike other forms of marketing, such as television or radio ads, text messages are delivered directly to people’s phones. This means you can address your customers by name and include other personal touches that will make them feel special and appreciated.

This personal approach can do wonders for your business. This will make your customers feel valued, which will encourage them to do business with you again in the future.

Plus, SMS marketing is a great way to build relationships with your customers. By sending them personal messages, you can create a connection with them that will make them more likely to think of your business when they need the products or services you offer.


One of the best things about SMS marketing is that it is very affordable, especially if you compare it to other marketing channels. You can reach large numbers of people at a fraction of the cost of traditional advertising. Plus, there are no printing or production costs associated with text messaging.

This makes SMS marketing a great choice for small businesses or startups working on a budget. You only have to pay the cost of sending the messages, and there are no ongoing charges.


Unlike many other marketing channels, text messaging lets you track exactly how many people are receiving and opening your message. This information is critical to understanding the effectiveness of your marketing campaign.

For example, if you text a coupon code, you can track how many people use the code to make a purchase. This data can help you adjust your marketing strategy to make sure you’re getting what you pay for.

On the other hand, if you are running a contest, you can use SMS marketing to track how many people are entering it. This data can help you determine if the contest is a success and if you should run it again in the future.

Easy to set up and follow

This means that you can use a variety of different software to create and send your text messages. There are several different platforms to choose from, and many of them offer free trials. This makes it easy for you to find the right one for your business.

However, there are a few things you should pay attention to: make sure the SMS marketing software you choose has a good delivery rate and can be integrated with your email marketing platform. This will make it easier to track your results.

Also, some SMS marketing platforms offer more features than others. For example, some let you segment your contact list so you can send different messages to different groups.

Others offer automated messages that are sent based on certain triggers, such as when a customer makes a purchase.

You can learn more about the features offered by different SMS marketing platforms by reading reviews online.

SMS marketing is a great way to reach your customers and promote your business. It’s highly personal, cost-effective, easy to set up and track, and offers a variety of features that can benefit your business. If you’re not already using SMS marketing, now is the time to start.

Pay attention to the tips mentioned above to get the most out of this powerful marketing tool.

Home offshore drilling plan lambasted by both sides at US Senate committee


Governor Hochul Announces New Effort Via Text To Provide Latest Information On Monkeypox To New Yorkers


Governor Kathy Hochul today announced a new text notification effort to deliver the latest information on monkeypox directly to New Yorkers.

New Yorkers can sign up to receive text messages — which will include alerts about cases, symptoms, spread and resources for testing and vaccination — by texting “MONKEYPOX” to 81336 or “MONKEYPOXESP” for texts. in Spanish. By providing a zip code, New Yorkers can also sign up for location-based messages.

“We are building on our ongoing response efforts to bring the latest monkeypox information, tools and resources directly to New Yorkers,” Governor Hochul said. “As we continue to work with the federal government to push for more vaccines, I urge New Yorkers to sign up for these important alerts and stay informed about updates on monkeypox in your community. .”

The new SMS campaign is designed to alert New Yorkers of relevant information about monkeypox, so they have protective public health information and resources at their fingertips. The posts will cover information about how monkeypox presents and is transmitted, as well as what New Yorkers should do after exposure.

Information on how to register for the SMS campaign will be disseminated widely through social media, voter engagement, community organizations and the state’s Excelsior Pass platform.

State Health Commissioner Dr. Mary T. Bassett said: “In public health, information is one of our most valuable tools. This innovative campaign, which provides texts in English and Spanish, will help bring education and resources directly to New Yorkers – expanding the access to updates on monkeypox and the availability of vaccines and care I encourage everyone to sign up for these alerts and stay informed about the best ways we can all protect ourselves and mitigate the spread in our communities.”

New York State continues to work closely with the Centers for Disease Control and Prevention’s Monkeypox Response Team on vaccine distribution plans to ensure that New York State receives its fair share of the supply of vaccines as they become available to protect New Yorkers, especially for New Yorkers in communities with high transmission rates. Governor Hochul recently spoke with Dr. Ashish Jha and Dr. Raj Panjabi of the White House to secure additional vaccine doses to meet the needs of New Yorkers.

Today’s announcement builds on the New York State Department of Health’s (NYSDOH) ongoing public awareness efforts on monkeypox, including the recent launch of a digital advertising campaign pay to inform communities experiencing higher rates of monkeypox cases, including gay and bisexual men and other men who have sex with men.

NYSDOH dedicated website, which stays up to date with the latest information, offers free downloadable materials including a palm map, information map, handout and posters available in English and Spanish. NYSDOH has already distributed these resources to LGBTQ+ organizations, local county health departments, healthcare providers, and businesses. The posters will be displayed at gathering places across the state, including health centers, transit centers, parks, rest areas, restaurants, bars and nightclubs.

In addition to public outreach, the New York State Department of Health continues to focus on delivering vaccines to communities. July 12, NYSDOH announcement his second allocation of the JYNNEOS vaccine from the federal government. This supply remains limited, and New York State is actively working with the federal government to communicate the urgent need to increase supply to meet the preventative needs of New York residents. Local county health departments that have been supplied administer the vaccine directly and establish their own appointment processes. Working in partnership with counties, New Yorkers who sign up for location-based alerts can receive alerts about vaccine availability, clinic locations, scheduling, and other smallpox-related updates from monkey specific to their region.

Earlier this week, NYSDOH, in partnership with the New York City Department of Health and Mental Hygiene (NYCDOHMH), hosted a Monkeypox Town Hall for community leaders led by State Health Commissioner Dr. Mary T. Bassett and City Health Commissioner Dr. Ashwin Vasan. New York City and other local municipalities have their own alert systems in place, and local residents should follow these updates as well. Working in partnership with community organizations and advocates, NYSDOH remains committed to continuing to raise awareness and maintain direct dialogue with New Yorkers, especially those most affected by the current outbreak.

NYSDOH continues to provide information and support to healthcare providers and local county health departments, including tips on case detection and notification. New York State has the capacity to test, and due to efforts to expand capacity, testing is now also available at LabCorp, Mayo Clinic and Aegis Sciences Corporation and will soon be available at two other national labs including Quest Nichols Institute Diagnostics and Sonic Healthcare.

New Yorkers can sign up for the text campaign by texting “MONKEYPOX” to 81336 or “MONKEYPOXESP” for texts in Spanish. New Yorkers will be able to provide their zip code to sign up for location-based messaging, if they wish.

For more information on monkeypox, visit health.ny.gov/monkeypox.

New Yorkers can learn more about New York State first allocation of vaccines from the federal government here and the second attribution here.

Minister calls on pension schemes to prepare ‘data’ for dashboards


The calls come as the government releases its response to a consultation which gathered feedback from industry, potential suppliers, consumer groups and future users on what data to include and how it should be presented to people .

Bringing pensions into the digital age, the dashboards will allow savers to see what they have in their various pensions – including their state pension – in one place online, at any time.

Ten years after the introduction of automatic enrollment and there are record numbers of Britons saving for their retirement. With more and more people managing their finances online, the need for retirement dashboards is greater than ever.

Pensions Minister Guy Opperman said:

For many people, a pension is the most important financial investment they will make in their lifetime. This is why the introduction of pension scoreboards is so important.

Clear information about pensions at the touch of a button, including the state pension, will allow savers to be better informed and more engaged, while helping people plan effectively for their retirement, as well as find the lost and forgotten pension pots.

The construction and the first tests of the architecture of the digital dashboards are already well advanced. My message to administrators and managers of pension plans of all types and sizes is simple: prepare the data.

The pension dashboards will offer savers the choice of how they keep track of their pension pots, with the dashboards to be provided by the Money and Pensions Service (MaPS) and other organizations who qualify to develop and host their own dashboards.

The first version of the pension dashboards will give people the ability to find their pensions and then view information about their value, but as the use of dashboards becomes more mainstream, the information and experience users will further enhance the dashboard experience.

Further information

Media inquiries for this press release

Follow DWP on:

ECB President Christine Lagarde receives fake text messages from former German Chancellor Angela Merkel


Tuesday, July 12, 2022 3:13 p.m.

Christine Lagarde

The European Central Bank revealed this afternoon that its president Christine Lagarde was targeted in an attempted cyberattack but no information was compromised.

The attempt happened “recently,” the Frankfurt-based central bank for the 19 countries that use the euro said in an email response to a question about a Business Insider report.

The bank added that “it was identified and stopped quickly” but that it had nothing more to say in the context of an investigation.

Business Insider reported, without naming sources, that Lagarde was contacted by text from what appeared to be former German Chancellor Angela Merkel’s cellphone number by someone claiming that Merkel wanted to communicate with her via WhatsApp because it would be safer.

Lagarde then contacted Merkel by phone to ask if she really wanted to communicate through WhatsApp and that whoever was behind the attempt was apparently aiming to take over the accounts of various personalities on WhatsApp and other messaging services.

How to check fuel prices and gas station employee details via SMS


The Petroleum and Energy Regulatory Authority (EPRA) has introduced an SMS service that will help motorists to check fuel prices and even whether petrol station attendants are registered employees.

EPRA’s decision to create USSD*363# and SMS services has been attributed to increasing cases of gas stations selling adulterated fuel and some illegal price increases.

Services that can be confirmed via SMS include pump prices, employee details, accident and complaint reporting, license details verification and truck verification.

The short SMS code can also be used by students taking EPRA-related courses or those who want to know the status of their exams.

An aerial photo showing motorists queuing for fuel at a petrol station in Kileleshwa on Saturday April 2, 2022.


How to check fuel prices

One can confirm the price of fuel by typing the word price (space) town and sending the message to 40850. An example of SMS is – Price Nairobi.

How to check employee details

Type the word employee followed by the national identification number, then send the message to 40850. For example, Employee 12345678.

How to report an accident

Type the word accident then send the message to 40850. EPRA agents will respond to the report within 24 hours on weekdays.

How to file a complaint

Type the word complaint then send the message to 40850. EPRA is asked to respond within 24 hours.

How to check license details

Type the word license followed by the license number and send the message to 40850, for example – License 1234.

Checking exam details for students

Students can check their exam details by sending the exam details followed by the reference number obtained after submitting their license application to 40850.

EPRA is responsible for the production, import, export, transmission, distribution, supply and use of electrical energy, with the exception of the authorization of installations nuclear.

It also has the mandate to import, refine, export, transport, store and sell petroleum and petroleum products except crude petroleum.

The authority further collects, maintains and manages upstream petroleum data.

A gas station attendant pumping fuel into a car.

A gas station attendant pumping fuel into a car.

accident illegal

As the heat blazes, the city’s cooling centers close for the day


Tuesday July 12th, 2022 by Jo Clifton

City Council member Natasha Harper-Madison warned last month that the city appeared unprepared for a summer heat wave that could leave a number of residents seeking air-conditioned shelter. It turns out that the council member herself became one of those residents when the power went out at her East Austin home on Monday.

As she explained on the City Council bulletin board, “I am typing this message from City Hall, where I had to take my children following a power outage in East Austin that left over 3,400 Austin Energy customers without power, including my home. . Earlier in the afternoon, the heat index in our neighborhood reached 114 degrees. It’s a heat wave that we all knew was coming, but I’m afraid we weren’t quite prepared yet. She had warned of such a possibility in a June message to her colleagues.

The National Weather Service issued an excessive heat warning for Travis County starting Sunday, urging residents to heed the warning to avoid overheating. The temperature hit 110 degrees on Sunday and is expected to be as hot or hotter on Monday, although a brief isolated rain shower brought temperatures down to a high of 109 degrees. The forecast for Tuesday was 107 degrees, according to KXAN.

Harper-Madison was especially concerned about her constituents and others who might not have the resources to escape the heat on their own. The city offers Chill Centers, which include select recreation centers and libraries scattered throughout the city, which have been designated as places Austinites can go to escape the heat of the day. Although libraries regularly stay open until 8 p.m., few recreation centers stay open past 4 or 5 p.m.

Kanya Lyons, spokesperson for the Department of Parks and Recreation, said via email: “Cooling centers are operating during the day to coincide with peak temperatures. Overnight cooling shelters are dependent on widespread power outages and the estimated time to restore power. Although ERCOT warned Texans it could be forced to mandate statewide blackouts on Monday, that didn’t happen. But it is possible that it could happen at any time this summer.

Austin Public Library spokesperson Baylor Johnson said all libraries are designated cooling centers that are “open to the public for anyone seeking heat protection during regular business hours.” The Central Library and all branches are open Monday through Thursday 9 a.m. to 8 p.m., Friday 9 a.m. to 5 p.m., and Saturday 10 a.m. to 5 p.m. (except St. John’s location , which closes at 4 p.m. on Saturdays).

Early Monday, the city’s website offered no advice on whether cooling centers would be open for overtime on Monday, Tuesday or later in the week. By late afternoon, the city said the excessive heat warning would continue until 7 p.m. Tuesday.

Harper-Madison and District 5 council member Ann Kitchen were among those particularly concerned about where residents could shield themselves from the heat after the cooling centers closed. The kitchen told the austin monitor via email that her office had not received any concerns or questions from District 5 residents. However, she said her staff had helped some District 3 residents over the weekend when the air conditioning stopped working. The city code department provided air conditioning units, she said.

District 2 council member Vanessa Fuentes said via email, “This extreme heat advisory is not limited to traditional business hours. I am deeply concerned for our vulnerable populations and their safety in these extreme weather conditions. With ERCOT calling for conservation and the threat of power outages, the City of Austin must have plans for evening and nighttime cooling centers to help our vulnerable residents. We need to be proactive and communicative in multiple languages ​​regarding these plans. »

District 9 council member Kathie Tovo said she heard concerns about limited hours and a ban on pets on social media and a constituent whose air conditioning was not working properly. Pets – which also suffer from the heat – are excluded from cooling centers, although service animals are allowed.

Tovo added, “I reached out to staff earlier to let them know and to see if the city has any plans to extend the hours of operation for any of our cooling centers. I also asked if there was a list of cooling centers and times that I could share (rather than the page that links to individual facilities).

Late in the day, Tovo got news from Homeland Security and Emergency Management, which had updated information for those who may be seeking refuge at a recreation center or public library branch. The city urges anyone planning to visit one of these cooling centers to call ahead or call 311 to make sure it is available.

Harper-Madison also expressed concern for those dependent on medical devices that depend on electricity. According to spokespersons for the library and the parks department, none of the cooling centers have backup generators. The only library building with such a generator is the History Center, which offers no shelter for those trying to stay cool.

“We have seen time and time again that these events disproportionately hit marginalized residents, including black, brown and low-income Austinites. Our homeless neighbors are particularly vulnerable to extreme weather conditions. For environmental justice reasons, we are obligated as a municipality to put in place the kind of resilient strategies that will protect the least of us, even in the worst of situations,” Harper-Madison concluded in her post on the town bulletin board. “Worsening climate change will continue to bring increasingly erratic and violent weather, but that’s no excuse. Expecting the unexpected should be our guiding mantra, and I look forward to working with each of you, as well as city staff, to seek innovative and equitable solutions.

The austin monitorThe work of is made possible through donations from the community. Although our reports occasionally cover donors, we are careful to separate commercial and editorial efforts while maintaining transparency. A full list of donors is available here, and our code of ethics is explained here.

Join your friends and neighbors

We are a non-profit news organization and we put our service first. This will never change. But public service journalism requires the support of the community of readers like you. Will you join your friends and neighbors in supporting our work and our mission?

Coping with the global rise of SIM card swapping (Reader Forum)


SIM card fraud unfortunately manifests itself in many ways, but one of the most pernicious forms is SIM card swapping. SIM swapping is the process by which a hacker or malicious actor obtains the personal information and mobile number of an unsuspecting individual. This bad actor then uses this information to request a new SIM card from the victim’s mobile provider. Once received and placed in the malicious actor’s mobile device, this SIM card allows the hacker to access the victim’s SMS codes and change passwords, allowing unhindered access to banking and financial accounts, And much more.

The prevalence of SIM card fraud has risen sharply since the onset of COVID-19, primarily due to increased reliance of customers on remote access procedures, reduced willingness of customers to visit branches and increased hacker interest in SIM-centric social engineering attacks. These trends have resulted in approximately $100 million in losses in the United States in 2021 alone.

Measuring the impact of SIM swapping

The most obvious impact of SIM swapping is monetary losses – like the $100 million figure quoted above. Apparently anyone can be a victim or a perpetrator – in 2019 Twitter CEO Jack Dorsey was famously a victim of SIM swapping, and the year before a fifteen-year-old was able to steal $23 million in cryptocurrency from a single victim.

Ultimately, the responsibility for these losses rests with the customer, not the supplier. Although this may seem positive for mobile phone providers at first glance, who would probably not want to be dependent on such high figures, it can have a considerable impact on the reputation of the provider. Increasingly, customers don’t want to do business with vendors who don’t take their security seriously, and high-profile cases of identity theft and fraud can have a lasting negative impact on how vendors are perceived.

Current methods used for SIM card registration and replacement

Historically, the SIM card registration process, whereby a new customer registers with a mobile operator and provides their personal information, was done in person at a local office or branch. This face-to-face workflow is overall a very secure process, giving providers a solid foundation to get to know their customers and deliver their services with confidence that the user is in fact authorized and legitimate. Increasingly, however, this process has become available remotely due to the perceived inconveniences of in-person procedures; this has only accelerated in recent years due to the COVID-19 pandemic.

Remote replacement procedures performed online or over the phone are inherently less secure than those performed in person. Indeed, these rely on authentication methods that are increasingly prone to fraud, such as passwords. With identity theft at an all-time high lately, it has become increasingly easy for bad actors to pose as a victim and fraudulently obtain a replacement SIM card. To combat this, mobile phone providers are researching and implementing stronger authentication methods than traditional ones.

Biometric authentication to reduce SIM card fraud

For vendors looking to improve security for their customers without adding additional inconvenience, biometric authentication is a solid option. Unlike passwords and PINs, biometrics take advantage of the uniqueness of our physical characteristics, dramatically increasing security and significantly reducing a malicious actor’s ability to impersonate a customer.

Contemporary biometrics requires no special hardware and is as easy to perform as a person taking a selfie. Modern biometric technologies are mobile, using the cameras and microphones of today’s smartphones and devices to perform a facial capture or voice prompt of a user wherever that person is. The presented face or voice would then be matched against the user’s existing biometric profile, ensuring that the user is indeed the authorized person.

Therefore, since biometrics relies on something you are instead of something you know — such as a password or the answer to a security question — a customer’s means of authentication cannot be stolen by a malicious party.

Biometric authentication is also fast, ensuring a high level of convenience for users. Today, highly secure facial or voice recognition can take place in seconds via a mobile device, using the cameras and microphones already included. No special hardware is needed and the whole authentication process can be natural and frictionless.

Additionally, biometric authentication software can replace contemporary authentication methods such as passwords relatively quickly and easily with minimal implementation issues. Providers can continue to maintain their existing workflows for SIM card registration and replacement; the only change is how users authenticate.

With SIM card fraud on the rise around the world and passwords becoming more outdated and prone to fraud, now is the time for mobile phone providers to review their authentication procedures and look for proven alternatives. Too much is at stake not to do this.

What is the exact security of two-factor authentication? – Geek Review


Two-factor authentication (2FA) is becoming mandatory on many websites, and it’s easy to see why. On the face of it, requiring you to confirm your login via text or app provides a solid second layer of security. But how strong is he?

With security threats on the rise and people having more to lose online than ever, it’s only natural to want to protect yourself as much as possible. While hacking into a social media account can be annoying, there are far more serious consequences to having lax cybersecurity. Hackers could access your bank accounts and drain your savings, sensitive files and photos could be stolen, and you could even have a business account hacked and land in hot water with your boss.

The term “two-factor authentication” refers to a second step to confirm who you are. An additional layer of protection will, by default, provide more security than a simple barrier. However, there is more than one 2FA method; all methods offer different levels of security, and some are more popular than others. So can 2FA make your sensitive accounts invulnerable to hackers? Or is it just a huge waste of effort? Let’s find out.

Texting is not as safe as it seems

A laptiio displaying a 2FA code reset request
KT Stock photos/Shutterstock.com

The most common form of 2FA is SMS-based. Your bank, social media account, or email provider sends you an SMS with a code, which you enter within a set time. This gives you access to the account and protects your connection from anyone who doesn’t have your phone. At first glance, this is the safest method. Someone would need to steal your cell phone or devise an elaborate, James Bond-like way to clone your SIM card to get around this one, right? Bad.

Last year, Vice claimed a hacker could use a flaw in the SMS system to hack your number and redirect your SMS messages for as little as $16. There are also more or less sophisticated methods that an individual can use to access your messages. The easiest is to just call your phone company pretending to be you, saying your phone is missing, and asking the company to change your number to another SIM card. The most complex involve attacking the company directly and intercepting messages.

As for how they get personal information and your phone number? They might do shady deals and buy personal information about you and your various online activities on the dark web. Or they might check your Facebook for details like your date of birth, phone number, schools you attended, and your mother’s maiden name. You may know precisely what information you’re posting, but many people don’t.

At the very least, it is possible to protect yourself from sim swap attacks or be alerted when they occur. But you should consider adopting a different 2FA method if possible.

Email-based 2FA might be useless

Two-factor authentication should add an extra layer of security between your account and a potential threat. However, if you’re lazy, all you’re doing is adding an extra step and potentially giving an internet miscreant a good laugh. If you’re the type of person who uses the same password for everything and their email account is used to secure their target account, you could be in a lot of trouble. A hacker can log into this email address using the same information they have already stolen and authenticate their actions.

If you insist on using 2FA over email, you should create a separate email account just for authentication purposes with its unique, hard-to-crack password. You can also use another method as they are all more secure.

Push-Based Might Let You Down

A man logging into a site with 2FA

Push-based authentication can be fast, simple, and secure. A device, which can be your smartphone, is linked to your account and registered as a 2FA method of your choice. From then on, whenever you want to log in, you will receive a push notification on this device. Unlock your phone, confirm it’s you, and you’re connected. Sounds perfect, right?

Unfortunately, there is a catch or two. The main problem with the push-based method is that your device must be online for you to use it. If you need to access an account and your phone is having trouble getting a signal, you’re out of luck. It’s worth pointing out that this hasn’t been an issue for me in the few years I’ve used it. If I need to get online, I’m usually somewhere with WiFi, which my phone can use. I’m more likely to be somewhere where I can’t receive text messages than somewhere I’m trying to connect and can’t get a push notification on my phone.

Hardware-based 2FA takes a lot of effort

The YubiKey Bio on Mac and PC.

Physical authentication keys are as close to being hack-proof as possible. It’s basically a USB stick filled with protocols and security codes that you plug into a device that you connect to. You can keep it on your keychain and take it with you, or keep it in a safe and only take it out when you need to connect to something that needs that extra layer of security. The main danger with a physical key is losing or breaking it, something you may have done with USB drives in the past.

It is also possible to physically write down a long and complex authentication password. It is a string of numbers and characters and a popular method for securing cryptocurrency wallets. As these are hard to break, The FBI broke into a house find a piece of paper containing a 27 character password, which was easier than finding it. You can’t hack into something written on a piece of paper and stored in a desk drawer, and supercomputers can take years to go through the possible combinations involved in high-level encryption.

Of course, if it’s in your desk drawer, it’s not with you. If you take it with you, you can lose it as easily as you can lose a 2FA USB key. And when it is gone, you will at best have to go through an account recovery process or at worst lose access to your account. The physical method is the best thing you can do in terms of security, but the worst in terms of convenience. You can use it as a foolproof account recovery method, but it’s probably best avoided for things you access on the fly.

App-Based 2FA Worth Checking Out

Download an app like Google Authenticator comes with a few benefits. It is more secure than methods such as email and SMS authentication; it is free in most cases and still works if the device does not have an internet connection. This is due to the synchronization-based algorithm, which produces different keys at different points in time. A key is only valid for a set period and must match the device and site the user is connecting to.

There are still some vulnerabilities. With Google Authenticator, there’s no lock on the app itself, so anyone who can access your phone can open it and use it. Some malware could also take advantage of the lack of a passkey, so you should consider alternatives like the Microsoft Authenticator app, which adds an extra layer of security to the authentication process with features like biometric unlock. It’s also vulnerable to phishing attacks, where you enter the key into a fake website and allow a fast-acting hacker or bot to use it. They are also open to interception.

You should always use 2FA

(I know it’s cheesy and the pictures aren’t my strong suit, but it doesn’t look right without maintaining the “all pirates wear hoodies in dark rooms” trope.)

I have identified flaws with each method mentioned, and more will likely appear over time. But the more security you have, the better. You should 100% use 2FA and other methods like a password manager to secure your online accounts.

There’s a balance between security and convenience, so find what works for you. Maybe the hardware-based method is overkill or something you’re sure to lose. Texting might not be as secure as it looks, but it still takes a bit of effort to crack it. If you’re just an average Joe, you probably won’t be worth being individually targeted, and SMS authentication is something that will dramatically increase your online security.

Examine your life, assess what you have to lose, and determine how much effort you want to put into it. But at least choose a 2FA method (which is not email-based) and make sure you have a different password for each account you care about.

From the Chamber: Thoughts on Graduation


We live and work in a highly technical and complex world. Who would have imagined Ipods or Blue tooth? Or Zoom meetings? video conference? Or text messaging? or a blog? The video recorder is almost obsolete, replaced by the blue ray disc. A new car starts at $13,500 compared to $445 in 1934. A 6-room rent starts at $875 per month compared to $22.50 per month in 1934.

Minimum wage remains at $15 in Connecticut, up from .33 an hour in 1934. You know the price of gas – I remember filling up my car for $1. Even this information is dated, and I suspect some of you are way ahead of us.

When it comes to the world of work, these ever-changing and most challenging times are creating more anxiety and stress than most of us have ever experienced.

As Dr. Seuss said, “I’m sorry to say this, but unfortunately it’s true that snags and blockages can happen to you.” With that in mind, here are my top ten guidelines for success.

10. Set your priorities. Education does not end with the beginning; rather, it is the start of a long life journey that requires setting your goals.

9. If you commit to something, accomplish the task despite the challenges. Even if it’s not your life’s dream, finish what you started and learn from it. Then, continue without burning bridges.

8. Do what you love and love what you do. You bring to the table many talents from previous jobs and also life experiences. Identify the skills and talents you have and think about how you can transfer them to a job and career you’ll love.

7. Realize that life is a roller coaster with ups and downs. It is more productive to think of the glass as half full rather than half empty. Build on the positive rather than the negative. Even if it is sometimes difficult to understand, you can turn a bad experience into a good one.

6. Be persistent. Move forward despite the challenges that hold you back. See the possibilities in the good rather than the fear of failure. If it’s ethically, morally and legally correct, go for it!

5. Surround yourself with positive people. Whether it’s a personal friendship or a business contact, positive relationships matter most in the realm of things. You’re sure to find mentors and new best friends along the way, but always remember the family and community that guided you.

4.Improve your communication skills. Remember the magic words: please and thank you and I might add – I made a mistake. Keep in mind the message you want to convey, how it will be communicated, the audience who will receive that message, and the desired effect of the message.

3. Welcome change. Anyway, change is the only thing that is constant. Despite this awareness, unease and sometimes fear accompany the change. Since “variety is the spice of life”, embrace change and expand your experiences by adapting to and learning from life’s constant ups and downs.

2. Share your talents. The most valuable gift you can give to another is your time and attention. It doesn’t matter if you have little capacity or large capacity. What matters is what you do with what you have.

1. Remember that we only walk once. Do it with integrity, selflessness, good health, and belief in a higher power. Above all, do it with humor.

“You will mix, of course, as you already know. You will be mixed with many strange birds as you go. So be sure when you walk. Proceed with care and great tact and remember that life is an excellent exercise in balance… And will you succeed? Yes! You will, indeed! Dr Seuss

JoAnn Ryan is President and CEO of the NW CT Chamber of Commerce. You can reach her by email: [email protected] or by phone: 860-482-6586.

Pennsylvania 911 dispatcher Leon Price charged with failing to dispatch an ambulance in Diania Kronk’s death


Kelly Titchenell called 911 when her mother was in pain after days of heavy drinking. She made a desperate plea for medical assistance to a dispatcher in Pennsylvania: “She’s going to die” without immediate help, she said.

But instead of immediately dispatching an ambulance for Diania Kronk in the summer of 2020, the dispatcher asked for more assurance that Titchenell’s mother would be willing to be taken to a hospital half an hour away.

“She will, because I’m on my way, so she’s leaving or she’s going to die,” Titchenell told the Greene County, Pa., dispatcher as she drove to her boyfriend’s home. mother, according to a recording of the 911 call obtained by The Washington Post.

Still, Leon “Lee” Price waited and asked Titchenell to call 911 once she got home to make sure Kronk was ready for an ambulance. “We really need to make sure she’s ready to go,” he said on the call.

Emergency medical services arrived long after the call ended, Titchenell told the Post. Titchenell found his mother naked on the porch, talking incoherently and bleeding. Kronk, 54, died of internal bleeding the next day.

Now, about two years after Kronk’s death, the 911 dispatcher has been charged with manslaughter, according to Greene County officials. Price, 50, of Waynesburg, Pennsylvania, also faces charges of reckless endangerment, official oppression and obstruction, according to The Associated Press.

The charges represent a rare case in which a 911 dispatcher is charged in connection with the death of a person after failing to dispatch help. Price, who was arraigned on June 29 and released on bail, faces the charges after Titchenell filed a federal lawsuit last month in the Western District of Pennsylvania against the dispatcher, Greene County and two 911 supervisors. alleging a “ruthless denial of public emergency medical services. Lawrence E. Bolind Jr., the attorney representing Titchenell in the federal lawsuit, told the Post that Price’s hesitation during the nearly four-minute 911 call was “an intentional act.”

“I believe in my heart that my mother would still be alive if he had sent an ambulance,” said Titchenell, 38, of Mather, Pennsylvania. “It shouldn’t have been his decision. He should have sent an ambulance and let the professionals decide whether she should go to hospital or not.

A message left at a phone number listed for Price’s home address was not immediately returned on Friday. It was unclear if Price had an attorney.

While Price’s employment status in the county remains unclear, Marie Milie Jones, county attorney and 911 supervisors named in the federal case, told the Post that “Mr. Price is a member of a collective bargaining unit and the county is following the necessary procedures under the CBA. It was unclear whether Price faced discipline for the 2020 incident. Jones told the AP his clients did not believe they were responsible for Kronk’s death.

“It’s unfortunate that this woman is dead. Certainly, from a personal point of view, it is very difficult,” Jones said. “I’m not going to comment on the details of his situation.”

Greene County District Attorney Dave Russo said in a news release that county detectives’ investigation of the case revealed that “911 services violated protocol and their own procedures by refusing to respond to the case.” ‘Send an ambulance to Mrs. Kronk’s aid’.

“According to the investigation, she was denied medical services while all three ambulances were available for dispatch,” Russo said.

A manslaughter conviction carries a prison sentence of up to 10 years, according to Pennsylvania attorneys.

The charges in rural Pennsylvania come weeks after a 911 dispatcher in Buffalo was fired after a Tops supermarket worker trapped in the deadly mass shooting in May was hung up. Erie County dispatcher Sheila E. Ayers was first placed on administrative leave after Latisha Rogers, assistant supermarket office manager, told the Buffalo News and WGRZ that she called 911 and whispered to the dispatcher hoping to inform authorities of the mass shooting. that takes place at the grocery store. But instead of helping her at a time when she was “scared for my life,” Rogers said, the 911 dispatcher dismissed her in “a very mean tone.” Ayers was fired last month after eight years with the Central Erie County Police Department.

Although criminal charges against 911 dispatchers are rare, they are not unheard of. In 2008, a 911 dispatcher in Detroit was sentenced to a year’s probation and fired from her job for not taking a boy’s call seriously when he told the operator that his mother was in trouble. was collapsed. Sherrill Turner, 46, was found dead hours after Sharon Nichols allegedly hung up Turner’s young son in 2006 and accused him of playing games. The dispatcher had testified in the case that she could not hear the child.

Kronk worked in home health care and enjoyed caring for others, her daughter said. Kronk, who had five grandchildren, loved cooking for his family and friends, especially his famous pepperoni rigatoni.

“She wanted to make sure everyone was okay,” Titchenell said.

When the coronavirus pandemic hit, Titchenell was vulnerable due to her autoimmune disorder, she said. She also suffered from fibromyalgia, an incurable chronic neuromuscular disease. Although she and her mother lived together in Mather — a small town more than 50 miles south of Pittsburgh — Kronk was spending more time at her boyfriend’s house in an effort not to bring the virus into Titchenell’s home.

“I panicked and didn’t want her to come and go. That’s why she stayed there for a long time,” she said. “I didn’t want her bringing the germs back here.”

Titchenell knew her mother’s drinking increased at the start of the pandemic, which led to weight loss and her “yellowing”, she said. But a text message from her brother that their mother was “in a bad way” prompted the girl to go to where Kronk was staying near Sycamore, Pennsylvania, court records show.

On July 1, 2020, Titchenell called 911 and was connected to Price. The cell phone service where her mother resided was not good, so she called 911 before she arrived, Titchenell told the Post. At the start of the call, she explained that her mother was in pain after days of heavy drinking and asked for an ambulance to pick her up.

“I can’t get her in my car. … She can’t even move,” Titchenell said, according to the 911 call.

During the call, Price repeatedly told Titchenell that Greene County could not force Kronk into an ambulance if she did not want to. At this point, Titchenell told the Post, she was confused as to what was going on.

“I didn’t understand because usually if you call 911 they send help,” she said. “It really didn’t make sense to me.”

After Titchenell told the dispatcher that his mother “wasn’t in her right frame of mind right now” to make the decision, Price bluntly told Titchenell that “no emergency service would be provided” without confirmation from Kronk that she would go to the hospital, according to court records.

“Can we at least try?” Asking price at Titchenell.

When Titchenell said she was 10 minutes from her mother’s boyfriend’s residence, Price suggested she hang up and call 911 to “make sure she wants to go before sending resources there. -down”.

“I’m sorry,” Titchenell said.

“No, don’t be sorry, ma’am,” Price replied. “Just call me when you go out, okay?”

Bolind told the Post that Price “never told the police, never told anyone to follow” Kronk’s condition.

“At some point, Ms. Titchenell thinks it was decided that for some reason, in her opinion, they didn’t want to waste resources going to where her mother was staying,” he said.

An autopsy later concluded that Kronk had died of internal bleeding.

Russo, the district attorney, told the Post that the inquest next month is expected to determine whether additional charges will be brought against Price or the county.

“No one should be denied emergency services in Greene County or anywhere else,” he said. “Everyone should have the same protections and access to medical care.”

Titchenell described the past two years as hell for her and her family. As she hopes for accountability, she says, she thinks of one of the questions she would ask the dispatcher if he were to speak again: “What would you do if this happened to your mother ?

“I never want this to happen to anyone else,” she said.

Kenyans to Participate in Presidential Debate Via Whatsapp, Email, SMS


Nairobi — Kenyans will now be able to fully participate in the presidential debate scheduled for this month through the social media platforms opened by the presidential debate team.

They will be able to post their questions via WhatsApp, email and SMS code on the governors’, vice-presidents’ and presidents’ debates which will be held on July 11, 19 and 26 respectively.

Speaking at the signing of a partnership with Mkenya Daima and the Kenya Private Sector Alliance, Kenya Editors Guild President Churchill Otieno said the questions posed will guide the discussions.

“We are opening up channels for Kenyans, especially in Nairobi, who wish to contribute to the questions of the debates. Those who prefer WhatsApp will use the phone number 0796560560, by SMS they use the code 22843 and by email they use info @debates.co.ke,” he said.

According to the chairman of Mkenya Daima, Vimal Shah, Kenyans must know that voting is their responsibility and that candidates must accept the will of Kenyans regardless of the outcome of the elections.

He said the debates will indicate the type of leaders who will come to lead the country and that Kenyans should post their questions to get a clear view of the plans they have for them.

“I appeal to those who come later to say that the candidate did not answer such and such a question, since there are platforms like WhatsApp and the SMS code, please post the questions and they will be answered”, she said.

Kenyans were urged to send in their questions before midnight on the day of the debate to ensure a dynamic and continuous flow of questions to be asked.

Churchill added that the debate would take place in two stages.

“The first tier will include gubernatorial candidates whose approval rating, based on three recent opinion polls, is less than 5%, while the second tier will include candidates who have achieved more than 5% in the polls. the same opinion polls,” he said.

The debate will take place with respect for the values ​​of fairness, integrity, independence and responsibility, the organizers promised.

Yankees’ Anthony Volpe and Rangers’ Jack Leiter will be teammates again thanks to MLB honor


Finally, former Delbarton teammates Anthony Volpe and Jack Leiter will be teammates again.

The duo will play for the American League at the 2022 MLB All-Star Futures Game in Los Angeles on July 16.

Volpe, the Yankees’ top shortstop prospect, and Leiter, the Rangers’ top pitching prospect, are best friends and played together until they graduated from Morris County High School in 2019 .


The Yankees drafted Volpe in the first round in 2019. Leiter went to Vanderbilt and Texas drafted him in 2021.

Yankees prospects Jasson Dominguez, an outfielder, and starting pitcher Ken Waldichuk will also play in the game.

Baseball America ranks Volpe eighth among MLB prospects. Volpe, 21, hit just .244 with 11 home runs, 41 RBIs and a .786 OPS in 70 games at Double-A Somerset. But he’s been on fire since June 1, hitting .299 with six bombs and a .922 OPS in 30 games.

Dominguez, 19, hit .257 with eight home runs and 33 RBIs with a .793 OPS in 69 games at Low-A Tampa. Nicknamed “The Martian,” the Yankees gave Dominguez a record signing bonus of $5.1 million as a 16-year-old in the Dominican Republic in 2019.

Want to bet on MLB?

See Top NJ Sports Betting Sites

Waldichuk, 24, is 6-2 with a .199 ERA in 14 starts between Double-A and Triple-A Scranton/Wilkes-Barre. At Double-A, he was 4-0 with a 1.88 ERA. At Triple-A, he went 2-2 with a 2.52 ERA. The Yankees drafted the left-hander in the fifth round in 2019 from Saint Mary’s College of California.

Leiter, 22, is 2-6 with a 5.36 ERA in 13 games (12 starts) at Double-A Frisco in his first professional season.

Please subscribe to us now and support the local journalism YOU rely on and trust.

Brendan Kuty can be reached at [email protected].

How to Check Matric Results Online, Sarkari Result, indiaresult.com


Candidates can also check their results by SMS. According to the Minister of School and Mass Education Department, Samir Ranjan Dash, the high school exam result will be uploaded to the website within an hour of the results being released.

BSE Odisha class 10 board exams were conducted between April 29 to May 6, 2022 between 8 a.m. to 11 a.m. The board had changed the matrix exam model this year. The tests were held on 80 points for all subjects except professional trades and the third language.

BSE Odisha Class 10th Result 2022: How to Check Via Website

Step 1: Visit the official website — bseodisha.nic.in

Step 2: Click on the link “BSE Class 10 result 2022” available on the homepage

Step 3: You will be redirected to a new page

Step 4: Log in using registration number and personnel number

Step 5: The result will appear on the screen

Download and print the result for future reference.

BSE Odisha Class 10th Result 2022: How to Check via SMS

Class 10 students can also check their results by SMS. To check the result by SMS, students must follow the format given:

Step 1: Type OR10

Step 2: Text 5676750.

Step 3: Odisha Table Class 10 results will be available on the same mobile number.

Download and print the result for later.

In 2021, a total number of 2,80,352 boys and 2,81,658 girls were passed. The overall pass percentage was 97.89%. The board had canceled madhyamik exams in the state due to an increase in Covid cases and the students were assessed on the basis of alternative assessment criteria.

Why and how to improve web accessibility


NEW! Listen to the article

In our digital-driven society, as marketers, we are creating more content online than ever. But are we doing everything we can to ensure that our content is accessible to all users of all abilities?

For far too many of us, the answer is no.

Most online content contains accessibility barriers for people with disabilities, preventing them from participating in the digital experiences we create. Additionally, accessibility barriers reduce usability for all users.

Examples of barriers include sites that are not structured properly to allow navigation and logical reading order for a blind visitor using a screen reader; experiences that cannot be navigated successfully using a keyboard instead of a mouse for users with limited mobility or other physical challenges; and the lack of captions, transcripts and descriptive text for deaf users.

In the United States alone, 61 million adults, or more than 25% of the population, identify as having some form of disability. This is a significant proportion of our audiences, and they have the right to have equal access to both physical venues and digital experiences.

In a time when online interaction is more important than ever, it’s essential to ensure that every element of your digital campaign is accessible so you can reach your maximum audience.

Diversity, Equity and Inclusion

Brands and consumers increasingly value a commitment to diversity, equity and inclusion (DEI). Digital accessibility is a major component of DEI initiatives as it provides equal access and engagement opportunities for people with disabilities.

Additionally, disability affects all demographics, so ensuring digital experiences are accessible helps ensure engagement of a diverse group of consumers.

Legal obligation

Accessibility is also a legal obligation. The Americans with Disabilities Act (ADA) applies to digital experiences, based on consensus case law and the perspective of the Department of Justice.

From 2017 to 2021, over 10,000 ADA lawsuits have been filed. In 2020 alone, approximately 265,000 ADA request letters were sent regarding digital accessibility issues.

Inclusive Content Design: A Guide

So where do you start when creating an inclusive campaign?

First consider the wide range of disabilities. Some people may be blind or partially sighted; others may be deaf or have partial hearing loss. Cognitive disabilities and mobility impairments can affect how quickly a person is able to consume content or affect the ability to navigate content and use a mouse.

Understanding the many types of disabilities and what creates a welcoming experience for all users will inform your creative design and development processes.

Campaign planning

Before you start, ask yourself: Is there an opportunity to include people with disabilities in our campaign? Authentic inclusive portrayal in advertising places a diverse group of people in a positive light, undermining the stigma often associated with disability.

Take, for example, the Facebook portal ad “Share Something Real” which captures communication between two deaf sisters. The ad highlights the power of real conversations, including those in visual rather than spoken language.

When customers can naturally see themselves in your campaign, they are more connected to it, which is likely to make your message “stick”.


Multifaceted campaigns often include video elements. When producing video content, ensure that it is accessible to people who are blind or partially sighted, people who are deaf or have partial hearing loss, and those with cognitive disabilities.


  • Enable closed captioning for people who are deaf or hard of hearing
  • Including audio descriptions (describing on-screen visuals) for those who are blind or visually impaired
  • Avoid bright flashes when possible, or adhere to the “three flashes” rule (no content that flashes more than three times in one second) to avoid inducing a seizure
  • Including sign language interpretation for pre-recorded content
  • Selecting a video player that can be controlled by audio command or without a mouse

Websites and Landing Pages

The accessibility of your website or landing page impacts your conversions. When users encounter obstacles, they can bounce off your page, rendering your marketing efforts ineffective.

Consider doing the following when designing websites and landing pages:

  • Establish a clear header structure so that someone using assistive technology, like a screen reader, can logically navigate your page.
  • Make sure all non-decorative images have alt text so that a screen reader user who can’t see the featured images knows their meaning (especially important on e-commerce sites).
  • Be aware of your color contrast (the difference between a foreground color and its background). If there is not enough contrast, a visually impaired or color blind person may miss the content completely.
  • Label all your controls (everything a user interacts with): buttons, text boxes, checkboxes, etc. This will ensure that users understand the purpose of the controls and can navigate them successfully when using a screen reader.
  • If a control is an image (for example, a shopping cart icon), provide alt text so that the control is discoverable and usable.
  • Make sure controls are properly sized and positioned to be usable by keyboard, mouse, touch, and assistive technologies. Controls that are small or those that move can be difficult to interact with using alternate input technology.
  • Avoid auto-playing content that is difficult to control without a mouse and disrupts using a screen reader. If such content is unavoidable, provide the ability to stop or pause the video or audio.
  • Use jargon-free words in your messages that are easy to understand at all reading levels. It is best to keep sentences and paragraphs concise.


An effective campaign often includes multiple email touchpoints. Are your emails accessible?

Similar to your website, consider doing the following when creating inclusive emails:

  • Make your subject line clear, and consider using a pre-header that screen readers can easily recite (much like Siri announces a text message you receive on your phone).
  • Avoid sending e-mails that only contain images without supporting text, even if they seem more aesthetic. In such a case, your image alt text should describe everything about the image, making it long and complex.
  • Make sure the color contrast is correct, even considering the color of your font against its background.
  • For longer messages, establish an appropriate header structure.
  • Keep your message simple and avoid using abbreviations whenever possible.
  • Use readable fonts and pay attention to text formatting if you have multiple paragraphs.
  • Make sure your hyperlinks describe where they lead a user. For example, the use of “click here” or “learn more” gives no indication of the content to which a user will be redirected.

Accessible experiences are more usable experiences

A commitment to an accessible experience at every touchpoint in your campaign ensures that your customers can fully engage with it, maximizing your marketing impact. It also means that they won’t hit any obstacles and opt for a more accessible competitor.

Additionally, when you make different elements of your campaign accessible to customers with disabilities, you improve the customer experience. all user. For example, video captions not only benefit people who are deaf or hard of hearing but also viewers in a noisy airport, for example, or those who retain information better when reading.

Accessible digital experiences are more usable experiences. Accessible content is beautiful content. By taking a moment to review a few simple checks and balances when planning, you’ll ensure maximum reach and effectiveness for your content and contribute to a more inclusive Internet.

More web accessibility resources

Why you need to create accessible videos

Professional Live Captions or Automatic Live Captions: Which is Right for You?

Do marketers consider accessibility when creating email campaigns?

Glia improves outbound texting and calling to help businesses proactively engage consumers with channelless digital customer service


Glia, the leading digital customer service (DCS) provider, has extended the proactive outbound capabilities of its DCS platform with two new features:SMS without channel and ChannelLess outgoing calls.

Both allow service representatives to contact customers and easily add richer digital channels, such as chat, voice or screen video, without interrupting the connection.

“Our customers have been incredibly responsive to texting, especially our QR code promotions at sporting events and service options at car dealerships. We’re excited to take our texting capabilities to the next level with the outbound capabilities of Glia, directly tied to our digital customer service platform, we see a significant opportunity to become very proactive and grow our business,” said Jeff Ward, Chief Technology Officer at SimplyIOA.

SMS and the ChannelLess benefit

Canal of GliaLess The architecture overcomes omnichannel limitations by fully integrating all communication channels, including SMS, into a single platform. This allows for easy channel-to-channel transitions and unified administration across all customer engagement.

With Glia, businesses can proactively reach out to their customers and initiate seamless engagement that can start with SMS. Customers are not required to make a phone call to continue service. All engagement remains digital, shifting to chat, voice or on-screen video for real-time support and can include connavigation for on-screen collaboration.

Glia’s ChannelLess SMS connects customers to the same service representative who sent them an SMS via affinity routing. It also includes tools to help service reps further accelerate engagements, including auto-complete, pop-up messages, and automation capabilities through AI and chatbots.

In addition to a better on-screen experience, Glia’s seamless digital customer service platform dramatically improves engagement security. SMS messages are not encrypted, which makes them vulnerable to data breaches and identity theft. Glia’s chat, voice, and OnScreen video have end-to-end encryption to protect sensitive data.

Outbound calls go digital with a channelless approach

Businesses can now proactively reach their customers over the phone and drive them to fully digital engagement with Glia’s enhanced ChannelLess calling feature. By accessing a computer or mobile screen, customers can continue engagement digitally, via chat or video, without hanging up and starting over. This is especially useful for complex tasks where digital guidance with CoBrowsing and online collaboration is easier than talking to a customer through multiple steps on the phone.

ChannelLess SMS and outgoing calls from Glia help companies to:

  • Speed ​​up application processes, such as loans, credit cards or opening new accounts
  • Discreetly manage disputes and collections
  • Promote outbound marketing offers
  • Immediately manage alerts and notifications

“We continue to build on our mature digital customer service platform and deliver new features to further enhance the online experience. Increasingly, companies are looking to become proactive; Glia allows organizations to initiate a conversation via text or even a phone call and keep customers on screen for a seamless digital experience that can include secure chat, voice and on-screen video,” said said Justin DiPietro, co-founder and chief strategy officer of Glia.

Glia’s seamless SMS and outbound call capabilities are available today and already in production with Glia customers. For more information and to see how Glia can help your organization, visit the SMS solution page.

About Glia

Glia is reinventing the way companies support their customers in a digital world. Glia’s Digital Customer Service (DCS) solution enriches web and mobile experiences with digital communication choices, on-screen collaboration and AI-powered assistance. Glia has partnered with over 300 banks, credit unions, insurance companies and other financial institutions worldwide to improve customer experience and drive business results. Named both a Deloitte Technology Fast 500™ company and a Great Place to Work (with a 97% employee satisfaction rating) for a second consecutive year, Glia continues to achieve broad industry recognition and thought leadership in in customer service, including publishing the definitive book on DEC with Wiley. The company has raised over $150 million in funding from top investors.

To find out more visit glia.com.

Funeral services honor Lee County Commissioner Frank Mann


FORT MYERS, Fla. — Lee County Fire Commissioner Frank Mann was laid to rest Saturday. His funeral was held at the Covenant Presbyterian Church in Fort Myers. According to the church pastor, Mann helped organize his own memorial service. Many people from the community were present.

“We are here to mourn our great loss of Commissioner Frank Mann,” said Sheriff Carmine Marceno, of the Lee County Sheriff’s Office. “Everything he did was public service. He’s a legend.

Mann left video messages to stream for everyone who attended his funeral. In some of the videos, he described why he chose specific scriptures and hymns.

“I exist therefore I was created and that’s what I love about this next song because it’s about the relationship between me and my creator because no matter how bad things get, no matter how good things are, he, my maker is still here.”

Mann began working in public service in 1974, serving eight years in the Florida House of Representatives and four years in the Florida Senate, representing several southwest Florida counties, officials said.

Many have praised Mann and his accomplishments, but also the fact that they will forever remember his southern accent and his willingness to forge his own path.

“A great legend here in Lee County. I have enjoyed working with him over the past 10 years and his decades of service here in Lee County you can see wherever you go,” said Lee County Commissioner Cecil Pendergrass.

“I look at conservation, I think of Frank Mann and what we tried to do in 2020 and everything we tried to accomplish. He was obviously really there and still defending. It was great working with him,” said Lee County Commissioner Kevin Ruane.

“I mean it doesn’t even feel real yet. I expect him to be there at the next meeting and I know he won’t be and therefore the next meeting will be different without him,” said Lee County District 4 Commissioner Brian Hamman. .

Mann’s eldest son, Frank Jr. spoke to the crowd and even made them laugh.

“I came across a quote the other day and I just knew I had to use it because it’s almost eerily real until today. It’s from Winston Churchill. He said I’m ready to meet my creator, whether my creator is prepared for the great test of meeting me is another matter.

Along with his final farewell video, Mann left this message.

“This is my sadness, this is my last farewell and my last thank you and my last I love you to my beloved Marie Lee. It will be followed by the blessing. Thank you very much to all, ”said Mann in the video.

Officials said Mann died aged 80 at his home in Alva. He died after a battle with pancreatic cancer.

4 men convert duped money into cryptocurrency to hide lead, outfit


Four men have been arrested in Chittorgarh of Rajasthan for allegedly deceiving people under the guise of getting loans online and converting the defrauded amount into cryptocurrency.

Police are contacting the National Cybercrime Reporting Portal for more details of the accused, Chittorgarh residents Deepak Patwa (23), Dev Kishan (32), Suresh Singh (45) and Sunil Kumar Khatik (34) years), resident of Madhya Pradesh, and seek plaintiffs. Law enforcement sources said the accused could have duped hundreds based on the recoveries – 15 debit cards, seven cell phones, 27 SIM cards, a dongle, a laptop, a tablet, six checkbooks, a car BMW, five booklets and Rs 20,000 – and even bought the car with the duped money.

DCP (Rohini) Pranav Tayal said: “Defendant used to get money by deceiving several owners of bank accounts through UPI. They then converted it into cryptocurrency through an online exchange. Patwa received a cryptocurrency commission and traded it directly to her account and through hawala transactions.

According to the police, they received a complaint from a man from Rohini Cyber ​​Police Station who alleged he had been defrauded based on an online loan offer. He received an SMS with a link that his loan had been approved with a limit starting at Rs 2 lakh. When he clicked on the link and downloaded the basic details, he received a call through a messaging app and was asked to deposit 5% of the loan amount and that he would be repaid later. After the plaintiff deposited Rs 40,000, he received no response.

Buy now | Our best subscription plan now has a special price

Police said the suspects had been identified, located in Chittorgarh and apprehended. Police said the defrauded money was transferred to accounts at MP’s Neemuch. They added that Rs 75 lakh was transferred in two days and the cryptocurrency was purchased on multiple platforms.

DCP Tayal said: “The defendants were looking for an idea to fool as many people as possible using an easy trick. They found a YouTube video where they learned how to trick people under the guise of providing loans online. They were looking for more information when they met a Chinese national on (the messaging app). The defendant, Deepak, would take this man’s advice on how to deceive people…. The accused was converting all the cheated money… on a crypto platform. The cryptocurrency was then transferred to his other associates who cashed it using hawala channels. They thought it would be an easy way to hide the money trail.

An FIR has been registered under IPC Section 419 (cheating by impersonation) and 420 (cheating to induce delivery of goods), police said.

Family still seeks answers to death of 19-year-old National Guardsman | Latin Voice | Chicago News


A family is still searching for answers as to why a 19-year-old National Guard member was killed in the Belmont Cragin neighborhood last summer.

His family is now demanding that Cook County State’s Attorney Kim Foxx’s office re-evaluate the case.

Lourdes Lara still visits her son’s grave every day.

“He was at a time in his life when he was young. He was just starting to live,” Lara says of her son.

There are days when she puts on some music and spends time watering the flowers at her burial site.

“Last year, around this time, we were preparing to welcome him home,” Lara said. “Glad he’s coming home and our lives have changed forever.”

Chrys Carvajal, 19, had graduated from National Guard training and was to be stationed at a military base in Riverside. Last summer, he was shot on the July 4 weekend.

“He was invited to a party with his girlfriend. At one point he decides to go to his car and he was three cars away from his when he fell to the ground,” Lara said.

According to police reports, Carvajal was shot on July 3 in a drive-by shooting. Her family says detectives collected evidence, including testimony, but prosecutors and Foxx’s office declined to press charges.

“His team decided that even with all the evidence, witnesses and a named person, it was still not enough,” said Jennifer Ramirez, Carvajal’s sister. “We have camera footage, we have city camera footage…so we don’t understand.”

In a statement, the Cook County State’s Attorney’s Office said it has reviewed the information presented by police and, “At this time, it has been determined that there is insufficient evidence to discharge our charge of evidence to file murder charges.”

Nearly a year later, the family brings in Foxx to review the case.

“My brother Chrys Carvajal took an oath to serve and protect this country, this community,” Ramirez said. “He was also working to become a Chicago police officer. He was going to serve and protect your city, the least you can do is do justice.

Veteran Marcos Torres never met the youngster but worked with the family to bring justice to the case.

“What is the message we are sending to our citizens here in Chicago if you do the right thing, if you serve your county and get killed right here on your own streets and the people charged with prosecuting, not prosecuting said Torres.

Ramirez says she wants the world to remember her younger brother as the hardworking and loving young man he was.

“We want young people to follow in his footsteps. He had a bright future ahead of him and he was working towards his goals and even though his life was cut short, he achieved many of those goals and one of them was to join the National Guard,” he said. she declared.

As Lara flips through a photo album of her son, you can see a glimpse into Chris’ life. A life, Lara says, filled with family and friends.

“No matter what I do, my son is not coming back,” Lara said. “I would give my life for my son to come back.”

As the family prepares to gather for a memorial service this weekend, a grieving mother clings to her faith that justice will come.

“We take it one day at a time. The message I want to convey to young people is not to give up. You are a voice for this city and your community,” Lara said. “Keep chasing your dreams.”

The family is offering a $25,000 reward for any further information leading to an arrest.

Why and how are governments suspending the internet in India?


After the brutal camera murder of tailor Kanhaiyalal Teli in Udaipur by two men, the government of Rajasthan has banned internet services. Shut down internet as an administrative or public order measure has been a common measure taken all over India – for various reasons and by almost all political parties and governments.

There are no official data on the number of stoppages but according to estimates by research organizations, it seems that their frequency has increased in recent years. A growing number of people have been affected as a result as internet usage has increased in India and the coronavirus pandemic has made it even more of a commonly used essential service.

How do internet shutdowns affect people and why do governments impose them?

What does the data on Internet suspensions say?

According to the Software Freedom Law Center (SFLC), a legal service organization working in this field in India, since 2012, there have been 665 internet shutdowns in India nowadays. Here, “shutdowns” means a complete ban on mobile (3G, 4G/LTE) or fixed (dial-up, wired/wireless broadband) internet, both or either of which can be shut down.

According to internet freedom and technology policy organisations, India is the top country (by number) for internet disruption incidents and frequency of shutdowns. This year, 59 closures have been imposed, according to SFLC, which determines closures based on government orders and media reports.

This raises another question: Internet shutdowns aren’t always officially announced, so it can be difficult to know if your phone is just not working properly or if a shutdown is in place. Raman Jit Singh Chima, senior international lawyer at Access Now, which works to secure an “open internet”, told The Indian Express that some telecom companies in states like Rajasthan are alerting people via SMS, but this it’s not mandatory.

Jammu and Kashmir has seen over 411 lockdowns since 2012, with the longest lasting over 552 days after the former state’s special status was revoked.

Among the states, Rajasthan has seen the most lockdowns – with 88 such cases in almost 10 years. The reasons range from protests by the Gujjar community for the reservation to preventing cheating during the Rajasthan Teacher Eligibility Examination (REET) held to select primary school teachers last year, which was taken by about 16 lakh seekers.

How do governments justify shutting down the internet?

Governments claim that misinformation and rumors can lead to a breakdown of law and order in an area, so curbing the flow of information helps maintain peace between communities in times of crisis.

But many experts have countered that in the absence of sources of information like the media, rumors may actually end up spreading even more. Additionally, important services such as those related to payments, banking, and access to education are all cut off in an instant, leading to multi-level disruption and economic loss.

What is the procedure for shutting down the Internet?

In February 2022, Lok Sabha MP Varun Gandhi asked parliament whether the government keeps records of closures or intends to, and if not, what protocol is followed.

Minister of State for Communications Devusinh Chauhan responded that the States Review Committee, chaired by the Chief Secretary (the highest official of a state) is mandated by the rules for temporary suspension of telecommunications services (public emergency or public safety), 2017, to decide that the stops were made according to the rules.

Rules drawn up by the central government state that temporary suspensions can be “due to public emergency or public safety” and give senior Home Office officials at central and state levels the power to order closures.

Newsletter | Click to get the best explainers of the day delivered to your inbox

Before the rules came into effect in 2017, internet shutdowns were ordered under Section 144 of the Code of Criminal Procedure, which gives district magistrates sweeping powers in dangerous situations.

So what is the debate about closures?

Anuradha Bhasin, a Kashmiri journalist, has petitioned the Supreme Court over the Internet shutdown in Jammu and Kashmir, which she says has brought a halt to newspaper printing work and life in general .

In its order issued in January 2020, the court ruled that “freedom of speech and expression and the freedom to practice any profession or to carry on any trade, business or occupation on the medium of the Internet enjoys a constitutional protection under Article 19(1)(a) and Article 19(1)(g)”.

The court ordered the J&K administration to “immediately review all internet service suspension orders” because “an indefinite suspension order for internet services is unconscionable.”

He said that “the restriction of these fundamental rights must be in accordance with the mandate provided for in Article 19 (2) and (6) of the Constitution, including the test of proportionality”.

The court ordered the government to compulsorily publish all orders allowing internet shutdowns, paving the way for the first time for the suspension orders to be challenged in court. In December 2019, the High Court in Gauhati ordered the government of Assam to restore the internet to the state after reviewing the suspension orders.

In December 2021, Parliament’s Standing Committee on Communications and Information Technology, led by Congress Leader Shashi Tharoor, said: “…Governments have resorted to telecommunications/internet shutdowns for reasons not so pressing and have regularly used it as a tool for routine policing and even for administrative purposes, such as preventing exam cheating to defuse local crime, which are not large-scale public safety issues and certainly do not constitute a “public emergency”.

The Home Office told the committee: ‘The phrase public emergency has not been defined in law, but contours broadly delineating its scope and characteristics are discernible from the section which is to be read in general. The competent authority must form an opinion on the occurrence of a state of public emergency with a view to taking further action under this article. »

Some of the committee’s suggestions included defining terms such as “public emergency” to avoid their use without cause. He added that some apps or websites could be banned, such as WhatsApp, where the possibility of rumors being widely circulated is high, while other internet services could remain available to users.

Los Angeles appoints city’s 1st heat manager as extreme weather becomes more common


As a child growing up in San Jose, California, Marta Segura heard horrific stories from her parents of women fainting on factory lines and overheated men in farm fields. Little did they know that these jobs exposed them to life-threatening conditions.

Then it hit home.

“My father, himself, got very sick once and almost died,” said Segura, 58, the daughter of a bracelet and a cannery worker. “It marked me when I was a child.”

Segura, who serves as director of the Los Angeles Climate Emergency Mobilization Office within the Department of Public Works, received a second title this month: chief heat officer, the city’s first. She joins a number of heat workers around the world in cities from Athens, Greece, to Santiago, Chile, begin to coordinate a better response to extreme heat, and develop sustainable cooling strategies. Phoenix and Miami are the only other US cities with heat agents.

As Los Angeles continues to experience more frequent heat waves, Segura will work with all city departments to help create an early warning system for heat waves and develop long-term strategies to reduce exposure. to heat, such as planting trees and updating building codes. His office will also launch a social media campaign in July in English and Spanish.

City of Portland cancels tree planting contract with Friends of Trees

Extreme weather conditions can cause cramps, strokes and heat exhaustion. Extreme heat has contributed to the deaths of about 12,000 people in the United States each year from 2010 to 2020, according to a study by the University of Washington. These numbers are likely to increase.

According to researchers from the School of Global Policy and Strategy at the University of California, San Diego, low-income, majority-minority neighborhoods experience significantly more heat than wealthier, whiter neighborhoods. Research shows that surface temperatures in communities with higher poverty rates can be up to 7 degrees Fahrenheit warmer, compared to wealthier neighborhoods, during the summer.

“South Los Angeles neighborhoods send 20 to 30 more people to the ER on hot days, compared to 2 more people in wealthier neighborhoods,” said Dr. David Eisenman, director of UCLA’s Center for Public Health and Disasters. . Eisenman will work with Segura to identify climate-vulnerable communities.

Heat ER visits skyrocketed in Portland’s heated dome in 2021

Segura takes on his new post as state lawmakers consider expanding heat warnings. Assembly Bill 2076 would create California’s first heat officer position and create a statewide extreme heat and community resilience program. Assembly Bill 2238 would create the nation’s first warning system for heat waves, much like existing systems warn of other natural disasters such as wildfires, tornadoes and hurricanes.

KHN reporter Heidi de Marco met with Segura in her town hall office to discuss her new role and how she plans to tackle the city’s climate risk. The interview has been edited for length and clarity.

Q: Why was this position created?

We have seen a fivefold increase in extreme heat events and heat waves. There are more heat-related illnesses and more hospitalizations and deaths.

There are two objectives. The first concerns changes to the system — the city’s services and infrastructure. The other is education and awareness — that people know oppressive heat is more serious so they can take steps to protect themselves.

We’re tackling education with an extreme heat campaign launching July 1. In terms of changing the system and services, the city is painting rooftops and roads with cool white[ing] paint, plant more trees for maximum shade in vulnerable communities.

Q: You will work to reduce heat-related hospitalizations and deaths, as well as work with various city agencies to implement a heat action plan. How will this work?

We are already discussing updating our building codes for decarbonization and climate adaptation.

The other approach is through public works. For example, installing more shade structures, more kiosks, especially for subway and bus transportation furniture. They are also installing more hydration stations.

So when you add that to our public amenities — parks, libraries, youth centers, all of which are accessible during the day — you have plenty of opportunities to tell people where to go in the event of a heat storm or heat wave.

Q: How do you intend to fight against inequalities?

It keeps me up at night. Addressing the most vulnerable community is not out of charity. And it’s not for moral reasons. That’s because if we don’t help LA’s most vulnerable communities, which make up more than 50% of the population, we won’t get to our climate solutions.

Landlords are less likely to invest in heat pumps or other air conditioning systems, as this would only increase rent and rent would displace individuals. So we need a policy in the city of Los Angeles that prevents displacement and helps in some way to subsidize these low-income housing units or find financing structures that allow landlords to invest and keep our healthy and safe families.

Q: Is there a particular challenge in sending messages to immigrant communities?

I think what I’ve learned in my family is that we tend to turn on the radio while we’re doing our jobs. It will therefore be important to use the radio. It will also be important to use text messaging services, such as WhatsApp.

We want to make sure we get that information out to employers, so we probably need to come up with culturally relevant communications. It is an evolving campaign.

Q: What type of budget do you work with?

We will allocate approximately 30% of our budget to heat risk prevention work, and although our budget is not large, our impact on other partner services, such as public works and the emergency management service, is significant.

We cannot look at my budget in silos since the town hall has ordered us to work together to consolidate the respective shares of our budgets for the prevention of heat risk. However, I can say that my desktop will double in size from four to eight [employees]and it will give us the leverage and resources we need to have the kind of impact the City of Los Angeles seeks to have in the long term.

Q: How do you plan to reach out to the homeless community?

What we would actually like are more pop-up units, where we have canopies and hydration.

So this is a conversation I’m having with our deputy mayor of homelessness and housing so that we can coordinate together. And that’s a good example of something my office can’t do alone because I need their expertise and allocated resources to ensure that we provide the best comprehensive resources available to the city.

Q: You are the first Latina to hold such a position in the United States. What does it do?

It matters because [Latinos] have suffered disproportionately from the vagaries of the weather for a very long time, and we have never had positions like this in the past. If they see someone from their community, or who looks like they belong to their community, who speaks their language, who is culturally related to them, who has had similar experiences, I think that makes a big difference, isn’t- it not?

This story was produced by KHNwho publishes California Healthlinean editorially independent service California Health Care Foundation.

Auburn Athletics unveils SPIRIT Exchange as part of its NIL program


AUBURN, Alabama – Auburn Athletics, in conjunction with the INFLCR, announced the launch of the SPIRIT Exchange to expand its ongoing Name, Image and Likeness (NIL) program for student-athletes. The SPIRIT exchange is the latest innovation to help Auburn student-athletes maximize NIL opportunities.

This streamlined, easy-to-navigate platform is a free service for student-athletes and third parties. It serves as a directory and personalized portal to connect businesses, collectives, donors, alumni and fans with student-athletes to explore, negotiate and close NIL deals.

“At Auburn, we remain committed to being the leader in the NIL space by providing additional resources to our student-athletes to maximize their NIL potential,” the athletic director said. Allen Green. “As the NIL landscape continues to evolve, we are committed to evolving as well. Unlocking this marketplace functionality through SPIRIT Exchange enhances our partnership with INFCLR and, most importantly, provides student-athletes with a key one-stop-shop in hand for all that concerns NIL.”

The SPIRIT Exchange is a NIL business registry for student-athletes tailor-made for corporations, collectives, donors, alumni, fans and others wishing to connect specifically with student-athletes at the University from Auburn. Once a company, collective, or individual registers with SPIRIT Exchange, they can access a searchable database of Auburn student-athletes and filter that database by a variety of criteria. They can message the student-athlete directly in the app or request the student-athlete’s contact information (or that of their representative) to start a discussion about an NIL transaction. INFLCR and Auburn will not be involved in any of the negotiations.

Once a NIL agreement is reached, a personalized reporting form, following Auburn Athletics name, image and likeness guidelines, is generated and submitted to the institution. The platform also includes a payment processing tool to securely pay student-athletes and will consolidate into a 1099 form found in the student-athlete’s INFLCR application for more efficient tax reporting.

Companies, collectives or individuals can register now on auspiritexchange.com. Auburn will include all student-athletes, who may opt out if they choose not to participate.

“The Auburn Tigers were one of the first INFLCR customers in 2017 and more recently provided key insights into the needs of the INFLCR+ local exchange as it was built. So we’re excited to announce finally the SPIRIT exchange, an extension of their NIL program,” said INFLCR President Jim Cavale. “One year after announcing the SPIRIT NIL program powered by Auburn’s INFLCR, it’s important for us to continue to provide best-in-class resources to this program, including the exchange platform for student-athletes to capitalize on the personal brands that SPIRIT has helped them build without increasing transaction fees.”


In 2021, Auburn Athletics announced the launch of SPIRIT, a comprehensive Name, Image and Likeness (NIL) program designed to educate and empower student-athletes and prepare them to optimize NIL opportunities. For more information, visit auburntigers.com/spirit.


INFLCR, a Teamworks product, is NIL’s leading athlete branding and business management application for elite sports organizations. The INFLCR Athlete App educates student-athletes, coaches, and staff for the NIL era in a safe and compliant environment, all powered by best-in-class content delivery for student-athletes to access and share content on their social networks. The INFLCR works with more than 250 collegiate and professional sports organizations.

Impactful features like the INFLCR’s local and global exchange provide local and national businesses with the ability to find, communicate, pay, and report NIL transactions with student-athletes, maximizing their NIL earning potential with simplified reports for their establishment and personal tax returns.

Visit inflcr.com for more information.

5 Key Financial Changes Take Effect From Today (July 1)

New Delhi: The coming month could bring a number of financial changes for individuals and taxpayers. Changes range from new credit card rules, entry into force of cryptocurrency TDS, double penalty amount on PAN-Aadhaar bond, change in savings rates, and more. .

Before we enter July, here is an overview of the main financial changes that are expected to have an impact from next month:

TDS on cryptocurrency, VDA

As announced in this year’s Union budget, the Center issued a circular on June 22 detailing the tax deduction process for transfers of virtual digital assets (VDAs) and cryptocurrencies from July 1, 2022. Now, the buyer of a VDA will have to deduct 1% of the amount paid to the seller as income tax withheld at source (TDS).

Tax must be deducted when crediting the amount or when paying to the resident individual, whichever comes first. The CBDT clarified that the tax will only be deducted if the amount paid exceeds the specified limit of Rs 10,000. The threshold limit for TDS would be Rs 50,000 per annum for specified persons.

New credit card rules

Credit Card Billing – In order to avoid repeated complaints about late billing, the Reserve Bank of India has stated that the card issuer may offer to issue bills and account statements via internet/mobile banking with the informed authorization of the card holder. Additionally, card issuers must have a system in place to ensure that the cardholder receives the billing statement.

Credit card closure – Banks are required to honor credit card cancellation requests by immediately contacting the customer via email, text message or another channel.

New labor code

Although the Center has not made any official announcement on the implementation of the new labor code, reports claim that it could come into effect from July 1. The introduction of the new labor code might lower the number of working days in a week, but the daily working hours may increase accordingly. The salary in hand of the employees could undergo a significant change because the code prescribes an increase in the contribution of the employee to the Provident Fund.

The new rules state that an employee’s base salary must be at least 50 percent of their gross monthly salary, resulting in an increase in the FP contribution paid by employees as well as employers.

PAN- Aadhaar connecting well

Anyone linking their PAN to Aadhaar from July 1, 2022 will be assessed a penalty of Rs 1,000. This is double the fine that was imposed for linking the two documents from April 1, 2022 to June 30, 2022.

Interest rates for small savings plans

For the first quarter of FY23, the government has decided to keep interest rates on government-guaranteed savings instruments unchanged. The interest rate of the various small savings plans for the first quarter of the financial year 2022-23 starting on April 1, 2022 and ending on June 30, 2022 remained unchanged compared to the rates applicable for the fourth quarter of the financial year 2021-22.

However, this could change for the next quarter and new rates could come into effect from July 1, to encourage investors in PPF, Sukanya Samriddhi Yojana and NSC.

KYC demat deadline

The deadline for making existing demat and trading accounts KYC compliant is June 30, 2022. A demat, trading account holder must update the following KYC attributes by June 30.

I) Last name

II) Address


IV) Valid mobile number

V) Valid email id

VI) Income bracket

‘Zach Snyder’s Justice League’ digital release date and how to watch


The official title Zack Snyder’s Justice League is streaming now on HBO Max, and it’s coming digitally, so you won’t need a streaming subscription to own it.

The Snyder Cut is director Zack Snyder’s re-edited version of 2017’s Justice League, a project he left early because of a personal tragedy. Joss Whedon stepped in to complete the theatrical release, but after a years-long fan campaign and with cast supportHBO Max gave Snyder a chance (and reported $70 million) to recreate his original footage in a longer version.

The result is a four hour director’s cutwith an R rating, a new score, finished visual effects, two new villains and Jared Leto reprising his role as the Joker.

Here’s how to watch Zack Snyder’s Justice League, aka The Snyder Cut.

How to watch Zack Snyder’s Justice League

Digital release date

The digital release date for Snyder Cut is July 19.

Blu-rays and DVDs

The film is available on DVD and Blu-ray. You can also get a Zack Snyder’s Justice League Trilogy Ultimate Collector’s Edition Blu-ray box set, which includes the movies Steel man, Batman V Superman Ultimate Edition (both theatrical and director’s cut of Dawn of Justice) and Zack Snyder’s long-running Justice League.

Streaming in the United States

You will need a subscription to HBO Max, which is currently $15 per month. It won’t cost you anything extra to catch the movie.


In countries like Australia, HBO Max is not readily available without a vpn. Snyder confirmed mid-last year that he was working with WarnerMedia and HBO Max on an international distribution plan. UK viewers can watch it on Sky Cinema and Now TV. It streams on Crave in Canada and on HBO GO in Asia, the Nordics, Central Europe, Spain and Portugal. Latin America will be able to access it when HBO Max launches in late 2021. HBO Max said more details are still to come for the rest of the world in the coming weeks.

Read more: The best VPN of 2021

HBO Max is currently in the process of closing a deal

If you don’t subscribe to the streaming service, HBO Max is currently working on a deal. Sign up for six months and you’ll get a 22% discount at $70. Not bad.

HBO subscribers get HBO Max for free

If you currently subscribe to HBO through your cable or satellite provider in the United States, you can probably get HBO Max without paying anything extra. The only difference is that you can’t watch HBO Max with most set-top boxes. The HBO Max app is available on Fire TV, Apple TV, Android TV, PlayStation, Xbox and many more devicesincluding Roku.

Roku users now have access to HBO Max

You read correctly. After months of delay, Roku is finally giving HBO Max access to its streaming devices and TVs. Roku users who already use the HBO app will be automatically upgraded to HBO Max. You can find more information here.

If you are not subscribed

Difficult to register? Here’s a long explainer on HBO Max, which has a huge library of other movies and programs you can check out, including Lovecraft Country, Rick and Morty, Studio Ghibli movies, and more. But last December, ideally before the release of Wonder Woman 1984, HBO Max announced that it will no longer offer a one-week free trial. Still, you can sign up and cancel after paying for a month if you realize you won’t watch the service enough to make it worthwhile.

Will it be available in 4K HDR?

After Wonder Woman 1984, The Snyder Cut will air in 4K UHD, HDR10, Dolby Vision and Dolby Atmos on supported devices. Not sure what this means for you? We break it down herebut essentially, if you have the right TV, streamer, or sound system, you can watch the movie with better picture quality and, in the case of Dolby Atmos, better sound.

How long is it available on HBO Max?

There is no limit to the time you have to watch the movie. Wonder Woman 1984 had a limited 31-day broadcast window, but Zack Snyder’s Justice League should be there to stream in your spare time.

What is the plot of the film?

Amid all the hubbub surrounding The Snyder Cut, you’d be forgiven for forgetting the overall plot of Justice League. After Batman v Superman in which – spoiler – Superman dies, Batman and Wonder Woman have assembled a team of heroes to take on the alien Steppenwolf and his monstrous troops in search of the three Mother Boxes. The Snyder Cut will flesh out the stories of all of these characters, including the rookie Cyborg, so it all makes sense. Aquaman, Flash, Lois Lane, Lex Luthor, Hippolyta and Martian Manhunter are among the list of gigantic characters.

Here is the trailer:

Evidence Contradicts Russian Claims of Kremenchuk Mall Attack | Ukraine


First-hand accounts from survivors and expert analysis have discredited Moscow’s account of deadly missile strikes on a shopping center in the Ukrainian city of Kremenchuk.

Igor Konashenkov, spokesman for the Russian Defense Ministry, said that his army had launched a “high-precision air attack on hangars where weapons and ammunition were stored”, and that the explosion of these caches of weapons had caused a fire in the nearby shopping centre. was “non-functional” at the time.

However, witness statements, information released by Ukrainian prosecutors and analyzes by independent military experts point to three possible misstatements in this account – that the Ukrainian military was hiding weapons nearby, that the mall was not a target and no one was using it.

Zelenskiy publishes images of a “deliberate” Russian strike on a shopping center – video

CCTV footage shows the first missile hit the mall at 3:51 p.m. Monday, and a second soon after hit a factory Moscow said was storing Western munitions.

Outside the mall, Ukrainian police set up a table to retrieve twisted pieces of a missile found inside. It is believed to have been a Russian X-22 cruise missile fired from a Tu-22M long-range bomber.

Ukrainian police display fragments of the X-22 missile found at the site. Photography: Alessio Mamo/Guardian

Satellite images show that the factory is 500 meters from the mall. According to independent military experts and researchers from Molfar, a global open-source intelligence community, the explosion could not have caused a fire powerful enough to reach another building so far away.

Satellite images showing the distance between the mall and the factory
Satellite images showing the distance between the mall and the factory. Photography: c/o Bellingcat

During a visit to the area between the mall and the factory, little or no damage to buildings or roads was observed, suggesting that no fires had spread.

Dozens of workers who survived, as well as witnesses who lived nearby, told the Guardian the mall was open and busy when it was attacked. The debris included the remains of the workers’ badges and products sold that day at the supermarket.

A phone message purportedly sent by local mall management on June 23 urging employees not to leave the mall in the event of air raid sirens
A phone message was reportedly sent by local mall management on June 23 urging employees not to leave the mall in the event of air raid sirens.

The Guardian saw a phone message purportedly sent by local mall management on June 23 urging employees not to leave the mall in the event of air raid sirens. “As of today, this mall will not be closing during aviation alarms,” ​​the post read. The mall is open from 8 a.m. to 9 p.m. No breaks.” At least five employees confirmed receiving the message.

Bellingcat, a nonprofit online journalism collective dedicated to investigating war crimes, has in recent days collected receipts from purchases at the mall that were posted on social media by Kremenchuk residents to show that the mall was actually open.

As for the alleged arms depot, the KredMash factory, Kremenchuk Road Machinery is a company producing equipment to repair and maintain roads or to repair vehicles used by construction workers.

A photo of Kremenchuk Road Machinery's KredMash plant after the attack
A photo of Kremenchuk Road Machinery’s KredMash plant after the attack. Photo: c/o Ukrainian State Emergency Service

Bellingcat said: “Although a 2014 report said the plant had been used to repair three military vehicles, this does not in itself prove that it was a storage site for weapons and American and European ammunition eight years later, as claimed by Russia.”

Company videos posted on YouTube by specialized construction companies show the presence of cranes and other equipment in the factory, which corroborated the account of the Ukrainian authorities.

According to various testimonies collected by the Guardian, the factory had been temporarily closed because of the war. It was guarded by a guard who ended his shift at 2 p.m., just before the strike.

Emergency aid for the victims of the earthquake in Afghanistan – Afghanistan


At least 1,000 people lost their lives and 1,500 people were injured in the 5.9 magnitude earthquake that struck Afghanistan’s Khost province. The IHH Humanitarian Relief Foundation immediately launched an emergency relief campaign for the area.

Reports indicate that Spirey province in Khost and Giyan, Ziruk and Naka provinces in Paktika were the most affected by the earthquake which struck early in the morning. It is reported that 1,000 people lost their lives and 1,500 were injured. Search and rescue operations are currently still ongoing in the affected locations.

Distribution of hot meals

IHH launched an emergency relief campaign soon after the earthquake. Two teams were quickly mobilized by IHH Afghanistan to be deployed to the disaster areas. In the first phase of operations, our teams distributed hot meals to 560 victims. 50 double blankets and 50 tents were also delivered. The IHH teams are continuing their operations to help the victims.

Many houses were damaged

Many houses were damaged by the earthquake which could also be felt in Kabul, the capital of Afghanistan and in Islamabad, the capital of Pakistan. Two earthquakes followed in western Punjab in Pakistan. Another 4.3 magnitude earthquake also hit the city of Faizabad in Afghanistan.

This earthquake hit the same area as many times in just one week.

Give support

Donors who wish to support the Afghan earthquake affected population through IHH can donate 10 TL by sending SMS through all operators sending SMS to AFGHANISTAN. Those wishing to contribute larger amounts can donate online through the IHH website or bank account numbers showing code AFGHANISTAN.

Disappearance of Raheem White: Toronto police appeal to the public


More than six months after Raheem White was last seen in Toronto’s Junction neighborhood, the Toronto Police Service (TPS) and Crime Stoppers have released a video in an effort to maintain awareness around the disappearance. and to encourage anyone with information to come forward.

White was last seen Dec. 1 in the Osler Street and Pelham Avenue neighborhood of Toronto around 3:30 p.m. wearing a black jacket, black pants, an orange toque and a black backpack, police said. He is described as a black man, six feet tall, weighing 200 pounds with an athletic build, brown eyes, and black hair worn in dreadlocks.

White was working as a delivery driver and DJ at the time of his disappearance, his relatives said, and intended to move in with his girlfriend.

A vehicle Raheem was driving at the time of his disappearance was located by investigators in a parking lot on Lakeshore Boulevard West near Sunnyside Beach with his wallet and personal effects inside, but his cell phone is still missing.

“Raheem has a large number of family members and friends who are very concerned for his well-being and are advocating for a safe return,” TPS Detective Constable Chriss Sukhdeo said in the video.

“The area where Raheem’s truck was found is a popular recreational trail and walk next year with cyclists, runners and dog owners,” he added, reminding the public if anyone has information for contacting the police.

Despite a significant public response to the disappearance, followed by a number of reported sightings, White remains missing. Police said they conducted extensive research on White, spoke to family and friends, contacted all major hospitals, twice searched local shelters and probed areas they knew White frequented, among “other investigative tools…which we do not disclose”.

They also said they had investigated “numerous separate sightings and conducted video searches”, none of which have been confirmed.

In May, CTV News Toronto spoke to White’s friends and family ahead of his six-month disappearance.

“It didn’t seem like anything was wrong,” said White’s former roommate and close friend Stefan Coward, who saw White two days before the disappearance. “There was no real indication, no real sign.”


White’s mother, Rosemarie, told CTV News Toronto in May that she felt the police investigation had begun to stall.

She said she often receives messages from people claiming to have seen her son, but by the time the information is investigated, its relevance has diminished.

“Oh my god, I’ve had so many sightings,” she said in May. “There have been tips every week, people message me regularly.”

“But if [Raheem] is seen today, and [police] don’t get the message until four days later, [is he] going to be in the same place waiting for you? I do not think so.”

Rosemarie didn’t get an official interview with the force until May 11 – nearly six months after White disappeared.

When contacted for comment, a spokesperson for the Toronto Police Department confirmed to CTV News Toronto that Rosemarie participated in her first official interview with the force on May 11, but stressed that they were in ” weekly communication with [Raheem’s] mother.”

“The Toronto Police Service takes missing persons investigations very seriously and our officers are dedicated to locating people as quickly as possible, using significant resources from across the service to support our efforts,” it said. they stated.

Police are asking anyone with information regarding Raheem White’s whereabouts to contact the TPS Missing Persons Unit at 416-808-7411.

Viral Videos Claiming Anyone Can Steal Money From FASTags Are Fake: Here’s Why


In a public service announcement, the National Payments Corporation of India (NPCI) has demystified ‘Unsubstantiated and fake videos’ circulating on social media claiming to be careful driving on motorways as those claiming to clean car windows can defraud the owner by erasing the FASTag.

According to NPCI, no transactions can be executed through open internet connectivity. Multiple layers of security protocols are placed to ensure secure end-to-end transaction processing, he said. Here we explain why no one can steal your FASTags money.

FASTag uses RFID

FASTag uses Radio Frequency Identification (RFID) technology to communicate with a scanner installed at toll plazas. Once the car has passed the toll plaza, the required toll amount is automatically deducted from a bank account or prepaid wallet linked to the FASTag.

Vehicles must pass through the toll, and if the beacon is linked to a prepaid account like a wallet or debit/credit card, owners must top up/recharge the beacon. If linked to a savings account, the money will be automatically deducted when the balance falls below a predefined threshold. Once a vehicle passes the toll, the owner receives an SMS alert about the deduction. The alert is like money debited from accounts or wallets.

Works on P2M

FASTag can only be used for person-to-merchant (P2M) transactions, which means no person-to-person (P2P) transactions are allowed. “An individual cannot receive money into the NETC FASTag ecosystem from fraudulent transactions,” NCPI said in a statement.


NPCI clarified that only Authorized System Integrators (SIs), who are authorized on behalf of dealerships, are permitted to perform and initiate payment transactions at toll plazas. The infrastructure deployed between the IS system, the dealer and the banks is secured by only whitelisting authorized IP addresses and URLs.

The hardware installed in the Toll Plaza server room is cryptographically secured through the Hardware Security Module (HSM). This ensures that no third party can interact with the system and that the transaction is carried out between the two parties.

Every API call must pass through a secure firewall. Each time the Bank connects to NPCI via API connectivity, the data is encrypted with a secure 256 SHA ECC algorithm and locked with a hexadecimal private key. Only NPCI possessing the corresponding public key will be able to access the information by decryption.

Unique Plaza Code

Each merchant (toll and parking stations) onboarded by NPCI is assigned a unique Plaza code. This is integrated only by authorized acquirer banks active on the FASTag ecosystem.

Each acquiring bank receives a unique acquiring identifier (AID). The combination of Plaza Code and Bank Acquirer ID is mapped to the NPCI end. This makes it impossible for anyone to register on the platform.

Looking for an abortion? Here’s how to avoid leaving a digital trail


Everything you do online is already tracked. This information is about to become even more sensitive if you are seeking an abortion in the United States.

Friday’s Supreme Court decision reversing the landmark abortion rights decision Roe v. Wade means 13 states could ban abortion within a month, and more could follow.

A Google search for a reproductive health clinic, an online order for abortion pills, a location ping to a doctor, and a text about the possibility of terminating a pregnancy could all become sources of evidence. People are constantly sharing data about their fertility online, say privacy advocates – even if they don’t realize it. Other obvious sources of health data include period-tracking apps and digital check-in forms at hospitals.

“People shouldn’t be responsible for doing everything perfectly, when they’re in a stressful situation, to protect their own privacy,” said India McKinney, director of federal affairs at privacy organization Electronic. Frontier Foundation. “Privacy is a basic human right, and it should be protected by law and statute.”

Here are the basic steps anyone can take to protect personal information when weighing an abortion.

– Limit who you talk to

Your biggest risk factor is other people. According to Farah Diaz-Tello, senior attorney and legal director of If/When/How, a nonprofit reproductive justice organization, many cases against people who have had abortions start with people they’ve told they have. report to law enforcement.

“The biggest vector of criminalization is the healthcare system,” Diaz-Tello said. The group has studied cases against people who have had abortions since 2000 and tracked how the process generally unfolds.

When someone goes to a healthcare provider for medical issues related to an abortion, healthcare professionals can report them to the police, who can then seize their phone or computer. With a device in hand, the police can simply check the browser and text messages directly.

Diaz-Tello recommends being judicious about what information you share in an emergency room or doctor’s office. A miscarriage and self-administered abortion using pills will look the same to most healthcare providers and require the same treatment, she said.

Also limit who you tell in your own life, including your friends or family. If you are experiencing threats from intimate partners, follow these steps to protect your communications and devices.

– Chat on a secure and encrypted messaging app

When discussing your situation, use private messaging apps that use encryption. Apple’s iMessage, Meta’s WhatsApp and Signal are all end-to-end encrypted by default, meaning messages are hidden from everyone but the sender and recipient.

Signal may be the safest option. Apple has the key to decrypt iMessages that are backed up using its iCloud service, and law enforcement could ask it to do so. WhatsApp, for its part, leaves room in its privacy policy to share data with Facebook’s parent company, Meta. Depending on the data he shares, this could pose privacy issues.

– Protect your devices

Remember that someone with access to your physical device can see your messages, whether they are encrypted or not. Don’t turn your phone or laptop over to law enforcement without a warrant, privacy experts advise, and turn off biometric authentication such as Face or Touch ID if you’re worried someone will force you to unlock them. Make sure your phone, tablet, and computers all require a passcode or password to use them. Avoid wearing wearable health tracking devices while managing your health.

– Browse the Internet safely

Your browsing activity can put you at risk in two ways: someone seeing it on your device and someone getting it from tech or ad tech companies, said Eric Rescorla, chief technology officer at Firefox.

Always use incognito or private browsing mode on your browser to avoid leaving a trace on your own devices. When choosing a browser, opt for Safari, Firefox, or Brave, all of which have robust privacy features. Make sure all options to prevent cross-site tracking are enabled, and instead of Google, use a search engine like DuckDuckGo or Brave.

To minimize what is logged on your browsing, use a VPN or Apple’s iCloud Private Relay, which acts as a more secure VPN. Avoid using third-party apps for searches. If you want an extra layer of protection, use Tor Browser, a tool for anonymous Internet use that conceals both your identity and your location, Rescorla said.

If you use Google, make sure you’re signed out of your account and have all of your privacy settings turned on. Confirm that all abortion clinic results are real and not fake “pregnancy crisis” centers. If it’s a Google ad, there should be a small line above the site name that says “Provides abortions” or “Does not provide abortions.” The National Abortion Federation has a list of approved providers on its site.

– Disable location sharing or leave your phone behind

Some apps collect your location throughout the day and night and share it with third parties, including data brokers, who sell that data to anyone who wants to pay. To turn off location sharing on an Apple device, go to Settings – Privacy – Location Services and toggle the slider to show gray. (Note that this will prevent location-dependent apps, such as Uber or Maps.) On an Android device, go to Settings – Location and toggle the switch to “off”.

Unfortunately, turning off location sharing won’t stop your mobile carrier from collecting your location. Jennifer Granick, surveillance and cybersecurity adviser at the American Civil Liberties Union, said a Faraday bag, which blocks electromagnetic fields, could help in cases where someone wants to keep their phone on them but prevent tracking of the location by service providers.

To really hide your location, the best thing to do is leave your phone at home or turn it off completely, McKinney said. You can also use a temporary “burner” phone. Don’t add any of your accounts, connect to your home WiFi or turn on Bluetooth, she added.

– Maximize your privacy settings

To ensure that your phone or social media sites collect as little data as possible, lock down your privacy settings. You can find a list of the biggest app and device options in our Privacy Reset Guide.

– Avoid period tracking apps

Trusting any app with sensitive medical information is a risk, especially if it’s not covered by HIPAA requirements. Each period tracking app has different privacy practices, and understanding the nuances can be tricky. A password-protected spreadsheet or paper calendar will be more useful.

If you decide to delete your policy-tracking app, consider submitting a data deletion request as well, said Alan Butler, executive director and president of the Electronic Privacy Information Center. Some companies only honor these requests from people in California due to state privacy law, but others accept requests from anywhere.

“The power of the state and federal government to obtain data right now is incredibly broad,” Butler said. “We haven’t seen new limits on access to government data in decades, which means the laws…have weakened as technology has evolved.”

– Limit where you share health information

Your dentist and even your workout instructor can give you forms asking if you are pregnant. If you’re not comfortable sharing, say so and reserve this conversation for a doctor you trust.

Recording software at your doctor’s office may have privacy flaws, The Washington Post reported. A consent form from recording software maker Phreesia, for example, gives them permission to use your data for marketing purposes. Select “no” on any data sharing prompts you see.

Push your healthcare and insurance providers about what they do with your information, such as date of last period or pregnancy status. Where is it recorded and stored, is it encrypted and how long does it keep? Review each document you sign to see if you are waiving your rights to your information or allowing it to be shared with other parties.

– Know physical surveillance technology

In some cases, law enforcement can extract data from license plate readers or facial recognition software systems that have been strategically placed along state borders, Granick said of the ACLU. If you need reproduction services, you may want to consider other modes of transportation than driving your own car, for example.

“People shouldn’t give up, even though it’s hard and may seem like a lot,” Granick said. “People should take advantage of what they can do while pushing the powers that be to do more.”

How to check PF (provident fund) balance, withdraw money. Lily


Simple ways to check your provident fund account balance and interest

Would you like to know how to check your provident fund (PF) balance and the interest transferred to your account? Continue reading.

Each employee should be updated on the Provident Fund (PF) balance, especially at the end of a financial year.

Each month, an employee contributes a fixed amount of 12% of their base salary to their PF account, and the employer also contributes an equal amount.

Although there are many ways to determine his PF account balance, let’s read about five simple methods to check it.

1. EPFO ​​website:
On the EPFO ​​website, click on ‘Member Passbook’ in the section for employees. You can view the PF passbook by logging in with your universal or UAN account number and password.

The distribution of contributions between the employee and the employer is visible as well as the opening and closing balance. PF interest earned and any PF transfer amount are also mentioned.

If more than one provident fund number is associated with your UAN, all of them will appear. You need to click on the specific member ID to know the balance of that PF account.

2. Unified Portal:
You can also log into the Unified Portal with your UAN and password and open the PF passbook to view the provident fund balance. You can also view PF contributions for different exercises.

3. By SMS:
You can use the SMS service to know the EPF balance on mobile. To use the service, you need to send an SMS EPFOHO UAN ENG to 7738299899. To know the PF balance without UAN, sending an SMS will be useful.

You should send the SMS to 7738299899 but make sure it is sent from your registered mobile number. After sending the SMS, you will receive the latest PF contribution and member balance details specific to your KYC details.

4. Via a missed call:
You can use your mobile phone to check the PF balance, for which you will not need the UAN. You will need to use EPFO’s Missed Call service for this.

You must give a missed call to 011-22901406 from your registered mobile number. After two rings, the call is disconnected and the user will receive the message indicating the PF balance.

It is important to note that this service is available for free and can also be used from non-smartphones.

However, as an employee, you need to ensure that your UAN is linked to your bank account, your Aadhaar number and your PAN and even your mobile number should be linked and registered in the unified portal.

5. PF Balance via UMANG APP:
One can download the UMANG app – Unified Mobile Application for New Age Governance – to get EPF details such as PF balance, claim status, and Know Your Customer (KYC) status, among other details.

How to remove your PF?
The Employee Provident Fund (EPF) is a lifetime investment that can be useful at all important stages of life. It is made up of 12% of a worker’s monthly base salary, which is deposited with the EPFO ​​(Employee Provident Fund Organization). The employer also contributes to this fund which, over time, constitutes an important corpus.

Steps and Rules for Withdrawing from a PF (Provident Fund)
Before withdrawing provident funds, it is crucial to complete the KYC procedures.

The Employee Provident Fund (EPF) is a lifetime investment that can be useful at all important stages of life. It is made up of 12% of a worker’s monthly base salary, which is deposited with the EPFO ​​(Employee Provident Fund Organization). The employer also contributes to this fund which, over time, constitutes an important corpus.

Employees can withdraw their FP online quite easily. This can be facilitated through the EPFO ​​member portal e-SEW. Employees can withdraw all of their CP savings after retirement.

However, if employees meet specific conditions, they can withdraw money even before retirement.

Read here the simple steps to withdraw money from your PF account.

Atmosphere of distrust and violence prevailing in the country: CM Gehlot


An atmosphere of violence and mistrust prevails in the country, Rajasthan Chief Minister Ashok Gehlot said, stressing that it could ruin the nation. “The policy of tension is not good for the country. A family that has tension does not advance and ruins itself. The same applies to the village, the country and the state,” he said. he declares.

Gehlot said: “There is an atmosphere of mistrust and violence. Some people may be happy that bulldozers are running. This bulldozer can also come to your house anytime,” Gehlot said at the unveiling of a statue of former MLA Sanwarmal Mor. and the inauguration of a girls’ college at Kothiyari in Sikar.

He said that without conviction by law, one cannot be called guilty. Targeting Union Minister Jal Shakti, Gajendra Singh Shekhawat on the Eastern Rajasthan Canal Project (ERCP), Gehlot referred to a statement by the leader regarding the political crisis in the state two years ago.

“The minister says if Sachin Pilot had not missed the opportunity and if the government had changed in Rajasthan, then water would have arrived (via ERCP) in the state. A Union minister can- he speak such a language? What could be more shameful than that,” he said.

Gehlot has consistently called for the ERCP to be given national project status. The project aims to supply water to 13 districts in eastern Rajasthan. Pilot and 18 deputies had revolted against the leadership of CM Gehlot in July 2020.

-With PTI input

The annulment of Roe v. Wade by Supreme Court sparks calls for increased privacy


Written by Tonya Riley

The Supreme Court overturned Roe v. Wade on Friday, ending nearly 50 years of the nation’s highest court affirming the constitutional right to abortion and prompting lawmakers and privacy advocates to say the ruling of federal privacy protection legislation privacy is even more urgent.

“Congress must pass legislation protecting people’s data so that their web searches, text messages and location tracking are not weapons against them,” Sen. Ron Wyden, D-Ore., said in a statement. communicated in response to the decision. “Tech companies must take immediate action to limit the collection and retention of customer data so that it does not become tools of persecution.”

Wyden is one of many lawmakers who have urged tech companies in recent months to limit the data they collect that could be subpoenaed or purchased by law enforcement. in cases related to abortion. Wyden – alongside Sens. Elizabeth Warren, D-Mass., Patty Murray, D-Wash., Sheldon Whitehouse, DR.I. and Bernie Sanders, I-Vt. — introduced legislation earlier this month that would block data brokers from selling American’s location and health data.

In May, Motherboard found at least one data broker selling abortion clinic visitation data. (The company said it would end this practice after the report was released.)

Law enforcement exploited user data against abortion seekers long before the reversal.

States like Indiana and Mississippi have used data such as search history and text messages to prosecute women accused of aborting their pregnancies. Other data from the device, such as location data showing that an individual has been to an abortion clinic, could be swept up in a law enforcement net. Geofencing warrants, which allow law enforcement to request data from all mobile devices active in a particular area, have exploded.

Friday’s decision increases those risks, technology policy and defense groups said.

“In the digital age, this decision opens the door to law enforcement and private bounty hunters seeking vast amounts of private data of ordinary Americans.”

Alexandra Reeve Givens, Center for Democracy and Technology

“Today’s decision deprives millions of people of a fundamental right and also underscores the importance of fair and meaningful data privacy protections,” the Electronic Frontier Foundation wrote in a statement. “Everyone deserves to have strict control over the collection and use of information that they necessarily leave behind as part of their normal activities, such as using applications, queries on search engines , posting on social media, texting friends, etc. But those seeking, offering or facilitating access to abortion must now assume that any data they provide online or offline could be sought by law enforcement.

Tech groups are also calling on tech companies to take action.

“In the digital age, this decision opens the door to law enforcement and private bounty hunters seeking vast amounts of the private data of ordinary Americans,” the president and CEO of the company wrote. Center for Digital Technology, Alexandra Reeve Givens, in a statement. “In this new environment, technology companies must step up and play a crucial role in protecting women’s digital privacy and access to information online.”

Facebook, Google and TikTok did not immediately respond to requests for comment. Twitter declined to comment.

Even President Joe Biden, who stressed to Americans in a speech Friday that “privacy is on the ballot,” has raised concerns about how app data could be used.

“Extremist governors and state lawmakers who seek to block mail, search someone’s medicine cabinet, or police a woman’s actions by tracking data on our app she uses are wrong, extreme and disconnected,” Biden said.

Privacy legislation has gained some momentum in recent weeks. On Thursday, a House subcommittee approved legislation that would introduce a comprehensive privacy framework. Senate Commerce Chair Maria Cantwell, D-California, said the Senate will not consider the bill until privacy-enhancing amendments are made.

In the meantime, privacy experts are urging individuals to take steps to protect their data. EFF advises individuals to review privacy settings, disable location services on apps that don’t need them, and switch to encrypted messaging apps like Signal. Experts are also advising people attending protests related to the decision to leave their phones at home or take a burner phone to minimize the risk of location data being used against them by law enforcement.

-In this story-

abortion, Bernie Sanders, Center for Democracy and Technology, Congress, data brokers, Electronic Frontier Foundation, Elizabeth Warren, Patty Murray, privacy, Ron Wyden, Sheldon Whitehouse, Supreme Court, US courts, US Supreme Court




The BNP Paribas Group (https://group.bnpparibas) partially complies with the General Repository for Improving Accessibility (“RGAA”), version 4.0, due to the non-compliances and deviations listed below.


This statement was made on 01/10/2020.


The compliance audit carried out internally indicates 53% compliance with the criteria of the RGAA version 4.0.

The average online service compliance rate is 78%.

Of the 106 criteria, 76 are applicable including:

  • 42 compliant criteria
  • 34 non-compliant criteria


  • 1.1 Does each image conveying information have a textual alternative?

Some images do not convey information and have an irrelevant alternative text. Not very visible on the site, but nevertheless present.

  • 1.2 Is each decorative image properly ignored by assistive technologies?

This problem is more common because decorative images are not ignored by assistive technologies.

  • 1.3 For each image conveying information with a textual alternative, is this alternative relevant (except in special cases)?

In one case on the site, the text alternative is not relevant.

  • 1.3 For each image used as a CAPTCHA or as a test image, having a textual alternative, does this alternative make it possible to identify the nature and function of the image?

In one case on the site, the text alternative is not relevant.

  • 3.1 Information should not be conveyed by color alone on a website. Is this rule respected?

Some information such as breadcrumbs and categories are only indicated by a color change on hover.

  • 3.2 Is the contrast between the color of the text and the color of the background sufficiently clear on each Web page (except in special cases)?

The contrast between the color of the text and the color of its background is not clear enough.

  • 3.3 On each web page, is there sufficient contrast between the colors used in the interface components or the graphic elements conveying information (except in special cases)?

The green color used in interface components is not accessible.

  • 5.7 For each data table, is the appropriate technique used to associate each cell with its headers (except in special cases)?

Data tables do not have cells associated with headers. The tag

must use the “id”, “scope”, “role=rowheader” or “column-header” attributes.
  • 6.1 Is each link explicit (except in special cases)?

On the homepage, the articles have three links in a set, which is problematic for text-to-speech.

  • 6.2 On each web page, does each link, except for anchors, have a title?

On several pages of the site, a title is missing between and .

  • 7.1 Is each script, whenever necessary, compatible with assistive technologies?

Some elements of the site are not vocalized, such as the timeline news page.

  • 7.3 Can each script be controlled by the keyboard and by any pointing device (except special cases)?

Keyboard navigation is not possible throughout the site. On the Spokesperson page, you can open someone’s record, but you cannot use the Esc key or the “X” to exit the window, which is inaccessible.

  • 7.4 For each script that initiates a context switch, is the user notified or in control?

When searching on the news page, the number of results found is not returned to the user. There is no control over the creation of email alerts on the job postings page.

  • 7.5 Are status messages correctly returned by assistive technologies on each web page?

Status messages are not returned correctly, for example missing articles when searching for articles.

  • 8.7 Is each language change indicated in the source code of each Web page (except in special cases)?

Language changes are not specified in the source code, resulting in poor vocalization.

  • 9.1 Is the information structured by the use of appropriate headings on each web page?

Headers were ignored on several pages of the site. The result of this error is the header skipping


as can be seen on the Jobs and Careers page.
  • 9.2 Is the structure of the document consistent on each web page (except in special cases)?

The structure of the source code is not respected on the site. the

is not present on all pages. It is hidden under a

  • 10.6 On each web page, is each link whose nature is not obvious visible in relation to the text that surrounds it?

In the quotes block of the news page, there is a link in the same color as the text.

  • 10.7 Is the focus indicator visible for every element receiving focus on every webpage?

Only the pictograms of the header change color, which does not validate this criterion. Other elements such as the “Reset” button on the “All News” page do not have a visible focus indicator.

  • 10.8 Is hidden content designed to be skipped by assistive technologies on every webpage?

On the newsletter subscription page, the radio button is in display none.

  • 10.14 Can additional content appearing only through CSS styles be made visible using the keyboard and any pointing device on every web page?

On the Media Space page, the More details and Media Library Download pictogram is visible only when navigating with the mouse. The block disappears during keyboard navigation.

  • 11.4 In each form, are all the field labels and their associated fields associated (except in special cases)?

On the Legal Notice page, when I try to share the article by email, we see that the field labels and their associated field are not attached.

  • 11.10 In each form, is the input requirement indicated in a relevant manner (except in special cases)?

In the fields of the newsletter registration forms sharing the Legal Notice page by email, the mandatory fields are not indicated, or they are not indicated above the fields in question.

  • 11.11 In each form, is the entry requirement accompanied, if necessary, by suggestions to facilitate the correction of entry errors?

An error is indicated in the field, but there are no suggestions to help correct errors.

  • 12.11 In each web page, is any additional content that appears when hovering, focusing or activating an interface component accessible, whenever necessary, with the keyboard?

In the Spokesperson page, the “Close” button is not accessible when opening a biography.

  • 13.3 On each web page, does each office document available for download have an accessible version whenever necessary (except in special cases)?

Not all PDF documents on the site are accessible. The 2019 integrated report is not accessible; the document is not tagged. Documents prior to September 23, 2018 are exempt, but this one is dated 06/02/2020.


1.5.1 Technologies used for the production of group.bnpparibas

1.5.2 Test environment

Content recovery checks were carried out according to the RGAA 4.0 standard, with the following versions:

  • Chromium 85 and NVDA 2020.1
  • Firefox and NVDA 2020.1
  • VoiceOver on iOS X

1.5.3 Accessibility assessment tools

  • color contrast analyzer
  • Chrome Developer Tool
  • Web Developer Toolbar (Chrome Extension)

1.5.4 Site pages affected by the compliance check


If you are unable to access content or a service, you can contact the BNP Paribas Group site manager to be directed to an accessible alternative or to obtain the content in another form.

To do this, send a message to:

How to transfer Authy to a new phone


Jack Wallen walks you through the steps of transferring Authy from one phone to another.

Image: Miha Creative/Adobe Stock

authy is a two-factor authentication app that lets you easily work with 2FA codes for the apps and services you use.

Two-factor authentication adds a layer of security to the sites and services you use. Once you add 2FA to a site, it will not only ask for your account credentials (username/password), but also a six-digit code generated by a 2FA application (such as Authy ) and associated with your account. Without this six-digit code, you cannot log into your account.

Once you start using Authy on your mobile device, at some point you will need to transfer the account to another device.

SEE: Mobile Device Security Policy (TechRepublic Premium)

What you will need

For this to work, you will need the Authy app installed on your current mobile device. When you initially installed the app, you associated it with the phone number of that original phone. You will also need the Authy app installed on your new phone. How you install this app will depend on the mobile operating system you are using (Android or iOS).

How to Transfer Authy

Unfortunately, due to security concerns, Authy does not allow users to take screenshots within the app, so you will need to follow written instructions closely. I will outline the process in such a way that you should have no problem following it.

Open Authy on your old phone and tap the 3-dot menu button at the top right of the screen. From the drop-down menu, tap Settings. In the Settings window, you will see three tabs at the top of the screen: My Account, Accounts, Devices. Tap on Devices and you should see an almost empty page with an ON/OFF slider which is in the OFF position by default. To share Authy on a new phone, you need to enable multi-device support, so tap the ON/OFF slider so it’s in the ON position.

After enabling multiple device support on Authy, open the app on the new phone, where you will be prompted to enter your country code and phone number. You can select your country code from the drop-down menu and then enter your phone number. This phone number must be the same number associated with your old phone as it is the number associated with your Authy account.

Once you’ve typed in your phone number, tap Submit at the bottom of the screen, then select the verification method you want – from Use an existing device with Authy installed, Receive an SMS message, or Receive a call.

If you have already inserted your SIM card into the new phone, tap Receive SMS message. If you haven’t installed the SIM card on the new device yet, tap Use an existing device with Authy installed, which will then send a new device request to the original phone. On the old phone, tap Accept, then when prompted, type OK and tap OK.

You should then see all of your 2FA entries in Authy on the new device.

That’s all there is to making Authy available on multiple devices. One thing to keep in mind is that this isn’t actually a transfer, so all of your accounts will be recalled in Authy on your old device. If you plan to sell, give away, or give away that old device, be sure to uninstall Authy and do a factory reset to ensure none of your data is accessed.

Subscribe to TechRepublic How to make technology work on YouTube for all the latest tech tips for professionals from Jack Wallen.

Twitter notes herald the end of tweetstorms and the original tweet concept


After choosing not to comment on a related leak, Twitter officially revealed that it was testing a way to post much longer tweets. The official Twitter Notes feature teaser showed off something that looked more like an interface for writing blog posts or articles rather than simple 240-character tweets. Coincidentally, the previous leaked version of this feature was called Twitter Article rather than Notes.

Twitter Notes fixes many long-standing issues with tweetstorms and third-party apps or bots. You no longer receive multiple notifications from someone you follow, and you don’t have to go out of the network to view a long post. It also makes it easier to reply and communicate as there would be only one tweet to reply to instead of several in a series.

At the same time, it raises the question of whether it removes the special appeal and unique value of Twitter. Not all users will post long tirades or ramblings, of course, but other social networks have always allowed users to write short posts as well as long ones without having to choose between the two. Either way, Twitter Notes will most likely make Twitter users happy and might give those on other networks more reason to abandon their old homes and jump into the less restricted, but also more chaotic, world of Twitter.