Home Blog Page 3

Vodafone Idea customers can now send outgoing SMS without a dedicated SMS plan

0

Vodafone Idea will finally allow users to send forwarding messages even without a plan that offers SMS benefits. This is a significant development as Vi customers were previously forced to get more expensive packages to receive SMS. This new move will give users more freedom to move outside the network, if necessary. Also Read – Vodafone-Idea updates its Rs 409 and Rs 475 recharge plans with more daily data

Vodafone Idea’s new decision comes months after TRAI asked the country’s telecom operators to allow users to send text messages without a dedicated texting plan. The TRAI announcement was made in December last year. Also Read – Google and Vodafone team up to extend Wear OS smartwatch battery life

What is a forwarding message?

After the introduction of Mobile Number Portability (MNP) support in India in 2011, users were able to exit their current network by transferring to another. In order to trigger a port request, the user can send a message to the number 1900. This message is called a port-out message. Read also – Vodafone Idea prepaid top-up plans: Free Disney+ Hotstar offered with these data packs

However, there was a big flaw for those who had a valid top-up plan that didn’t support texting. They couldn’t send a transfer message from their phone even if they had a balance. This problem has been solved. However, it should be noted that SMS will not be free. Charges will be deducted from the user’s talk time.

How to wear

Now, if a Vodafone Idea customer wants to port, they can follow these steps:

Send message PORT at 1900

Once you send it, you will receive a message with UPC (Unique Porting Code)

Take this UPC code to the carrier you wish to transfer to

There they will ask you for some basic documents in order to complete the porting process

At the end of the process, you will get a new SIM card from the other operator.

It will be activated after some time

The same process can be repeated when transferring from any other network operator to Vodafone.





US watchdogs scrutinize UBS over staff messaging

0

ZURICH (Reuters) – U.S. regulators are examining whether UBS Group properly documented communications between staff as part of a broader industry investigation, the Swiss bank said in notes to its second-quarter results on Tuesday.

Last year, Reuters reported that the U.S. Securities and Exchange Commission (SEC) was investigating whether Wall Street banks had adequately documented employee work-related communications, such as text messages and e-mails. -mails, during the pandemic work-from-home period.

In December, the SEC and the Commodity Futures Trading Commission (CFTC) fined JP Morgan Securities $200 million for “widespread” failures to safeguard staff communications on personal mobile devices, messaging apps like Whatsapp and emails.

“The SEC and the CFTC are investigating UBS and other financial institutions regarding compliance with document retention requirements relating to commercial communications sent via unapproved email channels. UBS is cooperating with the investigations,” UBS said in a statement. its quarterly report.

Bank of America said last week it had set aside about $200 million for a regulatory matter related to the unauthorized use of personal phones.

(Reporting by Michael Shields; Editing by Kirsten Donovan)

Copyright 2022 Thomson Reuters.

Hulu does not run political ads on major issues in the Democratic midterm campaigns

0

Comment

Disney-backed streaming service Hulu is refusing to air political ads on central themes of the Democratic midterm campaigns, including abortion and guns, angering candidates and party leaders.

The streaming service popular among young voters, which has a policy against airing content deemed controversial, is like other digital providers in that it is not bound by the Communications Act 1934, a law that requires television networks to provide politicians with equal access to the airwaves.

The Democratic Senate Campaign Committee, the Democratic Congressional Campaign Committee, and the Democratic Governors Association attempted to buy joint abortion and gun ads with Hulu on July 15, as well as identical placements on a Disney-affiliated ABC affiliate in Philadelphia and on the company’s ESPN cable sports channel. The Hulu commercials never aired, unlike the others.

“Hulu’s censorship of the truth is outrageous, offensive, and another step down a dangerous path for our country,” the three committees’ executive directors, Christie Roberts, Tim Persico and Noam Lee, said in a statement provided to the Washington Post. “Voters have a right to know the facts about MAGA’s Republican agenda on issues like abortion — and Hulu is doing the American people a huge disservice by preventing voters from learning the truth about the tally of the GOP or refusing to allow these issues to even be discussed. ”

The party committees join a growing list of Democratic candidates who have had spots mentioning gun violence, abortion or political violence rejected by Hulu.

Suraj Patel, a Democratic candidate for Congress from New York, posted a protest letter, first reported by Jezebel, to Disney CEO Bob Chapek and Hulu President Joe Earley complaining that a representative of Hulu had told his campaign that there was an “unwritten Hulu policy”. who deemed the subjects of one of his advertisements too “sensitive” for the platform. The ad in question mentioned Republican successes on abortion, climate change and gun violence, while showing footage of the violence from the January 6, 2021 attack on the US Capitol.

“Failing to address these topics in my campaign announcement is failing to address the most important issues facing the United States,” Patel wrote. “Your ban on mobilization messages has a perverse effect on democracy.”

Patel said in an interview on Sunday that the ad was cleared to run after editing it, replacing the word “climate change” with “democracy” and replacing images of violence in the US Capitol with images of the former President Donald Trump. He did not receive a response from Chapek or Earley, he said.

“This policy has incredible implications for people nationwide, both voters and candidates,” Patel said. “You need to communicate with young voters about the media they watch. The cable is not where they look.

Hulu contacted Patel’s campaign on Monday afternoon, after this story was initially published that morning, to say that his original ad would be accepted, including the January 6 violence footage.

“I want to thank Hulu for connecting Americans with the most pressing issues of our time,” Patel said in a statement after the approval. “Sometimes a simple conversation can change things.”

A person familiar with Hulu policies, who spoke on condition of anonymity to discuss internal matters, said the decision to approve Patel’s ad was made before Monday, although she did not was immediately communicated to his campaign. This person said the company does not publicly disclose its advertising guidelines, but does prohibit advertising that takes a position on a controversial issue, whether or not it is political advertising. Ads are reviewed on a case-by-case basis, with changes sometimes recommended to advertisers.

In recent months, the company has reassessed its policy implementation to give candidates greater flexibility in explaining their positions, the person said.

“We welcome job postings from candidates that reference these topics,” this person said of abortion and gun violence. “It has to be in context.”

Disney and Hulu declined through a spokesperson a request for comment.

Blocked ads do not use violent or discordant images. A spot lists statistics on the harms of gun violence and criticizes Republican efforts to block more gun regulations. The other warns that Republicans are trying to “snatch” access to abortion without exception for rape, incest or the lives of those who are pregnant.

Disney faced a distinct backlash from employees earlier this year after company leaders declined to make a public statement opposing a Republican bill in Florida that banned teachers from discussing sexual orientation or gender identity with young students. Chapek then backtracked, apologized to his workers, criticized the Republican measure and froze campaign contributions in Florida.

Florida Governor Ron DeSantis (right) responded by signing a bill to strip Disney World of its special tax status near Orlando.

“It’s really problematic that a company has been so synonymous with parents of young children to speak out against the Parents’ Rights Bill,” DeSantis said.

Tracking firm Kantar Media predicts $7.8 billion will be spent on political advertising for the 2022 election season, including about $1.2 billion for over-the-top and connected television spending, a category that includes ads served through streaming services and set-top boxes. like Roku. Streaming spending, according to Kantar, is “the new darling of politics.”

But streaming services have proven more difficult for political buyers to negotiate. Disney has told advertisers that political and alcohol ads will not be accepted on Disney Plus, a separate streaming service, when it launches an ad-supported version later this year. Netflix announced this month that it was developing an ad-supported version with Microsoft, although the company did not elaborate on its advertising policies.

Democratic concerns about Hulu’s advertising policies have been exacerbated by the company’s vague and sometimes contradictory communications with ad buyers. Three days after placing the ad buy, the three Democratic committees were notified by Hulu through a provider that the delay was “content-related,” according to a person familiar with the events, who also spoke on condition of anonymity to discuss the internal process. .

The following day, Democrats scheduled a call with Hulu to discuss the matter, but Hulu officials canceled the call just as it was about to begin, suggesting over email that they reschedule “more late in the day,” the person said. Hulu officials did not communicate further that day.

A lawyer for the Democratic committees sent two emails and called twice the next day, in an attempt to restart the discussions, without receiving a response, the person said. The next day, Thursday, Lance Delaney, account manager in Disney advertising sales, emailed to say, “We have received creative approval,” only to follow up a few hours later with a message stating “This message was sent in error.”

Patel’s campaign received a similar message from a Hulu representative on Thursday, asking him to resubmit the original ad. He said the Hulu executive suggested “they were having some kind of meeting and the standards were changing.” The next day, Patel said, the campaign was notified that the original ad would still not run. On Monday he found out it would work.

This isn’t the first time Democrats have been angered by digital vendors refusing their ads. During the 2020 campaign cycle, Priorities USA Action and Color of Change PAC, two independent liberal groups, had ads rejected by Hulu, Google and Verizon that showed clips of police beating protesters during protests this summer against the police brutality.

“Anti-violence content policies were clearly put in place for good reasons, but we are not living in reasonable times,” Jenn Stowe, deputy executive director of Priorities USA, said in a statement at the time.

Roaming Mantis Financial Hackers targeting Android and iPhone users in France

0

Mobile threat campaign tracked as wandering mantis has been linked to a new wave of compromises directed at French mobile phone users, months after expanding its targeting to include European countries.

As many as 70,000 Android devices are believed to have been infected as part of the active malware operation, Sekoia said in a report released last week.

Attack chains involving Roaming Mantis, a financially motivated Chinese threat actor, have been known to deploy a piece of banking Trojan named MoqHao (aka XLoader) or redirect iPhone users to malware collection landing pages. credentials that mimic the iCloud login page.

cyber security

“MoqHao (aka Wroba, XLoader for Android) is an Android Remote Access Trojan (RAT) with information-stealing and backdoor capabilities that likely spreads via SMS,” Sekoia researchers said. . said.

Roaming Mantis Malware

It all starts with a phishing SMS, a technique known as smishing, tricking users with parcel delivery-themed messages that contain malicious links, which, when clicked, proceed to download the malicious APK file, but only after determining if the victim’s location is within French borders.

Roaming Mantis Malware

If a recipient is located outside France and the device’s operating system is neither Android nor iOS – a factor verified by checking the IP address and the User agent string – the server is designed to respond with a “404 Not found“status code.

cyber security

“The smishing campaign is therefore geo-fenced and aims to install Android malware, or collect Apple iCloud IDs,” the researchers point out.

MoqHao generally uses areas generated through the Duck DNS dynamic DNS service for its first stage delivery infrastructure. Additionally, the malicious app impersonates the Chrome web browser app to trick users into granting it invasive permissions.

The spyware trojan, using these permissions, provides a pathway for remote interaction with infected devices, allowing the adversary to stealthily harvest sensitive data such as iCloud data, contact lists, history calls, SMS messages, among others.

Sekoia also assessed that the data amassed could be used to facilitate extortion schemes or even sold to other threat actors for profit. “more than 90,000 unique IP addresses that requested the C2 server distributing MoqHao,” the researchers noted.

Lifesaving devices appear on the shore of Oak Island, as the community rallies for safety on the beach

0
Community members are taking concrete steps to improve beach safety, including people setting up lifeguard stations in front of their homes and organizations seeking to raise money to equip city-approved stations at all 65 beach access points. ‘Oak Island. The move comes as the island experiences four drownings in the first month and half of the season. (Courtesy picture)

OAK ISLAND – Weeks after the fourth tourist of the season drowned on Oak Island, community members are taking concrete steps to increase safety on the beaches.

Island spokesman Mike Emory told the Port City Daily that if funds were provided by local organizations to install lifesaving devices, the city council would likely review its implementation. The opportunity did not take long to present itself.

READ MORE: ‘Four deaths this year is so devastating’: The cost of no lifeguards on Oak Island

Beachgoers may soon see a water rescue station at all 65 public beach accesses, thanks to an initiative brought to the city by the Jack Helbig Memorial Foundation (JHMF).

Last week, Foundation President Melanie Roberts and Executive Director and Founder Kelly Helbig met with City Manager David Kelly, Oak Island Water Rescue (OIWR) Chief Peter Grendze and Police Chief Charles Morris to discuss the station funding. According to Helbig, the proposal was “welcomed” and Roberts said they expect a response from the city early next week.

JHMF has already installed and funded 14 rescue stands on Caswell Beach and five rescue rings on the Southport waterfront in conjunction with Eagle Scout candidate Jackson Enis. Adding them to Oak Island comes as controversy over whether the city should have lifeguards continues.

Lifeguards were once stationed on a section of the island called Long Beach in the early 1990s, before it merged with Yaupon Beach to form Oak Island. Officials say it would be too expensive to cover its 10 miles of beach with current tax limitations.

At the Oak Island council meeting on July 12, Pro Tempore Mayor John Bach suggested the city add warning signs to its “comprehensive messaging plan.” Organizations like JHMF, Southport Rotary Club and OIWR have already installed signs at each beach access to educate the swimming public, each equipped with QR codes that link to a virtual rip current hazard flag. Council did not discuss funding or take a formal vote on adding warning signs.

JHMF donated $1,800 to the signage initiative. Adding salvage canisters to Oak Island’s 65 beach accesses will be a bigger undertaking. Each station will be equipped with red rescue tubes, similar to those already installed at Caswell Beach, and will cost around $250 each.

Total funding could exceed $16,000 and JHMF’s proposal includes a start-up grant of $10,000 for installation costs and an annual maintenance budget of $2,000. Helbig says the community seems keen to fill in the gaps for anything that JHMF or the city wouldn’t cover.

“I’ve seen so much support from the community through social media,” she said. “I’ve already had a few people want to donate and sponsor, which is amazing.”

As details continue to be ironed out, Helbig said a “take a stand” initiative has been discussed as a way for community members to get involved. The idea is that with a donation of $250 or more, a donor will have a plaque affixed to their sponsored post with an inscription or dedication.

JHMF’s proposal wasn’t the only one shared with the city this week.

Bruce Ivers considers Oak Island his home beach even though he lives in St. James Plantation, a community less than 8 km from the island. He, too, reviewed the installation of a water rescue station between 71st and 72nd streets near the St. James community’s private oceanfront beach house in May, before the last three drownings this year. have not taken place.

Ivers said he mentioned the idea to Oak Island Mayor Liz White on May 25, who in turn seemed receptive, aside from a few questions about logistics. After the July 3 drowning, Ivers penned an 11-page proposal in hopes of addressing the mayor’s concerns and further considering the plan.

Last week he met with St. James Mayor Jean Toner, who backed him up, Ivers said. He also sent an official copy of the proposal to White. The city and Mayor White did not respond to a Friday request from the Port City Daily for confirmation of receipt of Ivers’s proposal.

Ivers consulted with members of the United States Coast Guard (USCG) and Oak Island Water Rescue (OIWR) Chief Peter Grendze to design the station, which included two lifebuoys, a rescue tube from 4 feet, a water rescue bag and corresponding signage.

He planned “to build, install, finance and maintain the station”, in the hope that it would increase his chances of being approved. Dropping all costs from local municipalities, Ivers estimated an initial investment of $800, with the intention of “personally accepting all long-term costs.”

His proposal included renderings, a list of 15 people and organizations consulted in its development, and information on various phenomena that may justify the use of a lifesaving device on the beach.

It also included a summary of North Carolina’s General Statutes that limit the liability of “good Samaritans.” Good Samaritan laws are intended to protect those who offer assistance in an emergency, even if the victim is injured or dies despite rescue efforts. Yet liability is a major concern shared by many critics of the installation of lifeguards and lifesaving stations.

Ivers hoped his careful planning would allow for quick approval and is “disappointed that he hasn’t been received more enthusiastically by the city” at this point.

However, local resident Richard Gephart did not approach the town to take matters into his own hands. Beachgoers may have already noticed a new lifesaver station with life ring installed near the NE 39th St. public access.

Gephart of Raleigh owns a beachfront home near the access that he rents out most of the year. Earlier in the season after a drowning, Gephart saw a social media post about beaches installing lifesaving devices in light of a shortage of national lifeguards.

Resident Richard Gephart set up a lifeline post near his home on Oak Island in response to multiple drownings that occurred on the beach in 2022. (Photo courtesy)

He said he was further coerced after a close friend drowned at Salter Path beach – which also has no lifeguards – as he tried to save his son. Gephart said the terror of the situation has hit closer to home, compounded by the Oak Island drowning incidents and with his own family vacation approaching the week of July 4.

“If I was sitting on the beach and my 10-year-old was in distress, how would I handle that, and how would my wife and I handle that?” Gephart says he wondered. “And I was like, one of us goes in the water regardless, and if there’s a flotation device that’s very visible nearby, the other one is going to get the flotation device.”

So he spent $130 on materials to build a rescue station with a lifeline. Accessibility and visibility were priorities in the installation. The lifeline stand is at the end of a private access in front of his house, approximately 170 feet from the nearby public access. While his property line is technically on a dune, Gephart installed it beyond the dune directly on the public beach without prior permission.

He said photos once appeared on his social media feed, posted by the OIWR, showing Gephart station and another unauthorized rescue station in Sherill Street.

“Although this is a good faith effort, it is important that the devices are of the correct type and size for sea rescue,” the OIWR said. “Likewise, it’s best if they’re part of a city-organized and sanctioned program. The good news is that the city has indicated that it is willing to consider a proposal if funded from outside sources. »

City spokesman Emory said the city has not officially reached out to unauthorized rescue stations at this time.

Gephart said he wondered if he would be pushed back.

“I was hoping that I wasn’t doing anything that would be perceived as wrong,” he said. “I was just doing what I could to help.”

As you pass most houses while walking on the beach, visible rip current signs are not displayed for bathers. Signs with QR codes leading to virtual warning flags are displayed only at beach accesses.

In early July, beach patrols began scouring the shoreline, displaying warning flags attached to UTVs. Visitors can also download OKInformation, a text messaging service that will notify mobile subscribers of surfing conditions.

While Gephart said personal responsibility is in addition to drowning prevention, he’s also unsure if that’s enough.

“There’s a difference between ‘realistic’ and what’s ideal,” Gephart said. “Most people who come here from out of town just don’t understand the ocean.”


Advice or concerns? Email [email protected]

Want to know more about PCD? Subscribe now then subscribe to our newsletter, Wilmington Wireand get titles delivered to your inbox every morning.

Domestic violence, coasters and the small town that launched life-saving legal reform

0

Jane Hughes would like to hear more conversations about toxic relationships around the table in bars and restaurants.

In her 25-year career working with high-risk youth, foster care, homeless services and supporting women in crisis, domestic violence has always been at the heart of her work. .

“It’s so pervasive and so damaging, and there isn’t necessarily funding to support people dealing with violence – unless they have an associated issue like homelessness or mental health. “

Jane Hughes of the Bega Women’s Resource Center hopes the coasters will spark conversations.(ABC South East NSW: Vanessa Milton)

Frontline workers and activists in the Bega Valley on the NSW south coast hope new coasters distributed at hospitality venues across the region will spark discussion about signs of relationships coercive and see more people speak out against unacceptable behavior.

Using coasters to raise awareness about domestic violence is not a new idea.

The message ‘Domestic abuse is not Australian’ appeared on coasters in Sydney’s eastern suburbs around Australia Day in 2017.

And venues in Ballina County on the NSW North Coast have been handing out coasters designed by Year 10 students as part of the Love Bites Respectful Relationships education programme.

Message
Coasters designed by Year 10 students have been distributed to pubs and clubs on the NSW North Coast.(ABC North Shore: Samantha Turnbull)

But the continuing lack of awareness worries veteran domestic violence activist Ludo McFerran.

“It’s been almost 50 years since we opened the first women’s shelter in Australia [the Elsie women’s refuge in Sydney] and started the community conversation about domestic violence,” says Ms. McFerran.

Bringing about life-saving national reform

In 2020, Ludo McFerran received an Order of Australia medal for his significant service to women and children and social justice.

She developed the Staying Home, Leaving Violence program to help women and children stay safe in their homes, first piloted in the Bega Valley.

From that experience, she developed paid domestic violence leave to help women experiencing domestic violence stay safe in their jobs.

After a sustained campaign by activists and the labor movement to make paid domestic violence leave a universal right for all workers, Federal Employment and Labor Relations Minister Tony Burke announced in June this year that legislating 10 days paid leave for family and domestic violence as a universal right would be his first parliamentary act.

Violence rates still high

Ludo McFerran thinks domestic violence is a symptom of a much bigger problem.

“We can reduce the impacts of violence by reducing homelessness and unemployment, helping people who experience violence stay home and work.”

She commended those who continue the campaign against domestic violence and welcomed all awareness-raising efforts.

But Ms McFerran also thought it was time to have a national debate about what has been achieved over the past 50 years and why rates of violence remain so high.

Ludo McFerran wears a blue shirt and smiles at the camera
Ludo McFerran, received an OAM for his significant contribution to women and children, and to social justice.(ABC Southeast: Claire Wheaton)

Jane Hughes is encouraged by the momentum for change signaled by the new Labor Federal Government and said she hoped to see more direct investment in targeted early intervention and recovery programmes.

In her current role as coordinator of the Bega Women’s Resource Centre, three quarters of the women she met were fleeing or recovering from domestic violence.

“It could even take five years, they still experience the difficulties associated with leaving an abusive relationship – poverty and homelessness, physical and mental health, drug and alcohol problems, behavioral problems with children,” said said Mrs. Hughes.

“It can take a long time to get through, especially if they don’t have support.”

Google Play Store Removed 50 Apps Infected With Joker Malware

0

50 Apps Removed By Google Play Store

According Zscaler Threatlabz, 50 apps on the Google Play Store was infected with Joker Malware. However, Google Play Store has banned and deleted several apps who have been infected with the Joker Malware.

Buy Prime Test Series for all Banking, SSC, Insurance and other exams

What is Joker Malware?

Joker Malware is one of the most notorious malware that exploits Android devices. He manages to take advantage of The official Google app store with the help of his track signatures which includes virus code update, execution process and payload recovery techniques. This malware is able to steal personal information of users including contact details, device data, WAP services and SMS messages.

List of deleted apps

The apps included in this list are removed by Google Play Store and it recommends the user to uninstall the app if downloaded.

  1. Universal PDF scanner
  2. Private message
  3. Premium SMS
  4. Smart Posts
  5. Text Emoji SMS
  6. blood pressure checker
  7. funny keyboard
  8. Memory silent camera
  9. Custom theme keyboard
  10. Light messages
  11. Photo Keyboard Themes
  12. Send a text message
  13. Messenger Chat Themes
  14. Instant messaging
  15. Nice keyboard
  16. Emoji Font Keyboard
  17. Mini PDF scanner
  18. smart texting
  19. Creative Emoji Keyboard
  20. fancy sms
  21. Emoji Keyboard Fonts
  22. Personal message
  23. funny emoji message
  24. Magic photo editor
  25. Professional messages
  26. All photo translators
  27. text chat
  28. Smile Emoji
  29. Wow Translator
  30. Translator all languages
  31. cool posts
  32. blood pressure diary
  33. SMS Text Chat
  34. Hi Text SMS
  35. Emoji theme keyboard
  36. iMessenger
  37. SMS text
  38. camera translator
  39. Come Messages
  40. Painting photo editor
  41. Rich thematic message
  42. Quick chat message
  43. Advanced SMS
  44. professional courier
  45. Classic game messenger
  46. style post
  47. Private game messages
  48. Timestamp camera
  49. social post
  50. Simple note scanner

More Sci-Tech newse

Get Rid Of These Apps With Over 300,000 Installs Google Just Launched The Play Store To Be Dangerous

0
Although the Google Play Store is supposed to be a safe source for app downloads, bad actors are getting smarter every day and finding new ways to evade the measures designed to keep them out.
The research team at cloud security firm Zscaler ThreatLabz discovered numerous apps on the Play Store that were associated with Joker, Face thief, and Coper malware families. The Google Android Security team removed them, so if you have downloaded any on your Android phone, you should delete them immediately.

Android Joker Apps Removed From Google Play Store

Joker was first discovered in 2019 and we’ve seen many variants of this spyware that stealthily subscribes people to premium services and steals text messages, contact lists, and device information, among other things. It continues to find its way to the Play Store by regularly changing its trace signatures. In the past two months, the following Joker apps were found on the official Google app store.

  1. Simple note scanner
  2. Universal PDF scanner
  3. Private messenger
  4. Premium SMS
  5. Smart Posts
  6. Text Emoji SMS
  7. blood pressure checker
  8. funny keyboard
  9. Memory silent camera
  10. Custom theme keyboard
  11. Light messages
  12. Photo Keyboard Themes
  13. Send a text message
  14. Messenger Chat Themes
  15. Instant messaging
  16. Nice keyboard
  17. Emoji Keyboard Fonts
  18. Mini PDF scanner
  19. smart texting
  20. Creative Emoji Keyboard
  21. fancy sms
  22. Emoji Keyboard Fonts
  23. Personal message
  24. funny emoji message
  25. Magic photo editor
  26. Professional posts
  27. All photo translators
  28. text chat
  29. Smile Emoji
  30. Wow Translator
  31. Translate all languages
  32. cool posts
  33. blood pressure diary
  34. SMS Text Chat
  35. Hi Text SMS
  36. Emoji theme keyboard
  37. iMessenger
  38. SMS text
  39. camera translator
  40. Come Messages
  41. Painting photo editor
  42. Rich thematic message
  43. Quick chat message
  44. Advanced SMS
  45. professional courier
  46. Classic game messenger
  47. style post
  48. Private game messages
  49. Timestamp camera
  50. social post
A total of over 50 Joker download apps have been found on the Play Store by ThreatLabz so far with a combined download count of over 300,000. They generally fall into the Communication, Health, Personalization, Photography, and Tools categories.

The mode of attack is that many applications are released together and hide malicious payload within them. Joker malware often hides in messaging apps that require you to grant enhanced access permissions. It then uses these permissions to achieve its goals. For example, in the Enjoy SMS app, the payload is hidden in an obfuscated path.

Facestealer Malware

The Facestealer malware is used to steal Facebook IDs with fake login screens. One of the applications encountered by ThreatLabz was cam.vanilla.snapp and it has been downloaded over 5,000 times.

Coper Trojan

This banking trojan uses a multi-step chain of infection to compromise Android smartphones and perform harmful activities. It targets banking applications in Europe, Australia and South America. They are disguised as legitimate applications and once a user downloads them from the Google Play Store, they release the malicious infection that is capable of intercepting and sending SMS messages, logging keystrokes, locking and unlock screens, prevent uninstalls and allow bad actors to take control of infected phones. This ultimately leads perpetrators to access the information they need to steal their money from victims.

For example, an app called Unicc QR Scanner prompts users to update the app as soon as it is installed. After that, a backdoor or malware gets installed in the device to help the attacker take full control of the phone.

Such applications continue to appear on the Play Store and even Apple’s App Store, so it’s best to be vigilant and only install apps from trusted developers that have been downloaded multiple times. To be on the safe side, you should also check the reviews posted on the apps.
It is recommended not to install messaging applications. You should also avoid granting a notification listener and increased accessibility permissions to apps that seem dodgy.

Ukrainian radio stations hacked to spread false information about Zelenskyy’s health

0

Ukrainian radio operator TAVR Media was the latest victim of a cyberattack on Thursday, leading to the broadcast of a fake message that President Volodymyr Zelenskyy was seriously ill.

“Cybercriminals spread information that the President of Ukraine, Volodymyr Zelenskyy, is in intensive care and that his duties will be carried out by the Chairman of the Verkhovna Rada, Ruslan Stefanchuk,” the State Communications Service said. Special and Information Protection of Ukraine (SSSCIP). said in an update.

The radio holding company oversees nine major radio stations, including Hit FM, Radio ROKS, KISS FM, Radio RELAX, Melody FM, Nashe Radio, Radio JAZZ, Classic Radio and Radio Bayraktar.

cyber security

In a separate Facebook post, TAVR Media revealed that its servers and networks were targeted by a cyberattack and it is working to resolve the issue. The company also pointed out that “no information about Ukrainian President Volodymyr Zelenskyy’s health problems is true.”

The false reports, which were released between noon and 2 p.m., also prompted Zelenskyy to take to Instagram, saying, “I have never felt healthier than I do now.”

cyber security

The origin of the intrusion still remains unknown, although several threat actors have taken advantage of the ongoing conflict between Russia and Ukraine to carry out a deluge of cyberattacks, with hacking groups taking sides.

In a related development, the Computer Emergency Response Team of Ukraine (CERT-UA) has also warned against the use of macro-laden PowerPoint documents to deploy the Agent Tesla malware targeting state organizations in the country.

Opening day includes the Connacht Hotel Handicap for a week of flat and jump meeting

0

Galway hosts a fascinating reunion next week as Goodwood Festival also graces the racing calendar.

The festival itself is a gigantic seven-day event, from Monday July 25 to Sunday July 31, which includes both obstacle courses and flat action in Ireland.

Getty

Silvestre De Sousa wins with Scaramanga the Bahrain Turf Series Handicap in Newbury

888Sport: 100% bonus up to £100*

Although there are seven days of action, there are huge races every day and there are also big fields, which is great news for one-sided bettors.

Each midweek card kicks off in the evening at 5.10pm and there are great races to watch each day.

On Monday, the festival kicks off with a four-year-old novice hurdle and Galileo’s much-loved HMS Seahorse.

5.10 Tip for Novice Hedge Betting

HMS Seahorse

It’s still early in the bets, but it’s worth watching this field and highlighting this 132-ranked Paul Nolan-trained horse.

He took a step forward on his sixth flat appearance last time out winning by more than six lengths.

And the last hurdle attempt was at Punchestown in April in the Grade 1 Ballymore hurdle, but came a respectable third not too far behind top Vauban and Fil Dor.

He also had a good place behind Brazil at the Cheltenham Festival behind Brazil in the Boodles and should therefore be the one to beat in a largely under-run field.

6:40 p.m.: Connacht Hotel Handicap

Scaramanga12/1

There are 50 runners still in contention at the time of writing, but the ante-post odds still give a good indication of the field for this star race on opening day.

The favorite, Echoes In Rain, is a formidable hurdler and recently placed just behind Honeysuckle at Punchestown in April, but came second by more than three lengths as the overall favorite last time out.

There’s a lot to love about most of the other favorites in betting, but the main shoutout will come from Scaramanga.

One of many starters for Willie Mullins but he wasn’t too far from Coltrane last time out and may have needed the flat run and this is his first outing for this great coach after leaving Paul Nicholas.

Scaramanga should also prefer travel recoil at 2m1f.

He won at Newbury in July last year over a similar distance in Class 2 Bahrain Turf Series Handicap.

Now he could step up to Ireland for his new coach and over a distance he has proven himself well.

His hurdle form is also excellent, although he came fourth out of four at Sandown in April he was beaten by just six lengths against McFabulous, Indefatigable and Fusil Raffles.


New Customer Sign-up Offers

Bet365: bet €10, get €50 – CLAIM HERE

Minimum deposit requirement. Free bets are paid out as betting credits and can be used when settling qualifying bets. Minimum odds, betting and payment method exclusions apply. Returns exclude wagering bet credits. Deadlines and terms and conditions apply 18+ Begambleaware.org

888Sport: 100% match bonus up to £100 – CLAIM HERE

Deposit £/$/€10 min using promo code ‘TOP100’ • Bonus will be applied once full deposit amount has been wagered at least twice with cumulative odds of 1.50 or more • To withdraw your bonus winnings, you must wager the bonus amount up to 5 times • All deposit and bonus wagering requirements must be met within 60 days • This offer cannot be combined with any other offer • Limit of £/$/€50 stake per bet Applies • Restrictions apply on withdrawals, payment methods and countries and full terms and conditions apply. 18+ Begambleaware.org

Betfred: Bet £10, get £60 bonus – CLAIM HERE

New UK customers only. Sign up using promo code BETFRED60, deposit and place first £10+ sports bet (cumulative Evens+) within 7 days of sign up. The first bet must be on sports. £20 free bet to use on sports, £10 free bet to use on lotto and 50 free spins (20 pence per spin) credited within 48 hours of bet settlement. Additional £20 free bets credited 5 days after settlement. Bonuses have a 7 day expiration. Payment restrictions apply. SMS verification and/or proof of identity and address may be required. Full terms and conditions apply. 18+ begambleaware.org

BetVictor: bet €10, get €40 bonus – CLAIM HERE

18+ New customers only. Register and place a £10 bet on horse racing at odds of 2.00+ within 7 days of opening a new account; excludes cashed bets. Receive 3 x £10 free horse racing bets, only valid on defined events with odds of 2.00+. Plus a £10 slot bonus, selected games, wager 20x to cash out a maximum of £250. Bonuses expire in 7 days. Card payments only. Terms and conditions apply. begambleaware.org.

Commercial Content Notice: Taking any of the bookmaker offers featured in this article may result in payout to talkSPORT. 18+. The T&Cs apply. begambleaware.org

Remember to gamble responsibly

A responsible player is a person who:

  • Set time and money limits before playing
  • Only plays with money he can afford to lose
  • Never chase their losses
  • Don’t play if upset, angry or depressed
  • GamCare– www.gamcare.org.uk
  • Aware of the bet – www.begambleaware.org

For help with gambling problems call the National Gambling Helpline on 0808 8020 133 or visit www.gamstop.co.uk be excluded from all UK regulated gambling websites.

SBI WhatsApp banking: how to use, what services are available

0
The (SBI) has started offering WhatsApp-based banking services to its customers. Now, SBI customers can check their account balance and view mini statements using WhatsApp.

According to an official

tweet, “Your bank is now on WhatsApp. Get to know your account balance and view mini statement on the go.”

Here is an overview of using SBI’s WhatsApp service.

Step 1- Registration

You must first register to use this service through SBI WhatsApp Banking. To do this, type WAREG, then your account number separated by a space, and send an SMS to 7208933148. You must keep one thing in mind: send this message from the same number that is registered in your SBI account.

Step 2: Send WhatsApp message number 90226 90226

After successful registration in SBI WhatsApp Banking, your WhatsApp number will receive a message from SBI number 90226 90226. You can save this number.

Step 3- Start WhatsApp banking

Send ‘Hi SBI’ to this number 90226 90226 or reply to the message you received on WhatAapp. Once you send a message, you will receive the message below.

Dear Customer,

Welcome to SBI Whatsapp Banking Services!

Please choose one of the options below.

1. Account balance

2. Mini statement

3. Unsubscribe from WhatsApp Banking

You must send ‘1’ to get your bank balance details and ‘2’ to get your Mini statement details. To unsubscribe from SBI WhatsApp Banking, you must type 3.

Other banks that offer WhatsApp banking service include

, and .

SBI WhatsApp card

The State Bank of India also provides its credit card holders with WhatsApp-based services through the platform. Customers with SBI credit cards can use it to check their account overview, reward points, outstanding balance, etc. Cardholders must send the WhatsApp message “OPTIN” to 9004022022 in order to enroll in the system. To register for the service, they can also make a missed call from the registered mobile phone at 08080945040 or use the mobile application.

What is passwordless authentication and how to implement it

0

Passwordless authentication is a user management method in which the user logs into a system or application without using a password or secret. Instead of using a knowledge based factor (e.g. password), it validates a user’s identity either ownership factors (e.g. email account), or inherence factors (e.g. facial recognition).

This article was created in partnership with Frontegg. Thank you for supporting the partners who make SitePoint possible.

There are many authentication methods used as alternatives to passwords:

  • Single Use Code (OTC)
  • magic links
  • Biometric login (fingerprints, FaceID, voice recognition)
  • Smart cards or physical tokens
  • Digital certificates

Popularity of Passwordless Authentication

You may already be using “passwordless authentication” without knowing it. Many banking apps use fingerprint and voice recognition to verify users. Slack uses magic links to authenticate users.

The use of passwordless authentication has grown steadily over the past few years. Auth0, an authentication provider, predicts that passwordless authentication exceed the use of passwords by 2027. Gartner predicted that by 2022, “60% of large global enterprises and 90% of midsize enterprises will implement passwordless methods in more than 50% of use cases, up from 5% in 2018.”

Major web players are also doing their best to accelerate technology adoption. On World Password Day 2022, Google, Microsoft, and Apple announced plans to expand support for a common passwordless login standard established.
In June 2022, Apple announced its new ‘Passkeys’ function to use to log in to websites and applications. This announcement basically means that Apple will use Touch ID or Face ID to create a digital key for this website. This removes the need to create and write down a password.

Benefits of Passwordless Authentication

Passwordless authentication offers advantages in terms of security and user experience:

  1. Reduces the risk of phishing and password theft: Users are not susceptible to phishing attacks when directed to fake websites and enter their login credentials. If a user does not enter a password, they will not be vulnerable to brute force attackspassword data breaches and other types of credential theft.
  2. Reduces credential reuse: Reusing passwords across multiple services and accounts creates increased risk to users and your systems that cannot be avoided. It was reported that 64% of people have used the same password exposed in a breach for other accounts.
  3. More memory exercises: Your users don’t need to remember usernames and passwords for so many accounts. Sometimes they have to reset their passwords again and again after many failed login attempts.
  4. Faster connection: We are all busy. A strong password is suggested to be at least 16 characters long and takes a long time to type compared to scanning a fingerprint or opening a magic link.

Limitations of Passwordless Authentication

Passwordless authentication is not perfect and has some limitations from a security and experience perspective.

  • Unknown user experience: Many people have a habit of automatically typing or auto-filling passwords. A change to a magic link or OTC can come as a shock to users.
  • Stolen Devices or SIM Swapping Risks: Sending unique codes via SMS can leave your users vulnerable if their phone is stolen or if they are the victim of a SIM swap scam.
  • Biometric security is not perfect: Fingerprint readers, TouchID and FaceID have been successfully hacked over the years.

Relying on a single factor for authentication, password or not, always presents some level of risk. We recommend that you always use multi-factor authentication (MFA) whenever possible.

Is passwordless authentication secure?

Yes, passwordless authentication is considered safe, but it’s not completely risk-free. An account without a password will not have to fear that this password will fall into the hands of a malicious person. This can happen through data breaches, brute force hacks, lost devices, or misplaced post-its.

Many of the risks associated with passwordless authentication apply equally to other methods.

If a hacker has access to your email account and you are using Magic Links for passwordless authentication, they will be able to log in easily. This risk, however, is the same if you use a normal password. The bad actor would just need to click “reset password” and send the reset link to that same email address.

Finally, like any other system, a passwordless authentication system is also vulnerable to direct attacks aimed at circumventing or circumventing security measures. No matter how secure you act, the systems that store and verify your credentials are never completely secure.

Fingerprint verification and other biometric factors are much more difficult but not impossible to cheat and offer a very secure way to authorize yourself.

Passwordless Authentication vs Multi-Factor Authentication (MFA)

Multi-factor authentication is a method of using multiple authentication factors when logging in. This very often happens when you log into an account with a username and password and then receive a 6-digit one-time-use code (OTC) to confirm your ownership of the device.

In this example, the OTC factor is passwordless. Instead, if you were to use a fingerprint and one-time passcode, you have an entirely passwordless MFA setup.

How to Implement Passwordless Authentication on Your Website

Integrating passwordless authentication into your app or website is easier than ever. Depending on your existing infrastructure, you have many options:

  • User management solutions: These providers offer a fully managed service that not only provides traditional and passwordless authentications, but also user management and permission management.
    • When to use: New system releases, startups, and teams looking to avoid all low-value, high-risk development work.
    • When not to use: If you have a very custom set of authentication or user management requirements that may not match their systems.
    • Suppliers: Frontegg, Okta/Auth0, MergeAuth, Trusona, AppWrite
  • Authentication service provider: These services provide user authentication, access management and other services such as session management.
    • When to use: You have existing user management services and want someone to handle passwords and authentication.
    • When not to use: You have limited development experience or resources. If you have a simple identity and access management model, you might want to consider a fully managed solution, as mentioned above.
    • Suppliers: AWSCognito, Google Identity Platform, Microsoft AzureAD

Passwordless Authentication with React – Speedrun

To demonstrate how easy it is to introduce passwordless methods to your users, we’re going to show you a 5-minute tutorial with a provider called Frontegg. A standalone, end-to-end user management platform that, among other user management features, provides a few forms of passwordless login methods.

Creating login and authentication services is extremely time consuming and doesn’t add value to user flows, but can be detrimental if you get it wrong. As services offering authentication get better and cheaper, there shouldn’t be much reason to build your own password validation systems for your apps.

  1. Create your free Frontegg account

Create your Frontegg account through their website. Be sure to select Magic Code or Magic Link as passwordless options during the onboarding process!

Options without password

  1. Start the onboarding process

Once you have finished creating your login box and selected your passwordless methods, you will see an option to Publish to Dev.

Frontegg uses Environments (Dev, QA, Staging, Production) with unique subdomains, keys and URLs for your authentication environments.

You will now be taken to a page with sample code, and more importantly, your `baseURL` and `’clientID`. Leave this page open and proceed to your IDE for the next step.

  1. Create the React app (skip this if you already have your own app)

In your terminal, type the following commands to create a new Reactreact application and navigate to the new directory.

npx create-react-app app-with-frontegg
cd app-with-frontegg
  1. Install and import Frontegg

Run the following command to install the Frontegg React library and react router. You can skip installing react-router if it is already installed in your application.

npm install @frontegg/react react-router-dom
  1. Configure connection settings

In the src/index.js file, add the code below. Then go back to your Frontegg page and find `baseUrl` and ‘clientID’ in the code samples.

Note: These values ​​are still in the Administration section of your workspace after this onboarding flow is complete.

import React from 'react';
import ReactDOM from 'react-dom'; 

import App from './App';
import './index.css';

import { FronteggProvider } from '@frontegg/react';

const contextOptions = {
  baseUrl: '## YOUR BASE URL ##',
  clientId: '## YOUR CLIENT ID ##'
};




ReactDOM.render(
    <FronteggProvider contextOptions={contextOptions} hostedLoginBox={true}>
        <App />
    </FronteggProvider>,
    document.getElementById('root')
);
  1. Redirect to login

Using the Frontegg useAuth hook, you can determine whether a user is authenticated or not. If the user is not authenticated, you can redirect the user to login via the useLoginWithRedirect hook (as shown in the example below).

import './App.css';

import { ContextHolder } from '@frontegg/rest-api';
import {
  useAuth, useLoginWithRedirect
} from "@frontegg/react";

function App() {
  const { user, isAuthenticated } = useAuth();
  const loginWithRedirect = useLoginWithRedirect();
  
  
  
  
  
  
  const logout = () => {
    const baseUrl = ContextHolder.getContext().baseUrl;
    window.location.href = `${baseUrl}/oauth/logout` +
                           `?post_logout_redirect_uri=` +
                           `${window.location}`;
  };
  return (
    <div className="App">
      { isAuthenticated ? (
        <div>
          <div>
            <img src={user?.profilePictureUrl}
                 alt={user?.name}
            />
          </div>
          <div>
            <span>Logged in as: {user?.name}</span>
          </div>
          <div>
            <button onClick={() => alert(user.accessToken)}>
              What is my access token?
            </button>
          </div>
          <div>
            <button onClick={() => logout()}>
              Click to logout
            </button>
          </div>
        </div>
      ) : (
        <div>
          <button onClick={() => loginWithRedirect()}>
            Login
          </button>
        </div>
      )}
    </div>
  );
}

export default App;
  1. Login

To run npm start or open http://localhost:3000 in your browser and click on the Login button. You should see your newly created login and registration pages.

Note, there is no password field here 🎉

Registration at Frontegg

Click on Register, access your email and click on Activate my account.

Frontegg unique code

When you want to sign in, you just have to enter your email, wait for the six-digit code to arrive, and you’re connected. No password, no worries.

Conclusion

I hope this guide to passwordless authentication has helped you not only understand how accessible this technology is, but also how important it will become in the next few years.

How your texts can be used as evidence against you in court

0

Meveryone assumes that text messages are private, but that’s not necessarily the case, as recent memorabilia has shown. Text messages played a central role in the January 6 hearings and could form the basis of legal action against those under surveillance. Last week, a watchdog revealed that the US Secret Service deleted important text messages related to the attack, showing how important text message evidence can be.

Texting has also figured in high-profile legal proceedings like Michelle Carter’s “suicide by text message” trial, Anthony Weiner’s sexting trial and, more recently, the Amber Heard-Johnny Depp libel trial.

Like social media posts and other forms of digital communication, text messages can be used as evidence in court and can be instrumental in the outcome of criminal and civil cases.

“People say things in texts that they later regret,” says Larry Buckfire, president of Michigan law firm Buckfire Law. “It’s so easy to say things you shouldn’t say or say things impulsively that you can’t take back once they’re documented.”

Here’s what to know about how text messages can be used as evidence.

How can text messages be used as evidence?

Text messages can be used to prove wrongdoing or support a defense position in a wide variety of court cases, ranging from family law cases like divorce and child custody to personal injury lawsuits to criminal trials. .

Once a text message is admitted in court, it’s fair game and can potentially make or break a case. “In a legal proceeding, a text message is essentially a recorded conversation or, at least, a written expression of your intention to say something or do something,” Buckfire says. “They document your thoughts, ideas and expressions.”

In criminal cases, Buckfire says text messages are often used to show a person’s motive, intent to commit an alleged crime, or state of mind in advance. “You usually have to prove that a person intended to commit a crime. So if they argue it was unintentional or inadvertent, the text messages can show they intended to do something,” he says. “If they send threatening text messages to someone or explain a plan to commit a crime or cover up something, that’s preserved.”

Following the Supreme Court’s decision in June to overturn Roe v. Wade, concerns are growing about the potential use of text messages, location data and other digital information to punish people who discuss or seek information about abortion access. services. In the past, text messages have repeatedly been used as evidence against women facing criminal charges related to the termination of their pregnancy.

As the January 6 hearings demonstrated, text messages can also be used as evidence in congressional hearings, which can ultimately lead to litigation. The House Jan. 6 committee obtained thousands of text messages regarding the actions of senior White House officials in the weeks leading up to the 2021 attack on the Capitol. During Tuesday’s hearing, the committee revealed text messages between former Trump campaign manager Brad Parscale and former Trump spokeswoman Katrina Pierson in which Parscale said the speech of the Trump’s Jan. 6 rally “demanded civil war.”

Text messages have also been used to indict some of the people who participated or attempted to participate in the insurrection. A man, who arrived in Washington that day with 2,500 rounds, sent text messages threatening to kill Washington Mayor Muriel Bowser and House Speaker Nancy Pelosi and said in a text that he was ” ready to remove several skulls from the shoulders. Another texted a friend bragging about being “one of 700 inside” the Capitol.

As Darrell M. West, vice president and director of governance studies at the Brookings Institution, wrote in the weeks following the attack: “Taken together, the information gathered before, during and after the riot show how technology enables both insurgency and legal accountability. .”

When can SMS be used in court?

Before text messages can be introduced into a case, they must be legally obtained as evidence. Buckfire says that if a person does not voluntarily provide their cell phone, an attorney can obtain a court order or subpoena to access the relevant messages. Even if a phone owner has deleted some messages from their own device, those texts are still accessible from the phone of the person who received the messages. Most major cellular service providers also keep a record of the content of text messages sent and received by their account holders for a short period of time.

If a person has not yet been charged with a crime, Buckfire says law enforcement can seek a warrant from a judge or magistrate to search a phone. “You have to prove why the police need the phone and why it’s needed for the investigation,” he says. “Once there is a warrant, the police can go and confiscate the phone, have it examined and downloaded [its data].”

Encrypted messages sent through secure messaging services like iMessage and WhatsApp are harder for law enforcement to get their hands on. But if you use cloud-based backup for these messaging apps, the content is still accessible using special “cloud-mining” technologies, according to Privacy International.

Text messages must also be authenticated to be properly admitted into evidence. This means that a lawyer must prove that a text was actually written and sent by the person it claims to be. According to the American Bar Association, text messages can be authenticated by testimonials or by circumstantial evidence such as “the author’s screen name or nicknames, habitual use of emoji or emoticons, author’s known telephone number, reference to facts specific to the author, or reference to facts that only the author and a small number of other people may know”.

There’s a lot of scrutiny of what evidence is admissible in court, Buckfire says. “You can’t just bring a phone and say, ‘Here’s this phone and this message,'” he says. “You have to show that a text is reliable, that it has useful value in a case, and that it is not unfairly prejudicial.”

One of the most valuable lessons Buckfire says he learned from practicing law is to be careful how you communicate things. “What you write down will come back to haunt you,” he says.

More Must-Try Stories from TIME


Write to Megan McCluskey at [email protected]

Op-ed: A message to veterans and their families

0

We are committed to making the UK the best country in the world to be a veteran by 2028.

It is an ambition that we must achieve.

And having just been appointed Minister of Veterans Affairs, it is my job to move it forward and I will hold myself accountable to veterans and their families.

Although veterans care has come a long way over the past fifteen years, I recognize that this has not been felt in the same way by everyone, nor experienced in the same way in all communities across the UK .

Today’s announcement of a £5m investment in veterans healthcare will be helpful. And tremendous progress has been made in meeting the increased demand for support since 2003, with thousands of brilliant people working incredibly hard – often as volunteers – to improve the after-service lives of our veterans.

We know that the vast majority of our veterans lead fulfilling and empowered lives after service. They make fantastic employees, pursue great careers, give back to their communities, and benefit immensely from their time in military service.

But some veterans face deep difficulties. And in this role, I will relentlessly strive to lead the way to ensure that everyone who needs help knows where to turn and receives good quality, evidence-based care that will improve their lives. .

The Veterans Affairs Bureau has accomplished great things since it was launched by the Prime Minister in 2019.

We are already taking steps to protect veterans from vexatious lawsuits into old age.

We offer the first comprehensive mental health care pathway for veterans in England and we have a bold set of commitments in the Veterans Strategy Action Plan to improve healthcare, jobs, life. access to digital services and more.

We may well find ourselves at a point of political uncertainty right now.

But regardless of the outcome in the weeks to come, I will continue to push for the government to make this step change in support for veterans so that it will be felt by all who have served and sacrificed so much.

Incredible Benefits Of SMS Marketing That Can Help Your Business Grow

0

There are several ways to market your business. But one of the most cost-effective and effective ways to reach customers and promote your business is through SMS marketing.

Let’s see some of the amazing benefits of SMS marketing that can help your business grow.

Functional and flexible

Text messaging is very functional and convenient as it can be used to send reminders, updates, coupons, and marketing messages. Without speaking about Text messaging API, which can help you provide PINs, business notifications, and other important information to your customers. And since people always have their phones with them, you can be sure that your message will be received and read.

This flexibility makes it easy to use SMS marketing to achieve a variety of different goals. For example, you can use it to increase brand awareness, promote a new product or service, or increase sales.

So it’s easy to see how this immediate and personal form of communication can benefit your business. People are more likely to act on a message they receive via SMS than one they see in an email or social media post, and they appreciate the convenience and straightforwardness of SMS marketing.

SMS marketing is personal

Another advantage of SMS marketing is that it is very personal. Unlike other forms of marketing, such as television or radio ads, text messages are delivered directly to people’s phones. This means you can address your customers by name and include other personal touches that will make them feel special and appreciated.

This personal approach can do wonders for your business. This will make your customers feel valued, which will encourage them to do business with you again in the future.

Plus, SMS marketing is a great way to build relationships with your customers. By sending them personal messages, you can create a connection with them that will make them more likely to think of your business when they need the products or services you offer.

Profitable

One of the best things about SMS marketing is that it is very affordable, especially if you compare it to other marketing channels. You can reach large numbers of people at a fraction of the cost of traditional advertising. Plus, there are no printing or production costs associated with text messaging.

This makes SMS marketing a great choice for small businesses or startups working on a budget. You only have to pay the cost of sending the messages, and there are no ongoing charges.

Measurable

Unlike many other marketing channels, text messaging lets you track exactly how many people are receiving and opening your message. This information is critical to understanding the effectiveness of your marketing campaign.

For example, if you text a coupon code, you can track how many people use the code to make a purchase. This data can help you adjust your marketing strategy to make sure you’re getting what you pay for.

On the other hand, if you are running a contest, you can use SMS marketing to track how many people are entering it. This data can help you determine if the contest is a success and if you should run it again in the future.

Easy to set up and follow

This means that you can use a variety of different software to create and send your text messages. There are several different platforms to choose from, and many of them offer free trials. This makes it easy for you to find the right one for your business.

However, there are a few things you should pay attention to: make sure the SMS marketing software you choose has a good delivery rate and can be integrated with your email marketing platform. This will make it easier to track your results.

Also, some SMS marketing platforms offer more features than others. For example, some let you segment your contact list so you can send different messages to different groups.

Others offer automated messages that are sent based on certain triggers, such as when a customer makes a purchase.

You can learn more about the features offered by different SMS marketing platforms by reading reviews online.

SMS marketing is a great way to reach your customers and promote your business. It’s highly personal, cost-effective, easy to set up and track, and offers a variety of features that can benefit your business. If you’re not already using SMS marketing, now is the time to start.

Pay attention to the tips mentioned above to get the most out of this powerful marketing tool.

Home offshore drilling plan lambasted by both sides at US Senate committee

0

Governor Hochul Announces New Effort Via Text To Provide Latest Information On Monkeypox To New Yorkers

0

Governor Kathy Hochul today announced a new text notification effort to deliver the latest information on monkeypox directly to New Yorkers.

New Yorkers can sign up to receive text messages — which will include alerts about cases, symptoms, spread and resources for testing and vaccination — by texting “MONKEYPOX” to 81336 or “MONKEYPOXESP” for texts. in Spanish. By providing a zip code, New Yorkers can also sign up for location-based messages.

“We are building on our ongoing response efforts to bring the latest monkeypox information, tools and resources directly to New Yorkers,” Governor Hochul said. “As we continue to work with the federal government to push for more vaccines, I urge New Yorkers to sign up for these important alerts and stay informed about updates on monkeypox in your community. .”

The new SMS campaign is designed to alert New Yorkers of relevant information about monkeypox, so they have protective public health information and resources at their fingertips. The posts will cover information about how monkeypox presents and is transmitted, as well as what New Yorkers should do after exposure.

Information on how to register for the SMS campaign will be disseminated widely through social media, voter engagement, community organizations and the state’s Excelsior Pass platform.

State Health Commissioner Dr. Mary T. Bassett said: “In public health, information is one of our most valuable tools. This innovative campaign, which provides texts in English and Spanish, will help bring education and resources directly to New Yorkers – expanding the access to updates on monkeypox and the availability of vaccines and care I encourage everyone to sign up for these alerts and stay informed about the best ways we can all protect ourselves and mitigate the spread in our communities.”

New York State continues to work closely with the Centers for Disease Control and Prevention’s Monkeypox Response Team on vaccine distribution plans to ensure that New York State receives its fair share of the supply of vaccines as they become available to protect New Yorkers, especially for New Yorkers in communities with high transmission rates. Governor Hochul recently spoke with Dr. Ashish Jha and Dr. Raj Panjabi of the White House to secure additional vaccine doses to meet the needs of New Yorkers.

Today’s announcement builds on the New York State Department of Health’s (NYSDOH) ongoing public awareness efforts on monkeypox, including the recent launch of a digital advertising campaign pay to inform communities experiencing higher rates of monkeypox cases, including gay and bisexual men and other men who have sex with men.

NYSDOH dedicated website, which stays up to date with the latest information, offers free downloadable materials including a palm map, information map, handout and posters available in English and Spanish. NYSDOH has already distributed these resources to LGBTQ+ organizations, local county health departments, healthcare providers, and businesses. The posters will be displayed at gathering places across the state, including health centers, transit centers, parks, rest areas, restaurants, bars and nightclubs.

In addition to public outreach, the New York State Department of Health continues to focus on delivering vaccines to communities. July 12, NYSDOH announcement his second allocation of the JYNNEOS vaccine from the federal government. This supply remains limited, and New York State is actively working with the federal government to communicate the urgent need to increase supply to meet the preventative needs of New York residents. Local county health departments that have been supplied administer the vaccine directly and establish their own appointment processes. Working in partnership with counties, New Yorkers who sign up for location-based alerts can receive alerts about vaccine availability, clinic locations, scheduling, and other smallpox-related updates from monkey specific to their region.

Earlier this week, NYSDOH, in partnership with the New York City Department of Health and Mental Hygiene (NYCDOHMH), hosted a Monkeypox Town Hall for community leaders led by State Health Commissioner Dr. Mary T. Bassett and City Health Commissioner Dr. Ashwin Vasan. New York City and other local municipalities have their own alert systems in place, and local residents should follow these updates as well. Working in partnership with community organizations and advocates, NYSDOH remains committed to continuing to raise awareness and maintain direct dialogue with New Yorkers, especially those most affected by the current outbreak.

NYSDOH continues to provide information and support to healthcare providers and local county health departments, including tips on case detection and notification. New York State has the capacity to test, and due to efforts to expand capacity, testing is now also available at LabCorp, Mayo Clinic and Aegis Sciences Corporation and will soon be available at two other national labs including Quest Nichols Institute Diagnostics and Sonic Healthcare.

New Yorkers can sign up for the text campaign by texting “MONKEYPOX” to 81336 or “MONKEYPOXESP” for texts in Spanish. New Yorkers will be able to provide their zip code to sign up for location-based messaging, if they wish.

For more information on monkeypox, visit health.ny.gov/monkeypox.

New Yorkers can learn more about New York State first allocation of vaccines from the federal government here and the second attribution here.

Minister calls on pension schemes to prepare ‘data’ for dashboards

0

The calls come as the government releases its response to a consultation which gathered feedback from industry, potential suppliers, consumer groups and future users on what data to include and how it should be presented to people .

Bringing pensions into the digital age, the dashboards will allow savers to see what they have in their various pensions – including their state pension – in one place online, at any time.

Ten years after the introduction of automatic enrollment and there are record numbers of Britons saving for their retirement. With more and more people managing their finances online, the need for retirement dashboards is greater than ever.

Pensions Minister Guy Opperman said:

For many people, a pension is the most important financial investment they will make in their lifetime. This is why the introduction of pension scoreboards is so important.

Clear information about pensions at the touch of a button, including the state pension, will allow savers to be better informed and more engaged, while helping people plan effectively for their retirement, as well as find the lost and forgotten pension pots.

The construction and the first tests of the architecture of the digital dashboards are already well advanced. My message to administrators and managers of pension plans of all types and sizes is simple: prepare the data.

The pension dashboards will offer savers the choice of how they keep track of their pension pots, with the dashboards to be provided by the Money and Pensions Service (MaPS) and other organizations who qualify to develop and host their own dashboards.

The first version of the pension dashboards will give people the ability to find their pensions and then view information about their value, but as the use of dashboards becomes more mainstream, the information and experience users will further enhance the dashboard experience.

Further information

Media inquiries for this press release

Follow DWP on:

ECB President Christine Lagarde receives fake text messages from former German Chancellor Angela Merkel

0

Tuesday, July 12, 2022 3:13 p.m.

Christine Lagarde

The European Central Bank revealed this afternoon that its president Christine Lagarde was targeted in an attempted cyberattack but no information was compromised.

The attempt happened “recently,” the Frankfurt-based central bank for the 19 countries that use the euro said in an email response to a question about a Business Insider report.

The bank added that “it was identified and stopped quickly” but that it had nothing more to say in the context of an investigation.

Business Insider reported, without naming sources, that Lagarde was contacted by text from what appeared to be former German Chancellor Angela Merkel’s cellphone number by someone claiming that Merkel wanted to communicate with her via WhatsApp because it would be safer.

Lagarde then contacted Merkel by phone to ask if she really wanted to communicate through WhatsApp and that whoever was behind the attempt was apparently aiming to take over the accounts of various personalities on WhatsApp and other messaging services.

How to check fuel prices and gas station employee details via SMS

0

The Petroleum and Energy Regulatory Authority (EPRA) has introduced an SMS service that will help motorists to check fuel prices and even whether petrol station attendants are registered employees.

EPRA’s decision to create USSD*363# and SMS services has been attributed to increasing cases of gas stations selling adulterated fuel and some illegal price increases.

Services that can be confirmed via SMS include pump prices, employee details, accident and complaint reporting, license details verification and truck verification.

The short SMS code can also be used by students taking EPRA-related courses or those who want to know the status of their exams.

An aerial photo showing motorists queuing for fuel at a petrol station in Kileleshwa on Saturday April 2, 2022.

my3road

How to check fuel prices

One can confirm the price of fuel by typing the word price (space) town and sending the message to 40850. An example of SMS is – Price Nairobi.

How to check employee details

Type the word employee followed by the national identification number, then send the message to 40850. For example, Employee 12345678.

How to report an accident

Type the word accident then send the message to 40850. EPRA agents will respond to the report within 24 hours on weekdays.

How to file a complaint

Type the word complaint then send the message to 40850. EPRA is asked to respond within 24 hours.

How to check license details

Type the word license followed by the license number and send the message to 40850, for example – License 1234.

Checking exam details for students

Students can check their exam details by sending the exam details followed by the reference number obtained after submitting their license application to 40850.

EPRA is responsible for the production, import, export, transmission, distribution, supply and use of electrical energy, with the exception of the authorization of installations nuclear.

It also has the mandate to import, refine, export, transport, store and sell petroleum and petroleum products except crude petroleum.

The authority further collects, maintains and manages upstream petroleum data.

A gas station attendant pumping fuel into a car.

A gas station attendant pumping fuel into a car.

accident illegal

As the heat blazes, the city’s cooling centers close for the day

0

Tuesday July 12th, 2022 by Jo Clifton

City Council member Natasha Harper-Madison warned last month that the city appeared unprepared for a summer heat wave that could leave a number of residents seeking air-conditioned shelter. It turns out that the council member herself became one of those residents when the power went out at her East Austin home on Monday.

As she explained on the City Council bulletin board, “I am typing this message from City Hall, where I had to take my children following a power outage in East Austin that left over 3,400 Austin Energy customers without power, including my home. . Earlier in the afternoon, the heat index in our neighborhood reached 114 degrees. It’s a heat wave that we all knew was coming, but I’m afraid we weren’t quite prepared yet. She had warned of such a possibility in a June message to her colleagues.

The National Weather Service issued an excessive heat warning for Travis County starting Sunday, urging residents to heed the warning to avoid overheating. The temperature hit 110 degrees on Sunday and is expected to be as hot or hotter on Monday, although a brief isolated rain shower brought temperatures down to a high of 109 degrees. The forecast for Tuesday was 107 degrees, according to KXAN.

Harper-Madison was especially concerned about her constituents and others who might not have the resources to escape the heat on their own. The city offers Chill Centers, which include select recreation centers and libraries scattered throughout the city, which have been designated as places Austinites can go to escape the heat of the day. Although libraries regularly stay open until 8 p.m., few recreation centers stay open past 4 or 5 p.m.

Kanya Lyons, spokesperson for the Department of Parks and Recreation, said via email: “Cooling centers are operating during the day to coincide with peak temperatures. Overnight cooling shelters are dependent on widespread power outages and the estimated time to restore power. Although ERCOT warned Texans it could be forced to mandate statewide blackouts on Monday, that didn’t happen. But it is possible that it could happen at any time this summer.

Austin Public Library spokesperson Baylor Johnson said all libraries are designated cooling centers that are “open to the public for anyone seeking heat protection during regular business hours.” The Central Library and all branches are open Monday through Thursday 9 a.m. to 8 p.m., Friday 9 a.m. to 5 p.m., and Saturday 10 a.m. to 5 p.m. (except St. John’s location , which closes at 4 p.m. on Saturdays).

Early Monday, the city’s website offered no advice on whether cooling centers would be open for overtime on Monday, Tuesday or later in the week. By late afternoon, the city said the excessive heat warning would continue until 7 p.m. Tuesday.

Harper-Madison and District 5 council member Ann Kitchen were among those particularly concerned about where residents could shield themselves from the heat after the cooling centers closed. The kitchen told the austin monitor via email that her office had not received any concerns or questions from District 5 residents. However, she said her staff had helped some District 3 residents over the weekend when the air conditioning stopped working. The city code department provided air conditioning units, she said.

District 2 council member Vanessa Fuentes said via email, “This extreme heat advisory is not limited to traditional business hours. I am deeply concerned for our vulnerable populations and their safety in these extreme weather conditions. With ERCOT calling for conservation and the threat of power outages, the City of Austin must have plans for evening and nighttime cooling centers to help our vulnerable residents. We need to be proactive and communicative in multiple languages ​​regarding these plans. »

District 9 council member Kathie Tovo said she heard concerns about limited hours and a ban on pets on social media and a constituent whose air conditioning was not working properly. Pets – which also suffer from the heat – are excluded from cooling centers, although service animals are allowed.

Tovo added, “I reached out to staff earlier to let them know and to see if the city has any plans to extend the hours of operation for any of our cooling centers. I also asked if there was a list of cooling centers and times that I could share (rather than the page that links to individual facilities).

Late in the day, Tovo got news from Homeland Security and Emergency Management, which had updated information for those who may be seeking refuge at a recreation center or public library branch. The city urges anyone planning to visit one of these cooling centers to call ahead or call 311 to make sure it is available.

Harper-Madison also expressed concern for those dependent on medical devices that depend on electricity. According to spokespersons for the library and the parks department, none of the cooling centers have backup generators. The only library building with such a generator is the History Center, which offers no shelter for those trying to stay cool.

“We have seen time and time again that these events disproportionately hit marginalized residents, including black, brown and low-income Austinites. Our homeless neighbors are particularly vulnerable to extreme weather conditions. For environmental justice reasons, we are obligated as a municipality to put in place the kind of resilient strategies that will protect the least of us, even in the worst of situations,” Harper-Madison concluded in her post on the town bulletin board. “Worsening climate change will continue to bring increasingly erratic and violent weather, but that’s no excuse. Expecting the unexpected should be our guiding mantra, and I look forward to working with each of you, as well as city staff, to seek innovative and equitable solutions.

The austin monitorThe work of is made possible through donations from the community. Although our reports occasionally cover donors, we are careful to separate commercial and editorial efforts while maintaining transparency. A full list of donors is available here, and our code of ethics is explained here.

Join your friends and neighbors

We are a non-profit news organization and we put our service first. This will never change. But public service journalism requires the support of the community of readers like you. Will you join your friends and neighbors in supporting our work and our mission?

Coping with the global rise of SIM card swapping (Reader Forum)

0

SIM card fraud unfortunately manifests itself in many ways, but one of the most pernicious forms is SIM card swapping. SIM swapping is the process by which a hacker or malicious actor obtains the personal information and mobile number of an unsuspecting individual. This bad actor then uses this information to request a new SIM card from the victim’s mobile provider. Once received and placed in the malicious actor’s mobile device, this SIM card allows the hacker to access the victim’s SMS codes and change passwords, allowing unhindered access to banking and financial accounts, And much more.

The prevalence of SIM card fraud has risen sharply since the onset of COVID-19, primarily due to increased reliance of customers on remote access procedures, reduced willingness of customers to visit branches and increased hacker interest in SIM-centric social engineering attacks. These trends have resulted in approximately $100 million in losses in the United States in 2021 alone.

Measuring the impact of SIM swapping

The most obvious impact of SIM swapping is monetary losses – like the $100 million figure quoted above. Apparently anyone can be a victim or a perpetrator – in 2019 Twitter CEO Jack Dorsey was famously a victim of SIM swapping, and the year before a fifteen-year-old was able to steal $23 million in cryptocurrency from a single victim.

Ultimately, the responsibility for these losses rests with the customer, not the supplier. Although this may seem positive for mobile phone providers at first glance, who would probably not want to be dependent on such high figures, it can have a considerable impact on the reputation of the provider. Increasingly, customers don’t want to do business with vendors who don’t take their security seriously, and high-profile cases of identity theft and fraud can have a lasting negative impact on how vendors are perceived.

Current methods used for SIM card registration and replacement

Historically, the SIM card registration process, whereby a new customer registers with a mobile operator and provides their personal information, was done in person at a local office or branch. This face-to-face workflow is overall a very secure process, giving providers a solid foundation to get to know their customers and deliver their services with confidence that the user is in fact authorized and legitimate. Increasingly, however, this process has become available remotely due to the perceived inconveniences of in-person procedures; this has only accelerated in recent years due to the COVID-19 pandemic.

Remote replacement procedures performed online or over the phone are inherently less secure than those performed in person. Indeed, these rely on authentication methods that are increasingly prone to fraud, such as passwords. With identity theft at an all-time high lately, it has become increasingly easy for bad actors to pose as a victim and fraudulently obtain a replacement SIM card. To combat this, mobile phone providers are researching and implementing stronger authentication methods than traditional ones.

Biometric authentication to reduce SIM card fraud

For vendors looking to improve security for their customers without adding additional inconvenience, biometric authentication is a solid option. Unlike passwords and PINs, biometrics take advantage of the uniqueness of our physical characteristics, dramatically increasing security and significantly reducing a malicious actor’s ability to impersonate a customer.

Contemporary biometrics requires no special hardware and is as easy to perform as a person taking a selfie. Modern biometric technologies are mobile, using the cameras and microphones of today’s smartphones and devices to perform a facial capture or voice prompt of a user wherever that person is. The presented face or voice would then be matched against the user’s existing biometric profile, ensuring that the user is indeed the authorized person.

Therefore, since biometrics relies on something you are instead of something you know — such as a password or the answer to a security question — a customer’s means of authentication cannot be stolen by a malicious party.

Biometric authentication is also fast, ensuring a high level of convenience for users. Today, highly secure facial or voice recognition can take place in seconds via a mobile device, using the cameras and microphones already included. No special hardware is needed and the whole authentication process can be natural and frictionless.

Additionally, biometric authentication software can replace contemporary authentication methods such as passwords relatively quickly and easily with minimal implementation issues. Providers can continue to maintain their existing workflows for SIM card registration and replacement; the only change is how users authenticate.

With SIM card fraud on the rise around the world and passwords becoming more outdated and prone to fraud, now is the time for mobile phone providers to review their authentication procedures and look for proven alternatives. Too much is at stake not to do this.

What is the exact security of two-factor authentication? – Geek Review

0
BestForBest/Shutterstock.com

Two-factor authentication (2FA) is becoming mandatory on many websites, and it’s easy to see why. On the face of it, requiring you to confirm your login via text or app provides a solid second layer of security. But how strong is he?

With security threats on the rise and people having more to lose online than ever, it’s only natural to want to protect yourself as much as possible. While hacking into a social media account can be annoying, there are far more serious consequences to having lax cybersecurity. Hackers could access your bank accounts and drain your savings, sensitive files and photos could be stolen, and you could even have a business account hacked and land in hot water with your boss.

The term “two-factor authentication” refers to a second step to confirm who you are. An additional layer of protection will, by default, provide more security than a simple barrier. However, there is more than one 2FA method; all methods offer different levels of security, and some are more popular than others. So can 2FA make your sensitive accounts invulnerable to hackers? Or is it just a huge waste of effort? Let’s find out.

Texting is not as safe as it seems

A laptiio displaying a 2FA code reset request
KT Stock photos/Shutterstock.com

The most common form of 2FA is SMS-based. Your bank, social media account, or email provider sends you an SMS with a code, which you enter within a set time. This gives you access to the account and protects your connection from anyone who doesn’t have your phone. At first glance, this is the safest method. Someone would need to steal your cell phone or devise an elaborate, James Bond-like way to clone your SIM card to get around this one, right? Bad.

Last year, Vice claimed a hacker could use a flaw in the SMS system to hack your number and redirect your SMS messages for as little as $16. There are also more or less sophisticated methods that an individual can use to access your messages. The easiest is to just call your phone company pretending to be you, saying your phone is missing, and asking the company to change your number to another SIM card. The most complex involve attacking the company directly and intercepting messages.

As for how they get personal information and your phone number? They might do shady deals and buy personal information about you and your various online activities on the dark web. Or they might check your Facebook for details like your date of birth, phone number, schools you attended, and your mother’s maiden name. You may know precisely what information you’re posting, but many people don’t.

At the very least, it is possible to protect yourself from sim swap attacks or be alerted when they occur. But you should consider adopting a different 2FA method if possible.

Email-based 2FA might be useless

Two-factor authentication should add an extra layer of security between your account and a potential threat. However, if you’re lazy, all you’re doing is adding an extra step and potentially giving an internet miscreant a good laugh. If you’re the type of person who uses the same password for everything and their email account is used to secure their target account, you could be in a lot of trouble. A hacker can log into this email address using the same information they have already stolen and authenticate their actions.

If you insist on using 2FA over email, you should create a separate email account just for authentication purposes with its unique, hard-to-crack password. You can also use another method as they are all more secure.

Push-Based Might Let You Down

A man logging into a site with 2FA
tsingha25/Shutterstock.com

Push-based authentication can be fast, simple, and secure. A device, which can be your smartphone, is linked to your account and registered as a 2FA method of your choice. From then on, whenever you want to log in, you will receive a push notification on this device. Unlock your phone, confirm it’s you, and you’re connected. Sounds perfect, right?

Unfortunately, there is a catch or two. The main problem with the push-based method is that your device must be online for you to use it. If you need to access an account and your phone is having trouble getting a signal, you’re out of luck. It’s worth pointing out that this hasn’t been an issue for me in the few years I’ve used it. If I need to get online, I’m usually somewhere with WiFi, which my phone can use. I’m more likely to be somewhere where I can’t receive text messages than somewhere I’m trying to connect and can’t get a push notification on my phone.

Hardware-based 2FA takes a lot of effort

The YubiKey Bio on Mac and PC.
Yubico

Physical authentication keys are as close to being hack-proof as possible. It’s basically a USB stick filled with protocols and security codes that you plug into a device that you connect to. You can keep it on your keychain and take it with you, or keep it in a safe and only take it out when you need to connect to something that needs that extra layer of security. The main danger with a physical key is losing or breaking it, something you may have done with USB drives in the past.

It is also possible to physically write down a long and complex authentication password. It is a string of numbers and characters and a popular method for securing cryptocurrency wallets. As these are hard to break, The FBI broke into a house find a piece of paper containing a 27 character password, which was easier than finding it. You can’t hack into something written on a piece of paper and stored in a desk drawer, and supercomputers can take years to go through the possible combinations involved in high-level encryption.

Of course, if it’s in your desk drawer, it’s not with you. If you take it with you, you can lose it as easily as you can lose a 2FA USB key. And when it is gone, you will at best have to go through an account recovery process or at worst lose access to your account. The physical method is the best thing you can do in terms of security, but the worst in terms of convenience. You can use it as a foolproof account recovery method, but it’s probably best avoided for things you access on the fly.

App-Based 2FA Worth Checking Out

Download an app like Google Authenticator comes with a few benefits. It is more secure than methods such as email and SMS authentication; it is free in most cases and still works if the device does not have an internet connection. This is due to the synchronization-based algorithm, which produces different keys at different points in time. A key is only valid for a set period and must match the device and site the user is connecting to.

There are still some vulnerabilities. With Google Authenticator, there’s no lock on the app itself, so anyone who can access your phone can open it and use it. Some malware could also take advantage of the lack of a passkey, so you should consider alternatives like the Microsoft Authenticator app, which adds an extra layer of security to the authentication process with features like biometric unlock. It’s also vulnerable to phishing attacks, where you enter the key into a fake website and allow a fast-acting hacker or bot to use it. They are also open to interception.

You should always use 2FA

(I know it’s cheesy and the pictures aren’t my strong suit, but it doesn’t look right without maintaining the “all pirates wear hoodies in dark rooms” trope.)

I have identified flaws with each method mentioned, and more will likely appear over time. But the more security you have, the better. You should 100% use 2FA and other methods like a password manager to secure your online accounts.

There’s a balance between security and convenience, so find what works for you. Maybe the hardware-based method is overkill or something you’re sure to lose. Texting might not be as secure as it looks, but it still takes a bit of effort to crack it. If you’re just an average Joe, you probably won’t be worth being individually targeted, and SMS authentication is something that will dramatically increase your online security.

Examine your life, assess what you have to lose, and determine how much effort you want to put into it. But at least choose a 2FA method (which is not email-based) and make sure you have a different password for each account you care about.

From the Chamber: Thoughts on Graduation

0

We live and work in a highly technical and complex world. Who would have imagined Ipods or Blue tooth? Or Zoom meetings? video conference? Or text messaging? or a blog? The video recorder is almost obsolete, replaced by the blue ray disc. A new car starts at $13,500 compared to $445 in 1934. A 6-room rent starts at $875 per month compared to $22.50 per month in 1934.

Minimum wage remains at $15 in Connecticut, up from .33 an hour in 1934. You know the price of gas – I remember filling up my car for $1. Even this information is dated, and I suspect some of you are way ahead of us.

When it comes to the world of work, these ever-changing and most challenging times are creating more anxiety and stress than most of us have ever experienced.


As Dr. Seuss said, “I’m sorry to say this, but unfortunately it’s true that snags and blockages can happen to you.” With that in mind, here are my top ten guidelines for success.

10. Set your priorities. Education does not end with the beginning; rather, it is the start of a long life journey that requires setting your goals.

9. If you commit to something, accomplish the task despite the challenges. Even if it’s not your life’s dream, finish what you started and learn from it. Then, continue without burning bridges.

8. Do what you love and love what you do. You bring to the table many talents from previous jobs and also life experiences. Identify the skills and talents you have and think about how you can transfer them to a job and career you’ll love.

7. Realize that life is a roller coaster with ups and downs. It is more productive to think of the glass as half full rather than half empty. Build on the positive rather than the negative. Even if it is sometimes difficult to understand, you can turn a bad experience into a good one.

6. Be persistent. Move forward despite the challenges that hold you back. See the possibilities in the good rather than the fear of failure. If it’s ethically, morally and legally correct, go for it!

5. Surround yourself with positive people. Whether it’s a personal friendship or a business contact, positive relationships matter most in the realm of things. You’re sure to find mentors and new best friends along the way, but always remember the family and community that guided you.

4.Improve your communication skills. Remember the magic words: please and thank you and I might add – I made a mistake. Keep in mind the message you want to convey, how it will be communicated, the audience who will receive that message, and the desired effect of the message.

3. Welcome change. Anyway, change is the only thing that is constant. Despite this awareness, unease and sometimes fear accompany the change. Since “variety is the spice of life”, embrace change and expand your experiences by adapting to and learning from life’s constant ups and downs.

2. Share your talents. The most valuable gift you can give to another is your time and attention. It doesn’t matter if you have little capacity or large capacity. What matters is what you do with what you have.

1. Remember that we only walk once. Do it with integrity, selflessness, good health, and belief in a higher power. Above all, do it with humor.

“You will mix, of course, as you already know. You will be mixed with many strange birds as you go. So be sure when you walk. Proceed with care and great tact and remember that life is an excellent exercise in balance… And will you succeed? Yes! You will, indeed! Dr Seuss

JoAnn Ryan is President and CEO of the NW CT Chamber of Commerce. You can reach her by email: [email protected] or by phone: 860-482-6586.

Pennsylvania 911 dispatcher Leon Price charged with failing to dispatch an ambulance in Diania Kronk’s death

0

Kelly Titchenell called 911 when her mother was in pain after days of heavy drinking. She made a desperate plea for medical assistance to a dispatcher in Pennsylvania: “She’s going to die” without immediate help, she said.

But instead of immediately dispatching an ambulance for Diania Kronk in the summer of 2020, the dispatcher asked for more assurance that Titchenell’s mother would be willing to be taken to a hospital half an hour away.

“She will, because I’m on my way, so she’s leaving or she’s going to die,” Titchenell told the Greene County, Pa., dispatcher as she drove to her boyfriend’s home. mother, according to a recording of the 911 call obtained by The Washington Post.

Still, Leon “Lee” Price waited and asked Titchenell to call 911 once she got home to make sure Kronk was ready for an ambulance. “We really need to make sure she’s ready to go,” he said on the call.

Emergency medical services arrived long after the call ended, Titchenell told the Post. Titchenell found his mother naked on the porch, talking incoherently and bleeding. Kronk, 54, died of internal bleeding the next day.

Now, about two years after Kronk’s death, the 911 dispatcher has been charged with manslaughter, according to Greene County officials. Price, 50, of Waynesburg, Pennsylvania, also faces charges of reckless endangerment, official oppression and obstruction, according to The Associated Press.

The charges represent a rare case in which a 911 dispatcher is charged in connection with the death of a person after failing to dispatch help. Price, who was arraigned on June 29 and released on bail, faces the charges after Titchenell filed a federal lawsuit last month in the Western District of Pennsylvania against the dispatcher, Greene County and two 911 supervisors. alleging a “ruthless denial of public emergency medical services. Lawrence E. Bolind Jr., the attorney representing Titchenell in the federal lawsuit, told the Post that Price’s hesitation during the nearly four-minute 911 call was “an intentional act.”

“I believe in my heart that my mother would still be alive if he had sent an ambulance,” said Titchenell, 38, of Mather, Pennsylvania. “It shouldn’t have been his decision. He should have sent an ambulance and let the professionals decide whether she should go to hospital or not.

A message left at a phone number listed for Price’s home address was not immediately returned on Friday. It was unclear if Price had an attorney.

While Price’s employment status in the county remains unclear, Marie Milie Jones, county attorney and 911 supervisors named in the federal case, told the Post that “Mr. Price is a member of a collective bargaining unit and the county is following the necessary procedures under the CBA. It was unclear whether Price faced discipline for the 2020 incident. Jones told the AP his clients did not believe they were responsible for Kronk’s death.

“It’s unfortunate that this woman is dead. Certainly, from a personal point of view, it is very difficult,” Jones said. “I’m not going to comment on the details of his situation.”

Greene County District Attorney Dave Russo said in a news release that county detectives’ investigation of the case revealed that “911 services violated protocol and their own procedures by refusing to respond to the case.” ‘Send an ambulance to Mrs. Kronk’s aid’.

“According to the investigation, she was denied medical services while all three ambulances were available for dispatch,” Russo said.

A manslaughter conviction carries a prison sentence of up to 10 years, according to Pennsylvania attorneys.

The charges in rural Pennsylvania come weeks after a 911 dispatcher in Buffalo was fired after a Tops supermarket worker trapped in the deadly mass shooting in May was hung up. Erie County dispatcher Sheila E. Ayers was first placed on administrative leave after Latisha Rogers, assistant supermarket office manager, told the Buffalo News and WGRZ that she called 911 and whispered to the dispatcher hoping to inform authorities of the mass shooting. that takes place at the grocery store. But instead of helping her at a time when she was “scared for my life,” Rogers said, the 911 dispatcher dismissed her in “a very mean tone.” Ayers was fired last month after eight years with the Central Erie County Police Department.

Although criminal charges against 911 dispatchers are rare, they are not unheard of. In 2008, a 911 dispatcher in Detroit was sentenced to a year’s probation and fired from her job for not taking a boy’s call seriously when he told the operator that his mother was in trouble. was collapsed. Sherrill Turner, 46, was found dead hours after Sharon Nichols allegedly hung up Turner’s young son in 2006 and accused him of playing games. The dispatcher had testified in the case that she could not hear the child.

Kronk worked in home health care and enjoyed caring for others, her daughter said. Kronk, who had five grandchildren, loved cooking for his family and friends, especially his famous pepperoni rigatoni.

“She wanted to make sure everyone was okay,” Titchenell said.

When the coronavirus pandemic hit, Titchenell was vulnerable due to her autoimmune disorder, she said. She also suffered from fibromyalgia, an incurable chronic neuromuscular disease. Although she and her mother lived together in Mather — a small town more than 50 miles south of Pittsburgh — Kronk was spending more time at her boyfriend’s house in an effort not to bring the virus into Titchenell’s home.

“I panicked and didn’t want her to come and go. That’s why she stayed there for a long time,” she said. “I didn’t want her bringing the germs back here.”

Titchenell knew her mother’s drinking increased at the start of the pandemic, which led to weight loss and her “yellowing”, she said. But a text message from her brother that their mother was “in a bad way” prompted the girl to go to where Kronk was staying near Sycamore, Pennsylvania, court records show.

On July 1, 2020, Titchenell called 911 and was connected to Price. The cell phone service where her mother resided was not good, so she called 911 before she arrived, Titchenell told the Post. At the start of the call, she explained that her mother was in pain after days of heavy drinking and asked for an ambulance to pick her up.

“I can’t get her in my car. … She can’t even move,” Titchenell said, according to the 911 call.

During the call, Price repeatedly told Titchenell that Greene County could not force Kronk into an ambulance if she did not want to. At this point, Titchenell told the Post, she was confused as to what was going on.

“I didn’t understand because usually if you call 911 they send help,” she said. “It really didn’t make sense to me.”

After Titchenell told the dispatcher that his mother “wasn’t in her right frame of mind right now” to make the decision, Price bluntly told Titchenell that “no emergency service would be provided” without confirmation from Kronk that she would go to the hospital, according to court records.

“Can we at least try?” Asking price at Titchenell.

When Titchenell said she was 10 minutes from her mother’s boyfriend’s residence, Price suggested she hang up and call 911 to “make sure she wants to go before sending resources there. -down”.

“I’m sorry,” Titchenell said.

“No, don’t be sorry, ma’am,” Price replied. “Just call me when you go out, okay?”

Bolind told the Post that Price “never told the police, never told anyone to follow” Kronk’s condition.

“At some point, Ms. Titchenell thinks it was decided that for some reason, in her opinion, they didn’t want to waste resources going to where her mother was staying,” he said.

An autopsy later concluded that Kronk had died of internal bleeding.

Russo, the district attorney, told the Post that the inquest next month is expected to determine whether additional charges will be brought against Price or the county.

“No one should be denied emergency services in Greene County or anywhere else,” he said. “Everyone should have the same protections and access to medical care.”

Titchenell described the past two years as hell for her and her family. As she hopes for accountability, she says, she thinks of one of the questions she would ask the dispatcher if he were to speak again: “What would you do if this happened to your mother ?

“I never want this to happen to anyone else,” she said.

Kenyans to Participate in Presidential Debate Via Whatsapp, Email, SMS

0

Nairobi — Kenyans will now be able to fully participate in the presidential debate scheduled for this month through the social media platforms opened by the presidential debate team.

They will be able to post their questions via WhatsApp, email and SMS code on the governors’, vice-presidents’ and presidents’ debates which will be held on July 11, 19 and 26 respectively.

Speaking at the signing of a partnership with Mkenya Daima and the Kenya Private Sector Alliance, Kenya Editors Guild President Churchill Otieno said the questions posed will guide the discussions.

“We are opening up channels for Kenyans, especially in Nairobi, who wish to contribute to the questions of the debates. Those who prefer WhatsApp will use the phone number 0796560560, by SMS they use the code 22843 and by email they use info @debates.co.ke,” he said.

According to the chairman of Mkenya Daima, Vimal Shah, Kenyans must know that voting is their responsibility and that candidates must accept the will of Kenyans regardless of the outcome of the elections.

He said the debates will indicate the type of leaders who will come to lead the country and that Kenyans should post their questions to get a clear view of the plans they have for them.

“I appeal to those who come later to say that the candidate did not answer such and such a question, since there are platforms like WhatsApp and the SMS code, please post the questions and they will be answered”, she said.

Kenyans were urged to send in their questions before midnight on the day of the debate to ensure a dynamic and continuous flow of questions to be asked.

Churchill added that the debate would take place in two stages.

“The first tier will include gubernatorial candidates whose approval rating, based on three recent opinion polls, is less than 5%, while the second tier will include candidates who have achieved more than 5% in the polls. the same opinion polls,” he said.

The debate will take place with respect for the values ​​of fairness, integrity, independence and responsibility, the organizers promised.

Yankees’ Anthony Volpe and Rangers’ Jack Leiter will be teammates again thanks to MLB honor

0

Finally, former Delbarton teammates Anthony Volpe and Jack Leiter will be teammates again.

The duo will play for the American League at the 2022 MLB All-Star Futures Game in Los Angeles on July 16.

Volpe, the Yankees’ top shortstop prospect, and Leiter, the Rangers’ top pitching prospect, are best friends and played together until they graduated from Morris County High School in 2019 .

BUY MLB TICKETS: STUBHUB, VIVE SEATS, TICKETSMARTER, TICKETMASTER

The Yankees drafted Volpe in the first round in 2019. Leiter went to Vanderbilt and Texas drafted him in 2021.

Yankees prospects Jasson Dominguez, an outfielder, and starting pitcher Ken Waldichuk will also play in the game.

Baseball America ranks Volpe eighth among MLB prospects. Volpe, 21, hit just .244 with 11 home runs, 41 RBIs and a .786 OPS in 70 games at Double-A Somerset. But he’s been on fire since June 1, hitting .299 with six bombs and a .922 OPS in 30 games.

Dominguez, 19, hit .257 with eight home runs and 33 RBIs with a .793 OPS in 69 games at Low-A Tampa. Nicknamed “The Martian,” the Yankees gave Dominguez a record signing bonus of $5.1 million as a 16-year-old in the Dominican Republic in 2019.

Want to bet on MLB?

See Top NJ Sports Betting Sites

Waldichuk, 24, is 6-2 with a .199 ERA in 14 starts between Double-A and Triple-A Scranton/Wilkes-Barre. At Double-A, he was 4-0 with a 1.88 ERA. At Triple-A, he went 2-2 with a 2.52 ERA. The Yankees drafted the left-hander in the fifth round in 2019 from Saint Mary’s College of California.

Leiter, 22, is 2-6 with a 5.36 ERA in 13 games (12 starts) at Double-A Frisco in his first professional season.

Please subscribe to us now and support the local journalism YOU rely on and trust.

Brendan Kuty can be reached at [email protected].

How to Check Matric Results Online, Sarkari Result, indiaresult.com

0

Candidates can also check their results by SMS. According to the Minister of School and Mass Education Department, Samir Ranjan Dash, the high school exam result will be uploaded to the website within an hour of the results being released.

BSE Odisha class 10 board exams were conducted between April 29 to May 6, 2022 between 8 a.m. to 11 a.m. The board had changed the matrix exam model this year. The tests were held on 80 points for all subjects except professional trades and the third language.

BSE Odisha Class 10th Result 2022: How to Check Via Website

Step 1: Visit the official website — bseodisha.nic.in

Step 2: Click on the link “BSE Class 10 result 2022” available on the homepage

Step 3: You will be redirected to a new page

Step 4: Log in using registration number and personnel number

Step 5: The result will appear on the screen

Download and print the result for future reference.

BSE Odisha Class 10th Result 2022: How to Check via SMS

Class 10 students can also check their results by SMS. To check the result by SMS, students must follow the format given:

Step 1: Type OR10

Step 2: Text 5676750.

Step 3: Odisha Table Class 10 results will be available on the same mobile number.

Download and print the result for later.

In 2021, a total number of 2,80,352 boys and 2,81,658 girls were passed. The overall pass percentage was 97.89%. The board had canceled madhyamik exams in the state due to an increase in Covid cases and the students were assessed on the basis of alternative assessment criteria.

Why and how to improve web accessibility

0
Listen

NEW! Listen to the article

In our digital-driven society, as marketers, we are creating more content online than ever. But are we doing everything we can to ensure that our content is accessible to all users of all abilities?

For far too many of us, the answer is no.

Most online content contains accessibility barriers for people with disabilities, preventing them from participating in the digital experiences we create. Additionally, accessibility barriers reduce usability for all users.

Examples of barriers include sites that are not structured properly to allow navigation and logical reading order for a blind visitor using a screen reader; experiences that cannot be navigated successfully using a keyboard instead of a mouse for users with limited mobility or other physical challenges; and the lack of captions, transcripts and descriptive text for deaf users.

In the United States alone, 61 million adults, or more than 25% of the population, identify as having some form of disability. This is a significant proportion of our audiences, and they have the right to have equal access to both physical venues and digital experiences.

In a time when online interaction is more important than ever, it’s essential to ensure that every element of your digital campaign is accessible so you can reach your maximum audience.

Diversity, Equity and Inclusion

Brands and consumers increasingly value a commitment to diversity, equity and inclusion (DEI). Digital accessibility is a major component of DEI initiatives as it provides equal access and engagement opportunities for people with disabilities.

Additionally, disability affects all demographics, so ensuring digital experiences are accessible helps ensure engagement of a diverse group of consumers.

Legal obligation

Accessibility is also a legal obligation. The Americans with Disabilities Act (ADA) applies to digital experiences, based on consensus case law and the perspective of the Department of Justice.

From 2017 to 2021, over 10,000 ADA lawsuits have been filed. In 2020 alone, approximately 265,000 ADA request letters were sent regarding digital accessibility issues.

Inclusive Content Design: A Guide

So where do you start when creating an inclusive campaign?

First consider the wide range of disabilities. Some people may be blind or partially sighted; others may be deaf or have partial hearing loss. Cognitive disabilities and mobility impairments can affect how quickly a person is able to consume content or affect the ability to navigate content and use a mouse.

Understanding the many types of disabilities and what creates a welcoming experience for all users will inform your creative design and development processes.

Campaign planning

Before you start, ask yourself: Is there an opportunity to include people with disabilities in our campaign? Authentic inclusive portrayal in advertising places a diverse group of people in a positive light, undermining the stigma often associated with disability.

Take, for example, the Facebook portal ad “Share Something Real” which captures communication between two deaf sisters. The ad highlights the power of real conversations, including those in visual rather than spoken language.

When customers can naturally see themselves in your campaign, they are more connected to it, which is likely to make your message “stick”.

Video

Multifaceted campaigns often include video elements. When producing video content, ensure that it is accessible to people who are blind or partially sighted, people who are deaf or have partial hearing loss, and those with cognitive disabilities.

Consider…

  • Enable closed captioning for people who are deaf or hard of hearing
  • Including audio descriptions (describing on-screen visuals) for those who are blind or visually impaired
  • Avoid bright flashes when possible, or adhere to the “three flashes” rule (no content that flashes more than three times in one second) to avoid inducing a seizure
  • Including sign language interpretation for pre-recorded content
  • Selecting a video player that can be controlled by audio command or without a mouse

Websites and Landing Pages

The accessibility of your website or landing page impacts your conversions. When users encounter obstacles, they can bounce off your page, rendering your marketing efforts ineffective.

Consider doing the following when designing websites and landing pages:

  • Establish a clear header structure so that someone using assistive technology, like a screen reader, can logically navigate your page.
  • Make sure all non-decorative images have alt text so that a screen reader user who can’t see the featured images knows their meaning (especially important on e-commerce sites).
  • Be aware of your color contrast (the difference between a foreground color and its background). If there is not enough contrast, a visually impaired or color blind person may miss the content completely.
  • Label all your controls (everything a user interacts with): buttons, text boxes, checkboxes, etc. This will ensure that users understand the purpose of the controls and can navigate them successfully when using a screen reader.
  • If a control is an image (for example, a shopping cart icon), provide alt text so that the control is discoverable and usable.
  • Make sure controls are properly sized and positioned to be usable by keyboard, mouse, touch, and assistive technologies. Controls that are small or those that move can be difficult to interact with using alternate input technology.
  • Avoid auto-playing content that is difficult to control without a mouse and disrupts using a screen reader. If such content is unavoidable, provide the ability to stop or pause the video or audio.
  • Use jargon-free words in your messages that are easy to understand at all reading levels. It is best to keep sentences and paragraphs concise.

E-mail

An effective campaign often includes multiple email touchpoints. Are your emails accessible?

Similar to your website, consider doing the following when creating inclusive emails:

  • Make your subject line clear, and consider using a pre-header that screen readers can easily recite (much like Siri announces a text message you receive on your phone).
  • Avoid sending e-mails that only contain images without supporting text, even if they seem more aesthetic. In such a case, your image alt text should describe everything about the image, making it long and complex.
  • Make sure the color contrast is correct, even considering the color of your font against its background.
  • For longer messages, establish an appropriate header structure.
  • Keep your message simple and avoid using abbreviations whenever possible.
  • Use readable fonts and pay attention to text formatting if you have multiple paragraphs.
  • Make sure your hyperlinks describe where they lead a user. For example, the use of “click here” or “learn more” gives no indication of the content to which a user will be redirected.

Accessible experiences are more usable experiences

A commitment to an accessible experience at every touchpoint in your campaign ensures that your customers can fully engage with it, maximizing your marketing impact. It also means that they won’t hit any obstacles and opt for a more accessible competitor.

Additionally, when you make different elements of your campaign accessible to customers with disabilities, you improve the customer experience. all user. For example, video captions not only benefit people who are deaf or hard of hearing but also viewers in a noisy airport, for example, or those who retain information better when reading.

Accessible digital experiences are more usable experiences. Accessible content is beautiful content. By taking a moment to review a few simple checks and balances when planning, you’ll ensure maximum reach and effectiveness for your content and contribute to a more inclusive Internet.

More web accessibility resources

Why you need to create accessible videos

Professional Live Captions or Automatic Live Captions: Which is Right for You?

Do marketers consider accessibility when creating email campaigns?

Glia improves outbound texting and calling to help businesses proactively engage consumers with channelless digital customer service

0

Glia, the leading digital customer service (DCS) provider, has extended the proactive outbound capabilities of its DCS platform with two new features:SMS without channel and ChannelLess outgoing calls.

Both allow service representatives to contact customers and easily add richer digital channels, such as chat, voice or screen video, without interrupting the connection.

“Our customers have been incredibly responsive to texting, especially our QR code promotions at sporting events and service options at car dealerships. We’re excited to take our texting capabilities to the next level with the outbound capabilities of Glia, directly tied to our digital customer service platform, we see a significant opportunity to become very proactive and grow our business,” said Jeff Ward, Chief Technology Officer at SimplyIOA.

SMS and the ChannelLess benefit

Canal of GliaLess The architecture overcomes omnichannel limitations by fully integrating all communication channels, including SMS, into a single platform. This allows for easy channel-to-channel transitions and unified administration across all customer engagement.

With Glia, businesses can proactively reach out to their customers and initiate seamless engagement that can start with SMS. Customers are not required to make a phone call to continue service. All engagement remains digital, shifting to chat, voice or on-screen video for real-time support and can include connavigation for on-screen collaboration.

Glia’s ChannelLess SMS connects customers to the same service representative who sent them an SMS via affinity routing. It also includes tools to help service reps further accelerate engagements, including auto-complete, pop-up messages, and automation capabilities through AI and chatbots.

In addition to a better on-screen experience, Glia’s seamless digital customer service platform dramatically improves engagement security. SMS messages are not encrypted, which makes them vulnerable to data breaches and identity theft. Glia’s chat, voice, and OnScreen video have end-to-end encryption to protect sensitive data.

Outbound calls go digital with a channelless approach

Businesses can now proactively reach their customers over the phone and drive them to fully digital engagement with Glia’s enhanced ChannelLess calling feature. By accessing a computer or mobile screen, customers can continue engagement digitally, via chat or video, without hanging up and starting over. This is especially useful for complex tasks where digital guidance with CoBrowsing and online collaboration is easier than talking to a customer through multiple steps on the phone.

ChannelLess SMS and outgoing calls from Glia help companies to:

  • Speed ​​up application processes, such as loans, credit cards or opening new accounts
  • Discreetly manage disputes and collections
  • Promote outbound marketing offers
  • Immediately manage alerts and notifications

“We continue to build on our mature digital customer service platform and deliver new features to further enhance the online experience. Increasingly, companies are looking to become proactive; Glia allows organizations to initiate a conversation via text or even a phone call and keep customers on screen for a seamless digital experience that can include secure chat, voice and on-screen video,” said said Justin DiPietro, co-founder and chief strategy officer of Glia.

Glia’s seamless SMS and outbound call capabilities are available today and already in production with Glia customers. For more information and to see how Glia can help your organization, visit the SMS solution page.

About Glia

Glia is reinventing the way companies support their customers in a digital world. Glia’s Digital Customer Service (DCS) solution enriches web and mobile experiences with digital communication choices, on-screen collaboration and AI-powered assistance. Glia has partnered with over 300 banks, credit unions, insurance companies and other financial institutions worldwide to improve customer experience and drive business results. Named both a Deloitte Technology Fast 500™ company and a Great Place to Work (with a 97% employee satisfaction rating) for a second consecutive year, Glia continues to achieve broad industry recognition and thought leadership in in customer service, including publishing the definitive book on DEC with Wiley. The company has raised over $150 million in funding from top investors.

To find out more visit glia.com.

Funeral services honor Lee County Commissioner Frank Mann

0

FORT MYERS, Fla. — Lee County Fire Commissioner Frank Mann was laid to rest Saturday. His funeral was held at the Covenant Presbyterian Church in Fort Myers. According to the church pastor, Mann helped organize his own memorial service. Many people from the community were present.

“We are here to mourn our great loss of Commissioner Frank Mann,” said Sheriff Carmine Marceno, of the Lee County Sheriff’s Office. “Everything he did was public service. He’s a legend.

Mann left video messages to stream for everyone who attended his funeral. In some of the videos, he described why he chose specific scriptures and hymns.

“I exist therefore I was created and that’s what I love about this next song because it’s about the relationship between me and my creator because no matter how bad things get, no matter how good things are, he, my maker is still here.”

Mann began working in public service in 1974, serving eight years in the Florida House of Representatives and four years in the Florida Senate, representing several southwest Florida counties, officials said.

Many have praised Mann and his accomplishments, but also the fact that they will forever remember his southern accent and his willingness to forge his own path.

“A great legend here in Lee County. I have enjoyed working with him over the past 10 years and his decades of service here in Lee County you can see wherever you go,” said Lee County Commissioner Cecil Pendergrass.

“I look at conservation, I think of Frank Mann and what we tried to do in 2020 and everything we tried to accomplish. He was obviously really there and still defending. It was great working with him,” said Lee County Commissioner Kevin Ruane.

“I mean it doesn’t even feel real yet. I expect him to be there at the next meeting and I know he won’t be and therefore the next meeting will be different without him,” said Lee County District 4 Commissioner Brian Hamman. .

Mann’s eldest son, Frank Jr. spoke to the crowd and even made them laugh.

“I came across a quote the other day and I just knew I had to use it because it’s almost eerily real until today. It’s from Winston Churchill. He said I’m ready to meet my creator, whether my creator is prepared for the great test of meeting me is another matter.

Along with his final farewell video, Mann left this message.

“This is my sadness, this is my last farewell and my last thank you and my last I love you to my beloved Marie Lee. It will be followed by the blessing. Thank you very much to all, ”said Mann in the video.

Officials said Mann died aged 80 at his home in Alva. He died after a battle with pancreatic cancer.

4 men convert duped money into cryptocurrency to hide lead, outfit

0

Four men have been arrested in Chittorgarh of Rajasthan for allegedly deceiving people under the guise of getting loans online and converting the defrauded amount into cryptocurrency.

Police are contacting the National Cybercrime Reporting Portal for more details of the accused, Chittorgarh residents Deepak Patwa (23), Dev Kishan (32), Suresh Singh (45) and Sunil Kumar Khatik (34) years), resident of Madhya Pradesh, and seek plaintiffs. Law enforcement sources said the accused could have duped hundreds based on the recoveries – 15 debit cards, seven cell phones, 27 SIM cards, a dongle, a laptop, a tablet, six checkbooks, a car BMW, five booklets and Rs 20,000 – and even bought the car with the duped money.

DCP (Rohini) Pranav Tayal said: “Defendant used to get money by deceiving several owners of bank accounts through UPI. They then converted it into cryptocurrency through an online exchange. Patwa received a cryptocurrency commission and traded it directly to her account and through hawala transactions.

According to the police, they received a complaint from a man from Rohini Cyber ​​Police Station who alleged he had been defrauded based on an online loan offer. He received an SMS with a link that his loan had been approved with a limit starting at Rs 2 lakh. When he clicked on the link and downloaded the basic details, he received a call through a messaging app and was asked to deposit 5% of the loan amount and that he would be repaid later. After the plaintiff deposited Rs 40,000, he received no response.

Buy now | Our best subscription plan now has a special price

Police said the suspects had been identified, located in Chittorgarh and apprehended. Police said the defrauded money was transferred to accounts at MP’s Neemuch. They added that Rs 75 lakh was transferred in two days and the cryptocurrency was purchased on multiple platforms.

DCP Tayal said: “The defendants were looking for an idea to fool as many people as possible using an easy trick. They found a YouTube video where they learned how to trick people under the guise of providing loans online. They were looking for more information when they met a Chinese national on (the messaging app). The defendant, Deepak, would take this man’s advice on how to deceive people…. The accused was converting all the cheated money… on a crypto platform. The cryptocurrency was then transferred to his other associates who cashed it using hawala channels. They thought it would be an easy way to hide the money trail.

An FIR has been registered under IPC Section 419 (cheating by impersonation) and 420 (cheating to induce delivery of goods), police said.

Family still seeks answers to death of 19-year-old National Guardsman | Latin Voice | Chicago News

0

A family is still searching for answers as to why a 19-year-old National Guard member was killed in the Belmont Cragin neighborhood last summer.

His family is now demanding that Cook County State’s Attorney Kim Foxx’s office re-evaluate the case.

Lourdes Lara still visits her son’s grave every day.

“He was at a time in his life when he was young. He was just starting to live,” Lara says of her son.

There are days when she puts on some music and spends time watering the flowers at her burial site.

“Last year, around this time, we were preparing to welcome him home,” Lara said. “Glad he’s coming home and our lives have changed forever.”

Chrys Carvajal, 19, had graduated from National Guard training and was to be stationed at a military base in Riverside. Last summer, he was shot on the July 4 weekend.

“He was invited to a party with his girlfriend. At one point he decides to go to his car and he was three cars away from his when he fell to the ground,” Lara said.

According to police reports, Carvajal was shot on July 3 in a drive-by shooting. Her family says detectives collected evidence, including testimony, but prosecutors and Foxx’s office declined to press charges.

“His team decided that even with all the evidence, witnesses and a named person, it was still not enough,” said Jennifer Ramirez, Carvajal’s sister. “We have camera footage, we have city camera footage…so we don’t understand.”

In a statement, the Cook County State’s Attorney’s Office said it has reviewed the information presented by police and, “At this time, it has been determined that there is insufficient evidence to discharge our charge of evidence to file murder charges.”

Nearly a year later, the family brings in Foxx to review the case.

“My brother Chrys Carvajal took an oath to serve and protect this country, this community,” Ramirez said. “He was also working to become a Chicago police officer. He was going to serve and protect your city, the least you can do is do justice.

Veteran Marcos Torres never met the youngster but worked with the family to bring justice to the case.

“What is the message we are sending to our citizens here in Chicago if you do the right thing, if you serve your county and get killed right here on your own streets and the people charged with prosecuting, not prosecuting said Torres.

Ramirez says she wants the world to remember her younger brother as the hardworking and loving young man he was.

“We want young people to follow in his footsteps. He had a bright future ahead of him and he was working towards his goals and even though his life was cut short, he achieved many of those goals and one of them was to join the National Guard,” he said. she declared.

As Lara flips through a photo album of her son, you can see a glimpse into Chris’ life. A life, Lara says, filled with family and friends.

“No matter what I do, my son is not coming back,” Lara said. “I would give my life for my son to come back.”

As the family prepares to gather for a memorial service this weekend, a grieving mother clings to her faith that justice will come.

“We take it one day at a time. The message I want to convey to young people is not to give up. You are a voice for this city and your community,” Lara said. “Keep chasing your dreams.”

The family is offering a $25,000 reward for any further information leading to an arrest.


Why and how are governments suspending the internet in India?

0

After the brutal camera murder of tailor Kanhaiyalal Teli in Udaipur by two men, the government of Rajasthan has banned internet services. Shut down internet as an administrative or public order measure has been a common measure taken all over India – for various reasons and by almost all political parties and governments.

There are no official data on the number of stoppages but according to estimates by research organizations, it seems that their frequency has increased in recent years. A growing number of people have been affected as a result as internet usage has increased in India and the coronavirus pandemic has made it even more of a commonly used essential service.

How do internet shutdowns affect people and why do governments impose them?

What does the data on Internet suspensions say?

According to the Software Freedom Law Center (SFLC), a legal service organization working in this field in India, since 2012, there have been 665 internet shutdowns in India nowadays. Here, “shutdowns” means a complete ban on mobile (3G, 4G/LTE) or fixed (dial-up, wired/wireless broadband) internet, both or either of which can be shut down.

According to internet freedom and technology policy organisations, India is the top country (by number) for internet disruption incidents and frequency of shutdowns. This year, 59 closures have been imposed, according to SFLC, which determines closures based on government orders and media reports.

This raises another question: Internet shutdowns aren’t always officially announced, so it can be difficult to know if your phone is just not working properly or if a shutdown is in place. Raman Jit Singh Chima, senior international lawyer at Access Now, which works to secure an “open internet”, told The Indian Express that some telecom companies in states like Rajasthan are alerting people via SMS, but this it’s not mandatory.

Jammu and Kashmir has seen over 411 lockdowns since 2012, with the longest lasting over 552 days after the former state’s special status was revoked.

Among the states, Rajasthan has seen the most lockdowns – with 88 such cases in almost 10 years. The reasons range from protests by the Gujjar community for the reservation to preventing cheating during the Rajasthan Teacher Eligibility Examination (REET) held to select primary school teachers last year, which was taken by about 16 lakh seekers.

How do governments justify shutting down the internet?

Governments claim that misinformation and rumors can lead to a breakdown of law and order in an area, so curbing the flow of information helps maintain peace between communities in times of crisis.

But many experts have countered that in the absence of sources of information like the media, rumors may actually end up spreading even more. Additionally, important services such as those related to payments, banking, and access to education are all cut off in an instant, leading to multi-level disruption and economic loss.

What is the procedure for shutting down the Internet?

In February 2022, Lok Sabha MP Varun Gandhi asked parliament whether the government keeps records of closures or intends to, and if not, what protocol is followed.

Minister of State for Communications Devusinh Chauhan responded that the States Review Committee, chaired by the Chief Secretary (the highest official of a state) is mandated by the rules for temporary suspension of telecommunications services (public emergency or public safety), 2017, to decide that the stops were made according to the rules.

Rules drawn up by the central government state that temporary suspensions can be “due to public emergency or public safety” and give senior Home Office officials at central and state levels the power to order closures.

Newsletter | Click to get the best explainers of the day delivered to your inbox

Before the rules came into effect in 2017, internet shutdowns were ordered under Section 144 of the Code of Criminal Procedure, which gives district magistrates sweeping powers in dangerous situations.

So what is the debate about closures?

Anuradha Bhasin, a Kashmiri journalist, has petitioned the Supreme Court over the Internet shutdown in Jammu and Kashmir, which she says has brought a halt to newspaper printing work and life in general .

In its order issued in January 2020, the court ruled that “freedom of speech and expression and the freedom to practice any profession or to carry on any trade, business or occupation on the medium of the Internet enjoys a constitutional protection under Article 19(1)(a) and Article 19(1)(g)”.

The court ordered the J&K administration to “immediately review all internet service suspension orders” because “an indefinite suspension order for internet services is unconscionable.”

He said that “the restriction of these fundamental rights must be in accordance with the mandate provided for in Article 19 (2) and (6) of the Constitution, including the test of proportionality”.

The court ordered the government to compulsorily publish all orders allowing internet shutdowns, paving the way for the first time for the suspension orders to be challenged in court. In December 2019, the High Court in Gauhati ordered the government of Assam to restore the internet to the state after reviewing the suspension orders.

In December 2021, Parliament’s Standing Committee on Communications and Information Technology, led by Congress Leader Shashi Tharoor, said: “…Governments have resorted to telecommunications/internet shutdowns for reasons not so pressing and have regularly used it as a tool for routine policing and even for administrative purposes, such as preventing exam cheating to defuse local crime, which are not large-scale public safety issues and certainly do not constitute a “public emergency”.

The Home Office told the committee: ‘The phrase public emergency has not been defined in law, but contours broadly delineating its scope and characteristics are discernible from the section which is to be read in general. The competent authority must form an opinion on the occurrence of a state of public emergency with a view to taking further action under this article. »

Some of the committee’s suggestions included defining terms such as “public emergency” to avoid their use without cause. He added that some apps or websites could be banned, such as WhatsApp, where the possibility of rumors being widely circulated is high, while other internet services could remain available to users.

Los Angeles appoints city’s 1st heat manager as extreme weather becomes more common

0

As a child growing up in San Jose, California, Marta Segura heard horrific stories from her parents of women fainting on factory lines and overheated men in farm fields. Little did they know that these jobs exposed them to life-threatening conditions.

Then it hit home.

“My father, himself, got very sick once and almost died,” said Segura, 58, the daughter of a bracelet and a cannery worker. “It marked me when I was a child.”

Segura, who serves as director of the Los Angeles Climate Emergency Mobilization Office within the Department of Public Works, received a second title this month: chief heat officer, the city’s first. She joins a number of heat workers around the world in cities from Athens, Greece, to Santiago, Chile, begin to coordinate a better response to extreme heat, and develop sustainable cooling strategies. Phoenix and Miami are the only other US cities with heat agents.

As Los Angeles continues to experience more frequent heat waves, Segura will work with all city departments to help create an early warning system for heat waves and develop long-term strategies to reduce exposure. to heat, such as planting trees and updating building codes. His office will also launch a social media campaign in July in English and Spanish.

City of Portland cancels tree planting contract with Friends of Trees

Extreme weather conditions can cause cramps, strokes and heat exhaustion. Extreme heat has contributed to the deaths of about 12,000 people in the United States each year from 2010 to 2020, according to a study by the University of Washington. These numbers are likely to increase.

According to researchers from the School of Global Policy and Strategy at the University of California, San Diego, low-income, majority-minority neighborhoods experience significantly more heat than wealthier, whiter neighborhoods. Research shows that surface temperatures in communities with higher poverty rates can be up to 7 degrees Fahrenheit warmer, compared to wealthier neighborhoods, during the summer.

“South Los Angeles neighborhoods send 20 to 30 more people to the ER on hot days, compared to 2 more people in wealthier neighborhoods,” said Dr. David Eisenman, director of UCLA’s Center for Public Health and Disasters. . Eisenman will work with Segura to identify climate-vulnerable communities.

Heat ER visits skyrocketed in Portland’s heated dome in 2021

Segura takes on his new post as state lawmakers consider expanding heat warnings. Assembly Bill 2076 would create California’s first heat officer position and create a statewide extreme heat and community resilience program. Assembly Bill 2238 would create the nation’s first warning system for heat waves, much like existing systems warn of other natural disasters such as wildfires, tornadoes and hurricanes.

KHN reporter Heidi de Marco met with Segura in her town hall office to discuss her new role and how she plans to tackle the city’s climate risk. The interview has been edited for length and clarity.

Q: Why was this position created?

We have seen a fivefold increase in extreme heat events and heat waves. There are more heat-related illnesses and more hospitalizations and deaths.

There are two objectives. The first concerns changes to the system — the city’s services and infrastructure. The other is education and awareness — that people know oppressive heat is more serious so they can take steps to protect themselves.

We’re tackling education with an extreme heat campaign launching July 1. In terms of changing the system and services, the city is painting rooftops and roads with cool white[ing] paint, plant more trees for maximum shade in vulnerable communities.

Q: You will work to reduce heat-related hospitalizations and deaths, as well as work with various city agencies to implement a heat action plan. How will this work?

We are already discussing updating our building codes for decarbonization and climate adaptation.

The other approach is through public works. For example, installing more shade structures, more kiosks, especially for subway and bus transportation furniture. They are also installing more hydration stations.

So when you add that to our public amenities — parks, libraries, youth centers, all of which are accessible during the day — you have plenty of opportunities to tell people where to go in the event of a heat storm or heat wave.

Q: How do you intend to fight against inequalities?

It keeps me up at night. Addressing the most vulnerable community is not out of charity. And it’s not for moral reasons. That’s because if we don’t help LA’s most vulnerable communities, which make up more than 50% of the population, we won’t get to our climate solutions.

Landlords are less likely to invest in heat pumps or other air conditioning systems, as this would only increase rent and rent would displace individuals. So we need a policy in the city of Los Angeles that prevents displacement and helps in some way to subsidize these low-income housing units or find financing structures that allow landlords to invest and keep our healthy and safe families.

Q: Is there a particular challenge in sending messages to immigrant communities?

I think what I’ve learned in my family is that we tend to turn on the radio while we’re doing our jobs. It will therefore be important to use the radio. It will also be important to use text messaging services, such as WhatsApp.

We want to make sure we get that information out to employers, so we probably need to come up with culturally relevant communications. It is an evolving campaign.

Q: What type of budget do you work with?

We will allocate approximately 30% of our budget to heat risk prevention work, and although our budget is not large, our impact on other partner services, such as public works and the emergency management service, is significant.

We cannot look at my budget in silos since the town hall has ordered us to work together to consolidate the respective shares of our budgets for the prevention of heat risk. However, I can say that my desktop will double in size from four to eight [employees]and it will give us the leverage and resources we need to have the kind of impact the City of Los Angeles seeks to have in the long term.

Q: How do you plan to reach out to the homeless community?

What we would actually like are more pop-up units, where we have canopies and hydration.

So this is a conversation I’m having with our deputy mayor of homelessness and housing so that we can coordinate together. And that’s a good example of something my office can’t do alone because I need their expertise and allocated resources to ensure that we provide the best comprehensive resources available to the city.

Q: You are the first Latina to hold such a position in the United States. What does it do?

It matters because [Latinos] have suffered disproportionately from the vagaries of the weather for a very long time, and we have never had positions like this in the past. If they see someone from their community, or who looks like they belong to their community, who speaks their language, who is culturally related to them, who has had similar experiences, I think that makes a big difference, isn’t- it not?

This story was produced by KHNwho publishes California Healthlinean editorially independent service California Health Care Foundation.

Auburn Athletics unveils SPIRIT Exchange as part of its NIL program

0

AUBURN, Alabama – Auburn Athletics, in conjunction with the INFLCR, announced the launch of the SPIRIT Exchange to expand its ongoing Name, Image and Likeness (NIL) program for student-athletes. The SPIRIT exchange is the latest innovation to help Auburn student-athletes maximize NIL opportunities.

This streamlined, easy-to-navigate platform is a free service for student-athletes and third parties. It serves as a directory and personalized portal to connect businesses, collectives, donors, alumni and fans with student-athletes to explore, negotiate and close NIL deals.

“At Auburn, we remain committed to being the leader in the NIL space by providing additional resources to our student-athletes to maximize their NIL potential,” the athletic director said. Allen Green. “As the NIL landscape continues to evolve, we are committed to evolving as well. Unlocking this marketplace functionality through SPIRIT Exchange enhances our partnership with INFCLR and, most importantly, provides student-athletes with a key one-stop-shop in hand for all that concerns NIL.”

The SPIRIT Exchange is a NIL business registry for student-athletes tailor-made for corporations, collectives, donors, alumni, fans and others wishing to connect specifically with student-athletes at the University from Auburn. Once a company, collective, or individual registers with SPIRIT Exchange, they can access a searchable database of Auburn student-athletes and filter that database by a variety of criteria. They can message the student-athlete directly in the app or request the student-athlete’s contact information (or that of their representative) to start a discussion about an NIL transaction. INFLCR and Auburn will not be involved in any of the negotiations.

Once a NIL agreement is reached, a personalized reporting form, following Auburn Athletics name, image and likeness guidelines, is generated and submitted to the institution. The platform also includes a payment processing tool to securely pay student-athletes and will consolidate into a 1099 form found in the student-athlete’s INFLCR application for more efficient tax reporting.

Companies, collectives or individuals can register now on auspiritexchange.com. Auburn will include all student-athletes, who may opt out if they choose not to participate.

“The Auburn Tigers were one of the first INFLCR customers in 2017 and more recently provided key insights into the needs of the INFLCR+ local exchange as it was built. So we’re excited to announce finally the SPIRIT exchange, an extension of their NIL program,” said INFLCR President Jim Cavale. “One year after announcing the SPIRIT NIL program powered by Auburn’s INFLCR, it’s important for us to continue to provide best-in-class resources to this program, including the exchange platform for student-athletes to capitalize on the personal brands that SPIRIT has helped them build without increasing transaction fees.”

About SPIRIT

In 2021, Auburn Athletics announced the launch of SPIRIT, a comprehensive Name, Image and Likeness (NIL) program designed to educate and empower student-athletes and prepare them to optimize NIL opportunities. For more information, visit auburntigers.com/spirit.

About INFLCR

INFLCR, a Teamworks product, is NIL’s leading athlete branding and business management application for elite sports organizations. The INFLCR Athlete App educates student-athletes, coaches, and staff for the NIL era in a safe and compliant environment, all powered by best-in-class content delivery for student-athletes to access and share content on their social networks. The INFLCR works with more than 250 collegiate and professional sports organizations.

Impactful features like the INFLCR’s local and global exchange provide local and national businesses with the ability to find, communicate, pay, and report NIL transactions with student-athletes, maximizing their NIL earning potential with simplified reports for their establishment and personal tax returns.

Visit inflcr.com for more information.

5 Key Financial Changes Take Effect From Today (July 1)

0
New Delhi: The coming month could bring a number of financial changes for individuals and taxpayers. Changes range from new credit card rules, entry into force of cryptocurrency TDS, double penalty amount on PAN-Aadhaar bond, change in savings rates, and more. .

Before we enter July, here is an overview of the main financial changes that are expected to have an impact from next month:

TDS on cryptocurrency, VDA

As announced in this year’s Union budget, the Center issued a circular on June 22 detailing the tax deduction process for transfers of virtual digital assets (VDAs) and cryptocurrencies from July 1, 2022. Now, the buyer of a VDA will have to deduct 1% of the amount paid to the seller as income tax withheld at source (TDS).

Tax must be deducted when crediting the amount or when paying to the resident individual, whichever comes first. The CBDT clarified that the tax will only be deducted if the amount paid exceeds the specified limit of Rs 10,000. The threshold limit for TDS would be Rs 50,000 per annum for specified persons.

New credit card rules

Credit Card Billing – In order to avoid repeated complaints about late billing, the Reserve Bank of India has stated that the card issuer may offer to issue bills and account statements via internet/mobile banking with the informed authorization of the card holder. Additionally, card issuers must have a system in place to ensure that the cardholder receives the billing statement.

Credit card closure – Banks are required to honor credit card cancellation requests by immediately contacting the customer via email, text message or another channel.

New labor code

Although the Center has not made any official announcement on the implementation of the new labor code, reports claim that it could come into effect from July 1. The introduction of the new labor code might lower the number of working days in a week, but the daily working hours may increase accordingly. The salary in hand of the employees could undergo a significant change because the code prescribes an increase in the contribution of the employee to the Provident Fund.

The new rules state that an employee’s base salary must be at least 50 percent of their gross monthly salary, resulting in an increase in the FP contribution paid by employees as well as employers.

PAN- Aadhaar connecting well

Anyone linking their PAN to Aadhaar from July 1, 2022 will be assessed a penalty of Rs 1,000. This is double the fine that was imposed for linking the two documents from April 1, 2022 to June 30, 2022.

Interest rates for small savings plans

For the first quarter of FY23, the government has decided to keep interest rates on government-guaranteed savings instruments unchanged. The interest rate of the various small savings plans for the first quarter of the financial year 2022-23 starting on April 1, 2022 and ending on June 30, 2022 remained unchanged compared to the rates applicable for the fourth quarter of the financial year 2021-22.

However, this could change for the next quarter and new rates could come into effect from July 1, to encourage investors in PPF, Sukanya Samriddhi Yojana and NSC.

KYC demat deadline

The deadline for making existing demat and trading accounts KYC compliant is June 30, 2022. A demat, trading account holder must update the following KYC attributes by June 30.

I) Last name

II) Address

III) STOVE

IV) Valid mobile number

V) Valid email id

VI) Income bracket

‘Zach Snyder’s Justice League’ digital release date and how to watch

0

The official title Zack Snyder’s Justice League is streaming now on HBO Max, and it’s coming digitally, so you won’t need a streaming subscription to own it.

The Snyder Cut is director Zack Snyder’s re-edited version of 2017’s Justice League, a project he left early because of a personal tragedy. Joss Whedon stepped in to complete the theatrical release, but after a years-long fan campaign and with cast supportHBO Max gave Snyder a chance (and reported $70 million) to recreate his original footage in a longer version.

The result is a four hour director’s cutwith an R rating, a new score, finished visual effects, two new villains and Jared Leto reprising his role as the Joker.

Here’s how to watch Zack Snyder’s Justice League, aka The Snyder Cut.

How to watch Zack Snyder’s Justice League

Digital release date

The digital release date for Snyder Cut is July 19.

Blu-rays and DVDs

The film is available on DVD and Blu-ray. You can also get a Zack Snyder’s Justice League Trilogy Ultimate Collector’s Edition Blu-ray box set, which includes the movies Steel man, Batman V Superman Ultimate Edition (both theatrical and director’s cut of Dawn of Justice) and Zack Snyder’s long-running Justice League.

Streaming in the United States

You will need a subscription to HBO Max, which is currently $15 per month. It won’t cost you anything extra to catch the movie.

International

In countries like Australia, HBO Max is not readily available without a vpn. Snyder confirmed mid-last year that he was working with WarnerMedia and HBO Max on an international distribution plan. UK viewers can watch it on Sky Cinema and Now TV. It streams on Crave in Canada and on HBO GO in Asia, the Nordics, Central Europe, Spain and Portugal. Latin America will be able to access it when HBO Max launches in late 2021. HBO Max said more details are still to come for the rest of the world in the coming weeks.

Read more: The best VPN of 2021

HBO Max is currently in the process of closing a deal

If you don’t subscribe to the streaming service, HBO Max is currently working on a deal. Sign up for six months and you’ll get a 22% discount at $70. Not bad.

HBO subscribers get HBO Max for free

If you currently subscribe to HBO through your cable or satellite provider in the United States, you can probably get HBO Max without paying anything extra. The only difference is that you can’t watch HBO Max with most set-top boxes. The HBO Max app is available on Fire TV, Apple TV, Android TV, PlayStation, Xbox and many more devicesincluding Roku.

Roku users now have access to HBO Max

You read correctly. After months of delay, Roku is finally giving HBO Max access to its streaming devices and TVs. Roku users who already use the HBO app will be automatically upgraded to HBO Max. You can find more information here.

If you are not subscribed

Difficult to register? Here’s a long explainer on HBO Max, which has a huge library of other movies and programs you can check out, including Lovecraft Country, Rick and Morty, Studio Ghibli movies, and more. But last December, ideally before the release of Wonder Woman 1984, HBO Max announced that it will no longer offer a one-week free trial. Still, you can sign up and cancel after paying for a month if you realize you won’t watch the service enough to make it worthwhile.

Will it be available in 4K HDR?

After Wonder Woman 1984, The Snyder Cut will air in 4K UHD, HDR10, Dolby Vision and Dolby Atmos on supported devices. Not sure what this means for you? We break it down herebut essentially, if you have the right TV, streamer, or sound system, you can watch the movie with better picture quality and, in the case of Dolby Atmos, better sound.

How long is it available on HBO Max?

There is no limit to the time you have to watch the movie. Wonder Woman 1984 had a limited 31-day broadcast window, but Zack Snyder’s Justice League should be there to stream in your spare time.

What is the plot of the film?

Amid all the hubbub surrounding The Snyder Cut, you’d be forgiven for forgetting the overall plot of Justice League. After Batman v Superman in which – spoiler – Superman dies, Batman and Wonder Woman have assembled a team of heroes to take on the alien Steppenwolf and his monstrous troops in search of the three Mother Boxes. The Snyder Cut will flesh out the stories of all of these characters, including the rookie Cyborg, so it all makes sense. Aquaman, Flash, Lois Lane, Lex Luthor, Hippolyta and Martian Manhunter are among the list of gigantic characters.

Here is the trailer:

Evidence Contradicts Russian Claims of Kremenchuk Mall Attack | Ukraine

0

First-hand accounts from survivors and expert analysis have discredited Moscow’s account of deadly missile strikes on a shopping center in the Ukrainian city of Kremenchuk.

Igor Konashenkov, spokesman for the Russian Defense Ministry, said that his army had launched a “high-precision air attack on hangars where weapons and ammunition were stored”, and that the explosion of these caches of weapons had caused a fire in the nearby shopping centre. was “non-functional” at the time.

However, witness statements, information released by Ukrainian prosecutors and analyzes by independent military experts point to three possible misstatements in this account – that the Ukrainian military was hiding weapons nearby, that the mall was not a target and no one was using it.

Zelenskiy publishes images of a “deliberate” Russian strike on a shopping center – video

CCTV footage shows the first missile hit the mall at 3:51 p.m. Monday, and a second soon after hit a factory Moscow said was storing Western munitions.

Outside the mall, Ukrainian police set up a table to retrieve twisted pieces of a missile found inside. It is believed to have been a Russian X-22 cruise missile fired from a Tu-22M long-range bomber.

Ukrainian police display fragments of the X-22 missile found at the site. Photography: Alessio Mamo/Guardian

Satellite images show that the factory is 500 meters from the mall. According to independent military experts and researchers from Molfar, a global open-source intelligence community, the explosion could not have caused a fire powerful enough to reach another building so far away.

Satellite images showing the distance between the mall and the factory
Satellite images showing the distance between the mall and the factory. Photography: c/o Bellingcat

During a visit to the area between the mall and the factory, little or no damage to buildings or roads was observed, suggesting that no fires had spread.

Dozens of workers who survived, as well as witnesses who lived nearby, told the Guardian the mall was open and busy when it was attacked. The debris included the remains of the workers’ badges and products sold that day at the supermarket.

A phone message purportedly sent by local mall management on June 23 urging employees not to leave the mall in the event of air raid sirens
A phone message was reportedly sent by local mall management on June 23 urging employees not to leave the mall in the event of air raid sirens.

The Guardian saw a phone message purportedly sent by local mall management on June 23 urging employees not to leave the mall in the event of air raid sirens. “As of today, this mall will not be closing during aviation alarms,” ​​the post read. The mall is open from 8 a.m. to 9 p.m. No breaks.” At least five employees confirmed receiving the message.

Bellingcat, a nonprofit online journalism collective dedicated to investigating war crimes, has in recent days collected receipts from purchases at the mall that were posted on social media by Kremenchuk residents to show that the mall was actually open.

As for the alleged arms depot, the KredMash factory, Kremenchuk Road Machinery is a company producing equipment to repair and maintain roads or to repair vehicles used by construction workers.

A photo of Kremenchuk Road Machinery's KredMash plant after the attack
A photo of Kremenchuk Road Machinery’s KredMash plant after the attack. Photo: c/o Ukrainian State Emergency Service

Bellingcat said: “Although a 2014 report said the plant had been used to repair three military vehicles, this does not in itself prove that it was a storage site for weapons and American and European ammunition eight years later, as claimed by Russia.”

Company videos posted on YouTube by specialized construction companies show the presence of cranes and other equipment in the factory, which corroborated the account of the Ukrainian authorities.

According to various testimonies collected by the Guardian, the factory had been temporarily closed because of the war. It was guarded by a guard who ended his shift at 2 p.m., just before the strike.

Emergency aid for the victims of the earthquake in Afghanistan – Afghanistan

0

At least 1,000 people lost their lives and 1,500 people were injured in the 5.9 magnitude earthquake that struck Afghanistan’s Khost province. The IHH Humanitarian Relief Foundation immediately launched an emergency relief campaign for the area.

Reports indicate that Spirey province in Khost and Giyan, Ziruk and Naka provinces in Paktika were the most affected by the earthquake which struck early in the morning. It is reported that 1,000 people lost their lives and 1,500 were injured. Search and rescue operations are currently still ongoing in the affected locations.

Distribution of hot meals

IHH launched an emergency relief campaign soon after the earthquake. Two teams were quickly mobilized by IHH Afghanistan to be deployed to the disaster areas. In the first phase of operations, our teams distributed hot meals to 560 victims. 50 double blankets and 50 tents were also delivered. The IHH teams are continuing their operations to help the victims.

Many houses were damaged

Many houses were damaged by the earthquake which could also be felt in Kabul, the capital of Afghanistan and in Islamabad, the capital of Pakistan. Two earthquakes followed in western Punjab in Pakistan. Another 4.3 magnitude earthquake also hit the city of Faizabad in Afghanistan.

This earthquake hit the same area as many times in just one week.

Give support

Donors who wish to support the Afghan earthquake affected population through IHH can donate 10 TL by sending SMS through all operators sending SMS to AFGHANISTAN. Those wishing to contribute larger amounts can donate online through the IHH website or bank account numbers showing code AFGHANISTAN.

Disappearance of Raheem White: Toronto police appeal to the public

0

More than six months after Raheem White was last seen in Toronto’s Junction neighborhood, the Toronto Police Service (TPS) and Crime Stoppers have released a video in an effort to maintain awareness around the disappearance. and to encourage anyone with information to come forward.

White was last seen Dec. 1 in the Osler Street and Pelham Avenue neighborhood of Toronto around 3:30 p.m. wearing a black jacket, black pants, an orange toque and a black backpack, police said. He is described as a black man, six feet tall, weighing 200 pounds with an athletic build, brown eyes, and black hair worn in dreadlocks.

White was working as a delivery driver and DJ at the time of his disappearance, his relatives said, and intended to move in with his girlfriend.

A vehicle Raheem was driving at the time of his disappearance was located by investigators in a parking lot on Lakeshore Boulevard West near Sunnyside Beach with his wallet and personal effects inside, but his cell phone is still missing.


“Raheem has a large number of family members and friends who are very concerned for his well-being and are advocating for a safe return,” TPS Detective Constable Chriss Sukhdeo said in the video.

“The area where Raheem’s truck was found is a popular recreational trail and walk next year with cyclists, runners and dog owners,” he added, reminding the public if anyone has information for contacting the police.

Despite a significant public response to the disappearance, followed by a number of reported sightings, White remains missing. Police said they conducted extensive research on White, spoke to family and friends, contacted all major hospitals, twice searched local shelters and probed areas they knew White frequented, among “other investigative tools…which we do not disclose”.

They also said they had investigated “numerous separate sightings and conducted video searches”, none of which have been confirmed.

In May, CTV News Toronto spoke to White’s friends and family ahead of his six-month disappearance.

“It didn’t seem like anything was wrong,” said White’s former roommate and close friend Stefan Coward, who saw White two days before the disappearance. “There was no real indication, no real sign.”

INVESTIGATION

White’s mother, Rosemarie, told CTV News Toronto in May that she felt the police investigation had begun to stall.

She said she often receives messages from people claiming to have seen her son, but by the time the information is investigated, its relevance has diminished.

“Oh my god, I’ve had so many sightings,” she said in May. “There have been tips every week, people message me regularly.”

“But if [Raheem] is seen today, and [police] don’t get the message until four days later, [is he] going to be in the same place waiting for you? I do not think so.”

Rosemarie didn’t get an official interview with the force until May 11 – nearly six months after White disappeared.

When contacted for comment, a spokesperson for the Toronto Police Department confirmed to CTV News Toronto that Rosemarie participated in her first official interview with the force on May 11, but stressed that they were in ” weekly communication with [Raheem’s] mother.”

“The Toronto Police Service takes missing persons investigations very seriously and our officers are dedicated to locating people as quickly as possible, using significant resources from across the service to support our efforts,” it said. they stated.

Police are asking anyone with information regarding Raheem White’s whereabouts to contact the TPS Missing Persons Unit at 416-808-7411.

Viral Videos Claiming Anyone Can Steal Money From FASTags Are Fake: Here’s Why

0

In a public service announcement, the National Payments Corporation of India (NPCI) has demystified ‘Unsubstantiated and fake videos’ circulating on social media claiming to be careful driving on motorways as those claiming to clean car windows can defraud the owner by erasing the FASTag.

According to NPCI, no transactions can be executed through open internet connectivity. Multiple layers of security protocols are placed to ensure secure end-to-end transaction processing, he said. Here we explain why no one can steal your FASTags money.

FASTag uses RFID

FASTag uses Radio Frequency Identification (RFID) technology to communicate with a scanner installed at toll plazas. Once the car has passed the toll plaza, the required toll amount is automatically deducted from a bank account or prepaid wallet linked to the FASTag.

Vehicles must pass through the toll, and if the beacon is linked to a prepaid account like a wallet or debit/credit card, owners must top up/recharge the beacon. If linked to a savings account, the money will be automatically deducted when the balance falls below a predefined threshold. Once a vehicle passes the toll, the owner receives an SMS alert about the deduction. The alert is like money debited from accounts or wallets.

Works on P2M

FASTag can only be used for person-to-merchant (P2M) transactions, which means no person-to-person (P2P) transactions are allowed. “An individual cannot receive money into the NETC FASTag ecosystem from fraudulent transactions,” NCPI said in a statement.

Security

NPCI clarified that only Authorized System Integrators (SIs), who are authorized on behalf of dealerships, are permitted to perform and initiate payment transactions at toll plazas. The infrastructure deployed between the IS system, the dealer and the banks is secured by only whitelisting authorized IP addresses and URLs.

The hardware installed in the Toll Plaza server room is cryptographically secured through the Hardware Security Module (HSM). This ensures that no third party can interact with the system and that the transaction is carried out between the two parties.

Every API call must pass through a secure firewall. Each time the Bank connects to NPCI via API connectivity, the data is encrypted with a secure 256 SHA ECC algorithm and locked with a hexadecimal private key. Only NPCI possessing the corresponding public key will be able to access the information by decryption.

Unique Plaza Code

Each merchant (toll and parking stations) onboarded by NPCI is assigned a unique Plaza code. This is integrated only by authorized acquirer banks active on the FASTag ecosystem.

Each acquiring bank receives a unique acquiring identifier (AID). The combination of Plaza Code and Bank Acquirer ID is mapped to the NPCI end. This makes it impossible for anyone to register on the platform.

Looking for an abortion? Here’s how to avoid leaving a digital trail

0

Everything you do online is already tracked. This information is about to become even more sensitive if you are seeking an abortion in the United States.

Friday’s Supreme Court decision reversing the landmark abortion rights decision Roe v. Wade means 13 states could ban abortion within a month, and more could follow.

A Google search for a reproductive health clinic, an online order for abortion pills, a location ping to a doctor, and a text about the possibility of terminating a pregnancy could all become sources of evidence. People are constantly sharing data about their fertility online, say privacy advocates – even if they don’t realize it. Other obvious sources of health data include period-tracking apps and digital check-in forms at hospitals.

“People shouldn’t be responsible for doing everything perfectly, when they’re in a stressful situation, to protect their own privacy,” said India McKinney, director of federal affairs at privacy organization Electronic. Frontier Foundation. “Privacy is a basic human right, and it should be protected by law and statute.”

Here are the basic steps anyone can take to protect personal information when weighing an abortion.

– Limit who you talk to

Your biggest risk factor is other people. According to Farah Diaz-Tello, senior attorney and legal director of If/When/How, a nonprofit reproductive justice organization, many cases against people who have had abortions start with people they’ve told they have. report to law enforcement.

“The biggest vector of criminalization is the healthcare system,” Diaz-Tello said. The group has studied cases against people who have had abortions since 2000 and tracked how the process generally unfolds.

When someone goes to a healthcare provider for medical issues related to an abortion, healthcare professionals can report them to the police, who can then seize their phone or computer. With a device in hand, the police can simply check the browser and text messages directly.

Diaz-Tello recommends being judicious about what information you share in an emergency room or doctor’s office. A miscarriage and self-administered abortion using pills will look the same to most healthcare providers and require the same treatment, she said.

Also limit who you tell in your own life, including your friends or family. If you are experiencing threats from intimate partners, follow these steps to protect your communications and devices.

– Chat on a secure and encrypted messaging app

When discussing your situation, use private messaging apps that use encryption. Apple’s iMessage, Meta’s WhatsApp and Signal are all end-to-end encrypted by default, meaning messages are hidden from everyone but the sender and recipient.

Signal may be the safest option. Apple has the key to decrypt iMessages that are backed up using its iCloud service, and law enforcement could ask it to do so. WhatsApp, for its part, leaves room in its privacy policy to share data with Facebook’s parent company, Meta. Depending on the data he shares, this could pose privacy issues.

– Protect your devices

Remember that someone with access to your physical device can see your messages, whether they are encrypted or not. Don’t turn your phone or laptop over to law enforcement without a warrant, privacy experts advise, and turn off biometric authentication such as Face or Touch ID if you’re worried someone will force you to unlock them. Make sure your phone, tablet, and computers all require a passcode or password to use them. Avoid wearing wearable health tracking devices while managing your health.

– Browse the Internet safely

Your browsing activity can put you at risk in two ways: someone seeing it on your device and someone getting it from tech or ad tech companies, said Eric Rescorla, chief technology officer at Firefox.

Always use incognito or private browsing mode on your browser to avoid leaving a trace on your own devices. When choosing a browser, opt for Safari, Firefox, or Brave, all of which have robust privacy features. Make sure all options to prevent cross-site tracking are enabled, and instead of Google, use a search engine like DuckDuckGo or Brave.

To minimize what is logged on your browsing, use a VPN or Apple’s iCloud Private Relay, which acts as a more secure VPN. Avoid using third-party apps for searches. If you want an extra layer of protection, use Tor Browser, a tool for anonymous Internet use that conceals both your identity and your location, Rescorla said.

If you use Google, make sure you’re signed out of your account and have all of your privacy settings turned on. Confirm that all abortion clinic results are real and not fake “pregnancy crisis” centers. If it’s a Google ad, there should be a small line above the site name that says “Provides abortions” or “Does not provide abortions.” The National Abortion Federation has a list of approved providers on its site.

– Disable location sharing or leave your phone behind

Some apps collect your location throughout the day and night and share it with third parties, including data brokers, who sell that data to anyone who wants to pay. To turn off location sharing on an Apple device, go to Settings – Privacy – Location Services and toggle the slider to show gray. (Note that this will prevent location-dependent apps, such as Uber or Maps.) On an Android device, go to Settings – Location and toggle the switch to “off”.

Unfortunately, turning off location sharing won’t stop your mobile carrier from collecting your location. Jennifer Granick, surveillance and cybersecurity adviser at the American Civil Liberties Union, said a Faraday bag, which blocks electromagnetic fields, could help in cases where someone wants to keep their phone on them but prevent tracking of the location by service providers.

To really hide your location, the best thing to do is leave your phone at home or turn it off completely, McKinney said. You can also use a temporary “burner” phone. Don’t add any of your accounts, connect to your home WiFi or turn on Bluetooth, she added.

– Maximize your privacy settings

To ensure that your phone or social media sites collect as little data as possible, lock down your privacy settings. You can find a list of the biggest app and device options in our Privacy Reset Guide.

– Avoid period tracking apps

Trusting any app with sensitive medical information is a risk, especially if it’s not covered by HIPAA requirements. Each period tracking app has different privacy practices, and understanding the nuances can be tricky. A password-protected spreadsheet or paper calendar will be more useful.

If you decide to delete your policy-tracking app, consider submitting a data deletion request as well, said Alan Butler, executive director and president of the Electronic Privacy Information Center. Some companies only honor these requests from people in California due to state privacy law, but others accept requests from anywhere.

“The power of the state and federal government to obtain data right now is incredibly broad,” Butler said. “We haven’t seen new limits on access to government data in decades, which means the laws…have weakened as technology has evolved.”

– Limit where you share health information

Your dentist and even your workout instructor can give you forms asking if you are pregnant. If you’re not comfortable sharing, say so and reserve this conversation for a doctor you trust.

Recording software at your doctor’s office may have privacy flaws, The Washington Post reported. A consent form from recording software maker Phreesia, for example, gives them permission to use your data for marketing purposes. Select “no” on any data sharing prompts you see.

Push your healthcare and insurance providers about what they do with your information, such as date of last period or pregnancy status. Where is it recorded and stored, is it encrypted and how long does it keep? Review each document you sign to see if you are waiving your rights to your information or allowing it to be shared with other parties.

– Know physical surveillance technology

In some cases, law enforcement can extract data from license plate readers or facial recognition software systems that have been strategically placed along state borders, Granick said of the ACLU. If you need reproduction services, you may want to consider other modes of transportation than driving your own car, for example.

“People shouldn’t give up, even though it’s hard and may seem like a lot,” Granick said. “People should take advantage of what they can do while pushing the powers that be to do more.”

How to check PF (provident fund) balance, withdraw money. Lily

0

Simple ways to check your provident fund account balance and interest

Would you like to know how to check your provident fund (PF) balance and the interest transferred to your account? Continue reading.

Each employee should be updated on the Provident Fund (PF) balance, especially at the end of a financial year.

Each month, an employee contributes a fixed amount of 12% of their base salary to their PF account, and the employer also contributes an equal amount.

Although there are many ways to determine his PF account balance, let’s read about five simple methods to check it.

1. EPFO ​​website:
On the EPFO ​​website, click on ‘Member Passbook’ in the section for employees. You can view the PF passbook by logging in with your universal or UAN account number and password.

The distribution of contributions between the employee and the employer is visible as well as the opening and closing balance. PF interest earned and any PF transfer amount are also mentioned.

If more than one provident fund number is associated with your UAN, all of them will appear. You need to click on the specific member ID to know the balance of that PF account.

2. Unified Portal:
You can also log into the Unified Portal with your UAN and password and open the PF passbook to view the provident fund balance. You can also view PF contributions for different exercises.

3. By SMS:
You can use the SMS service to know the EPF balance on mobile. To use the service, you need to send an SMS EPFOHO UAN ENG to 7738299899. To know the PF balance without UAN, sending an SMS will be useful.

You should send the SMS to 7738299899 but make sure it is sent from your registered mobile number. After sending the SMS, you will receive the latest PF contribution and member balance details specific to your KYC details.

4. Via a missed call:
You can use your mobile phone to check the PF balance, for which you will not need the UAN. You will need to use EPFO’s Missed Call service for this.

You must give a missed call to 011-22901406 from your registered mobile number. After two rings, the call is disconnected and the user will receive the message indicating the PF balance.

It is important to note that this service is available for free and can also be used from non-smartphones.

However, as an employee, you need to ensure that your UAN is linked to your bank account, your Aadhaar number and your PAN and even your mobile number should be linked and registered in the unified portal.

5. PF Balance via UMANG APP:
One can download the UMANG app – Unified Mobile Application for New Age Governance – to get EPF details such as PF balance, claim status, and Know Your Customer (KYC) status, among other details.

How to remove your PF?
The Employee Provident Fund (EPF) is a lifetime investment that can be useful at all important stages of life. It is made up of 12% of a worker’s monthly base salary, which is deposited with the EPFO ​​(Employee Provident Fund Organization). The employer also contributes to this fund which, over time, constitutes an important corpus.

Steps and Rules for Withdrawing from a PF (Provident Fund)
Before withdrawing provident funds, it is crucial to complete the KYC procedures.

The Employee Provident Fund (EPF) is a lifetime investment that can be useful at all important stages of life. It is made up of 12% of a worker’s monthly base salary, which is deposited with the EPFO ​​(Employee Provident Fund Organization). The employer also contributes to this fund which, over time, constitutes an important corpus.

Employees can withdraw their FP online quite easily. This can be facilitated through the EPFO ​​member portal e-SEW. Employees can withdraw all of their CP savings after retirement.

However, if employees meet specific conditions, they can withdraw money even before retirement.

Read here the simple steps to withdraw money from your PF account.

Atmosphere of distrust and violence prevailing in the country: CM Gehlot

0

An atmosphere of violence and mistrust prevails in the country, Rajasthan Chief Minister Ashok Gehlot said, stressing that it could ruin the nation. “The policy of tension is not good for the country. A family that has tension does not advance and ruins itself. The same applies to the village, the country and the state,” he said. he declares.

Gehlot said: “There is an atmosphere of mistrust and violence. Some people may be happy that bulldozers are running. This bulldozer can also come to your house anytime,” Gehlot said at the unveiling of a statue of former MLA Sanwarmal Mor. and the inauguration of a girls’ college at Kothiyari in Sikar.

He said that without conviction by law, one cannot be called guilty. Targeting Union Minister Jal Shakti, Gajendra Singh Shekhawat on the Eastern Rajasthan Canal Project (ERCP), Gehlot referred to a statement by the leader regarding the political crisis in the state two years ago.

“The minister says if Sachin Pilot had not missed the opportunity and if the government had changed in Rajasthan, then water would have arrived (via ERCP) in the state. A Union minister can- he speak such a language? What could be more shameful than that,” he said.

Gehlot has consistently called for the ERCP to be given national project status. The project aims to supply water to 13 districts in eastern Rajasthan. Pilot and 18 deputies had revolted against the leadership of CM Gehlot in July 2020.

-With PTI input

The annulment of Roe v. Wade by Supreme Court sparks calls for increased privacy

0

Written by Tonya Riley

The Supreme Court overturned Roe v. Wade on Friday, ending nearly 50 years of the nation’s highest court affirming the constitutional right to abortion and prompting lawmakers and privacy advocates to say the ruling of federal privacy protection legislation privacy is even more urgent.

“Congress must pass legislation protecting people’s data so that their web searches, text messages and location tracking are not weapons against them,” Sen. Ron Wyden, D-Ore., said in a statement. communicated in response to the decision. “Tech companies must take immediate action to limit the collection and retention of customer data so that it does not become tools of persecution.”

Wyden is one of many lawmakers who have urged tech companies in recent months to limit the data they collect that could be subpoenaed or purchased by law enforcement. in cases related to abortion. Wyden – alongside Sens. Elizabeth Warren, D-Mass., Patty Murray, D-Wash., Sheldon Whitehouse, DR.I. and Bernie Sanders, I-Vt. — introduced legislation earlier this month that would block data brokers from selling American’s location and health data.

In May, Motherboard found at least one data broker selling abortion clinic visitation data. (The company said it would end this practice after the report was released.)

Law enforcement exploited user data against abortion seekers long before the reversal.

States like Indiana and Mississippi have used data such as search history and text messages to prosecute women accused of aborting their pregnancies. Other data from the device, such as location data showing that an individual has been to an abortion clinic, could be swept up in a law enforcement net. Geofencing warrants, which allow law enforcement to request data from all mobile devices active in a particular area, have exploded.

Friday’s decision increases those risks, technology policy and defense groups said.

“In the digital age, this decision opens the door to law enforcement and private bounty hunters seeking vast amounts of private data of ordinary Americans.”

Alexandra Reeve Givens, Center for Democracy and Technology

“Today’s decision deprives millions of people of a fundamental right and also underscores the importance of fair and meaningful data privacy protections,” the Electronic Frontier Foundation wrote in a statement. “Everyone deserves to have strict control over the collection and use of information that they necessarily leave behind as part of their normal activities, such as using applications, queries on search engines , posting on social media, texting friends, etc. But those seeking, offering or facilitating access to abortion must now assume that any data they provide online or offline could be sought by law enforcement.

Tech groups are also calling on tech companies to take action.

“In the digital age, this decision opens the door to law enforcement and private bounty hunters seeking vast amounts of the private data of ordinary Americans,” the president and CEO of the company wrote. Center for Digital Technology, Alexandra Reeve Givens, in a statement. “In this new environment, technology companies must step up and play a crucial role in protecting women’s digital privacy and access to information online.”

Facebook, Google and TikTok did not immediately respond to requests for comment. Twitter declined to comment.

Even President Joe Biden, who stressed to Americans in a speech Friday that “privacy is on the ballot,” has raised concerns about how app data could be used.

“Extremist governors and state lawmakers who seek to block mail, search someone’s medicine cabinet, or police a woman’s actions by tracking data on our app she uses are wrong, extreme and disconnected,” Biden said.

Privacy legislation has gained some momentum in recent weeks. On Thursday, a House subcommittee approved legislation that would introduce a comprehensive privacy framework. Senate Commerce Chair Maria Cantwell, D-California, said the Senate will not consider the bill until privacy-enhancing amendments are made.

In the meantime, privacy experts are urging individuals to take steps to protect their data. EFF advises individuals to review privacy settings, disable location services on apps that don’t need them, and switch to encrypted messaging apps like Signal. Experts are also advising people attending protests related to the decision to leave their phones at home or take a burner phone to minimize the risk of location data being used against them by law enforcement.

-In this story-

abortion, Bernie Sanders, Center for Democracy and Technology, Congress, data brokers, Electronic Frontier Foundation, Elizabeth Warren, Patty Murray, privacy, Ron Wyden, Sheldon Whitehouse, Supreme Court, US courts, US Supreme Court

ACCESSIBILITY STATEMENT – BNP Paribas

0

1.1 COMPLIANCE STATUS

The BNP Paribas Group (https://group.bnpparibas) partially complies with the General Repository for Improving Accessibility (“RGAA”), version 4.0, due to the non-compliances and deviations listed below.

1.2 PREPARATION OF THIS ACCESSIBILITY STATEMENT

This statement was made on 01/10/2020.

1.3 TEST RESULTS

The compliance audit carried out internally indicates 53% compliance with the criteria of the RGAA version 4.0.

The average online service compliance rate is 78%.

Of the 106 criteria, 76 are applicable including:

  • 42 compliant criteria
  • 34 non-compliant criteria

1.4 INACCESSIBLE CONTENT

  • 1.1 Does each image conveying information have a textual alternative?

Some images do not convey information and have an irrelevant alternative text. Not very visible on the site, but nevertheless present.

  • 1.2 Is each decorative image properly ignored by assistive technologies?

This problem is more common because decorative images are not ignored by assistive technologies.

  • 1.3 For each image conveying information with a textual alternative, is this alternative relevant (except in special cases)?

In one case on the site, the text alternative is not relevant.

  • 1.3 For each image used as a CAPTCHA or as a test image, having a textual alternative, does this alternative make it possible to identify the nature and function of the image?

In one case on the site, the text alternative is not relevant.

  • 3.1 Information should not be conveyed by color alone on a website. Is this rule respected?

Some information such as breadcrumbs and categories are only indicated by a color change on hover.

  • 3.2 Is the contrast between the color of the text and the color of the background sufficiently clear on each Web page (except in special cases)?

The contrast between the color of the text and the color of its background is not clear enough.

  • 3.3 On each web page, is there sufficient contrast between the colors used in the interface components or the graphic elements conveying information (except in special cases)?

The green color used in interface components is not accessible.

  • 5.7 For each data table, is the appropriate technique used to associate each cell with its headers (except in special cases)?

Data tables do not have cells associated with headers. The tag

must use the “id”, “scope”, “role=rowheader” or “column-header” attributes.
  • 6.1 Is each link explicit (except in special cases)?

On the homepage, the articles have three links in a set, which is problematic for text-to-speech.

  • 6.2 On each web page, does each link, except for anchors, have a title?

On several pages of the site, a title is missing between and .

  • 7.1 Is each script, whenever necessary, compatible with assistive technologies?

Some elements of the site are not vocalized, such as the timeline news page.

  • 7.3 Can each script be controlled by the keyboard and by any pointing device (except special cases)?

Keyboard navigation is not possible throughout the site. On the Spokesperson page, you can open someone’s record, but you cannot use the Esc key or the “X” to exit the window, which is inaccessible.

  • 7.4 For each script that initiates a context switch, is the user notified or in control?

When searching on the news page, the number of results found is not returned to the user. There is no control over the creation of email alerts on the job postings page.

  • 7.5 Are status messages correctly returned by assistive technologies on each web page?

Status messages are not returned correctly, for example missing articles when searching for articles.

  • 8.7 Is each language change indicated in the source code of each Web page (except in special cases)?

Language changes are not specified in the source code, resulting in poor vocalization.

  • 9.1 Is the information structured by the use of appropriate headings on each web page?

Headers were ignored on several pages of the site. The result of this error is the header skipping

at

as can be seen on the Jobs and Careers page.
  • 9.2 Is the structure of the document consistent on each web page (except in special cases)?

The structure of the source code is not respected on the site. the

is not present on all pages. It is hidden under a

.
  • 10.6 On each web page, is each link whose nature is not obvious visible in relation to the text that surrounds it?

In the quotes block of the news page, there is a link in the same color as the text.

  • 10.7 Is the focus indicator visible for every element receiving focus on every webpage?

Only the pictograms of the header change color, which does not validate this criterion. Other elements such as the “Reset” button on the “All News” page do not have a visible focus indicator.

  • 10.8 Is hidden content designed to be skipped by assistive technologies on every webpage?

On the newsletter subscription page, the radio button is in display none.

  • 10.14 Can additional content appearing only through CSS styles be made visible using the keyboard and any pointing device on every web page?

On the Media Space page, the More details and Media Library Download pictogram is visible only when navigating with the mouse. The block disappears during keyboard navigation.

  • 11.4 In each form, are all the field labels and their associated fields associated (except in special cases)?

On the Legal Notice page, when I try to share the article by email, we see that the field labels and their associated field are not attached.

  • 11.10 In each form, is the input requirement indicated in a relevant manner (except in special cases)?

In the fields of the newsletter registration forms sharing the Legal Notice page by email, the mandatory fields are not indicated, or they are not indicated above the fields in question.

  • 11.11 In each form, is the entry requirement accompanied, if necessary, by suggestions to facilitate the correction of entry errors?

An error is indicated in the field, but there are no suggestions to help correct errors.

  • 12.11 In each web page, is any additional content that appears when hovering, focusing or activating an interface component accessible, whenever necessary, with the keyboard?

In the Spokesperson page, the “Close” button is not accessible when opening a biography.

  • 13.3 On each web page, does each office document available for download have an accessible version whenever necessary (except in special cases)?

Not all PDF documents on the site are accessible. The 2019 integrated report is not accessible; the document is not tagged. Documents prior to September 23, 2018 are exempt, but this one is dated 06/02/2020.

1.5 PREPARATION OF THIS ACCESSIBILITY STATEMENT

1.5.1 Technologies used for the production of group.bnpparibas

1.5.2 Test environment

Content recovery checks were carried out according to the RGAA 4.0 standard, with the following versions:

  • Chromium 85 and NVDA 2020.1
  • Firefox and NVDA 2020.1
  • VoiceOver on iOS X

1.5.3 Accessibility assessment tools

  • color contrast analyzer
  • Chrome Developer Tool
  • Web Developer Toolbar (Chrome Extension)

1.5.4 Site pages affected by the compliance check

1.6 FEEDBACK AND CONTACT

If you are unable to access content or a service, you can contact the BNP Paribas Group site manager to be directed to an accessible alternative or to obtain the content in another form.

To do this, send a message to:

How to transfer Authy to a new phone

0

Jack Wallen walks you through the steps of transferring Authy from one phone to another.

Image: Miha Creative/Adobe Stock

authy is a two-factor authentication app that lets you easily work with 2FA codes for the apps and services you use.

Two-factor authentication adds a layer of security to the sites and services you use. Once you add 2FA to a site, it will not only ask for your account credentials (username/password), but also a six-digit code generated by a 2FA application (such as Authy ) and associated with your account. Without this six-digit code, you cannot log into your account.

Once you start using Authy on your mobile device, at some point you will need to transfer the account to another device.

SEE: Mobile Device Security Policy (TechRepublic Premium)

What you will need

For this to work, you will need the Authy app installed on your current mobile device. When you initially installed the app, you associated it with the phone number of that original phone. You will also need the Authy app installed on your new phone. How you install this app will depend on the mobile operating system you are using (Android or iOS).

How to Transfer Authy

Unfortunately, due to security concerns, Authy does not allow users to take screenshots within the app, so you will need to follow written instructions closely. I will outline the process in such a way that you should have no problem following it.

Open Authy on your old phone and tap the 3-dot menu button at the top right of the screen. From the drop-down menu, tap Settings. In the Settings window, you will see three tabs at the top of the screen: My Account, Accounts, Devices. Tap on Devices and you should see an almost empty page with an ON/OFF slider which is in the OFF position by default. To share Authy on a new phone, you need to enable multi-device support, so tap the ON/OFF slider so it’s in the ON position.

After enabling multiple device support on Authy, open the app on the new phone, where you will be prompted to enter your country code and phone number. You can select your country code from the drop-down menu and then enter your phone number. This phone number must be the same number associated with your old phone as it is the number associated with your Authy account.

Once you’ve typed in your phone number, tap Submit at the bottom of the screen, then select the verification method you want – from Use an existing device with Authy installed, Receive an SMS message, or Receive a call.

If you have already inserted your SIM card into the new phone, tap Receive SMS message. If you haven’t installed the SIM card on the new device yet, tap Use an existing device with Authy installed, which will then send a new device request to the original phone. On the old phone, tap Accept, then when prompted, type OK and tap OK.

You should then see all of your 2FA entries in Authy on the new device.

That’s all there is to making Authy available on multiple devices. One thing to keep in mind is that this isn’t actually a transfer, so all of your accounts will be recalled in Authy on your old device. If you plan to sell, give away, or give away that old device, be sure to uninstall Authy and do a factory reset to ensure none of your data is accessed.

Subscribe to TechRepublic How to make technology work on YouTube for all the latest tech tips for professionals from Jack Wallen.

Twitter notes herald the end of tweetstorms and the original tweet concept

0

After choosing not to comment on a related leak, Twitter officially revealed that it was testing a way to post much longer tweets. The official Twitter Notes feature teaser showed off something that looked more like an interface for writing blog posts or articles rather than simple 240-character tweets. Coincidentally, the previous leaked version of this feature was called Twitter Article rather than Notes.

Twitter Notes fixes many long-standing issues with tweetstorms and third-party apps or bots. You no longer receive multiple notifications from someone you follow, and you don’t have to go out of the network to view a long post. It also makes it easier to reply and communicate as there would be only one tweet to reply to instead of several in a series.

At the same time, it raises the question of whether it removes the special appeal and unique value of Twitter. Not all users will post long tirades or ramblings, of course, but other social networks have always allowed users to write short posts as well as long ones without having to choose between the two. Either way, Twitter Notes will most likely make Twitter users happy and might give those on other networks more reason to abandon their old homes and jump into the less restricted, but also more chaotic, world of Twitter.

‘Hang ’em all’: Members of the January 6 committee are the target of violent rhetoric on right-wing social networks

0

Users of these platforms openly call for the execution of committee members, with Wyoming Rep. Liz Cheney appearing to be a specific target. Calls for the hanging of former Vice President Mike Pence that were chanted across Washington DC on January 6 continue to echo online.

Figuring out what is just rhetoric and what could be an active threat is a challenge for law enforcement.

John Cohen, the former counterterrorism coordinator for the Department of Homeland Security and now an adjunct professor at Georgetown University, told CNN that authorities cannot treat social media posts with language. disturbing as mere hyperbole.

Cohen described social media monitoring as a “resource-intensive process that must involve federal, state and local authorities working together, operating under strict protocols that ensure they are able to distinguish between protected speech by the Constitution and those related to the threat”. activity.”

“We are in a very volatile and complex threat period,” he added.

Online threats continue as Illinois Republican Representative Adam Kinzinger revealed on Sunday that he had received a letter in the mail threatening to execute him, his wife and their newborn baby.

Facebook and Twitter’s decision to kick then-President Donald Trump off their platforms for breaking the rules after the insurgency was a boon for a developing cottage industry of media platforms social alternatives.

Alternative sites, like Trump’s Truth Social platform, launched in February, present themselves as bastions of free speech, capitalizing on some Republicans’ perception that they have been unjustly censored by Silicon Valley. Truth Social says it “seeks to create a haven of free speech in the social media sphere and encourages your unfettered free speech.” Its terms of service state that posts must not be “violent” or “harassing”.

An analysis by Advance Democracy Group, a nonprofit that conducts public interest investigations, shared with CNN found posts on Truth Social calling for the execution of Jan. 6 committee members and others. The researchers searched for platform-specific terms like “execute.”

An article on Truth Social includes a photo of a noose and reads, “The J6 committee is guilty of treason. Continuing an insurrection hangs them all.”

On another post referencing Cheney and Pelosi, a user posted a GIF of a guillotine with the message “#MGGA #MakeGuillotinesGreatAgain.”

CNN asked Truth Social about several posts containing violent rhetoric on Tuesday, including posts with a photo of a noose and a GIF of a guillotine. Truth Social did not respond to CNN’s requests for comment, but on Wednesday the posts appeared to have been removed from the platform.

In addition to Truth Social, Advance Democracy also observed violent rhetoric related to the January 6 committee posted on other alternative social media platforms 4chan – which was used by the suspect in the mass shooting in Buffalo, New York – as well as on Gab and another message board popular among some Trump supporters.

While many of the posts identified by Advance Democracy appeared to have little engagement, all of the posts illustrate a pattern of frequent invocation of violence in these online communities.

On a pro-Trump message board, one user commented earlier this month: “If we ever decide to storm the capital again, I promise we won’t make the mistake of not being armed a second time. time.

The post has since been removed.

Truth Social and 4Chan did not respond to CNN’s requests for comment.

Andrew Torba, CEO of Gab, told CNN, “Gab permits all legal political speech protected by the First Amendment, including speech on inherently political topics such as the charge and punishment of treason through the system. U.S. judicial and imminent threats of violence, we will take action and work with our law enforcement partners to mitigate any threats to the public.”

While many people posting to these sites will never commit violence, others will, as evidenced by the social media posts of some of those accused of their role in the insurgency.

“Given the lack of moderation of content on fringe platforms inhabited by far-right communities, the volume of threats is much higher than on mainstream platforms,” ​​Ben Decker, CEO of Memetica, told CNN. digital survey company.

Decker said most about some of these posts seem to encourage “real world violence. [and] are no different from many of the threats that emerged in the weeks leading up to January 6. »

Daniel J. Jones, president of Advance Democracy, said the online threats appear to be coming from people who mistakenly believe the 2020 election was stolen. “It is clear that the lies and actions of Trump and lawmakers who support him continue to pose a serious threat to our democracy and the peaceful transition of power,” he said.

The United States Capitol Police had no comment. CNN has also reached out to the FBI, Pence’s office and Cheney’s office for comment.

Oregon State Raises Reimbursement Rates for Child Care Providers

0

SALEM, Ore. (KTVZ) – Child care expense reimbursement rates are increasing for providers caring for children of families who receive child care expense assistance through the Department of Oregon Social Services.

ODHS pays child care providers for child care services provided to families receiving child care assistance through employment-related child care programs (ERDC) and Temporary Assistance to Needy Families (TANF).

The new child care reimbursement rates took effect June 1, 2022 and increased due to the passage of House Bill 4005 in the 2022 legislative session.

Average monthly reimbursement rates for full-time care increase by:

  • 18% for the care of family, friends and neighbors
  • Between 6 and 20% for nurseries
  • Between 11 and 25% for licensed home care

“For many families, the cost of childcare can be a barrier to reaching their goals and entering and staying in the workforce,” said Claire Seguin, assistant director of programs at self-sufficiency of ODHS. “These reimbursement rate increases will ensure families have equal access to quality child care.

“As our child care system continues to struggle with staffing shortages and a lack of child care provision, this is an important first step in ensuring that our child care providers receive fair pay,” said Oregon Early Learning System Director Alyssa Chatterjee. “I appreciate the Legislature’s investment in our system and what it will mean for Oregon families receiving assistance with their child care costs.”

Actual child care expense reimbursement rates vary depending on the type of provider, the age of the child, and the community in which the provider is located. A full list of reimbursement rates is available online at https://www.oregon.gov/dhs/ASSISTANCE/CHILD-CARE/Pages/Rates.aspx.

The ERDC helps eligible families pay for work-related child care costs, including enrollment and enrollment fees. ERDC is a subsidy program, which means that some families, depending on their income, may be required to pay a copayment.

TANF helps those engaged in the Job Opportunity and Basic Skills (JOBS) program achieve their goals by providing direct childcare payments to providers as well as assistance with registration fees.

Oregonians can apply online for ERDC, TANF and other government aid online at One.Oregon.Gov or by phone at 1-800-699-9075 or TTY 711.

Resources to meet basic needs

The Oregon Department of Social Services, Self-Sufficiency Programs operates the Work-Related Child Care Program. The Employment Related Day Care program helps working families with child care costs, including registration and registration fees. It also works with statewide partners, including the Division of Early Learning, to help families find quality child care.

Man accused of exchanging explicit photos with 11- and 12-year-old girls

0

NORRISTOWN, PA — Local authorities have arrested a New Jersey man and charged him with exchanging sexually explicit photos with two preteen sisters in Montgomery County.

The Montgomery County District Attorney’s Office on Tuesday announced charges against Ryan Corcoran, 26, of Andover, NJ, who investigators say sent and requested nude photos first via social media and then by SMS.

Prosecutors say Montgomery County detectives were tipped off in April by the father of two local girls, ages 11 and 12, who said they were approached via TikTok, then via cellphone text messaging, by a user who , at one point said he was a 14-year-old, but who was actually Corcoran.

Find out what’s happening in Norristownwith free real-time Patch updates.

Both sisters were given nude photos and then asked to provide nude photos of themselves, the prosecutor’s office said.

Investigators traced the phone number texted to a service called Ad Hoc Labs, which helps users hide their real phone numbers.

Find out what’s happening in Norristownwith free real-time Patch updates.

Detectives served a subpoena on Ad Hoc Labs and eventually discovered that the phone number associated with the service, as well as the IP address of the computer used in the case, belonged to Corcoran’s father, according to the office. of the prosecutor.

When investigators went to Corcoran’s father’s home to serve a search warrant, the young Corcoran then admitted the cellphone number was his, prosecutors said.

The prosecutor’s office said a download of Corcoran’s phone showed the girls’ phone numbers were stored as contacts; investigators also found the original nude photos sent by one of the girls.

“This defendant was contacting random young girls on a social media platform and soliciting them to take photos of themselves in sexually explicit poses, clearly creating child pornography,” the prosecutor said. Montgomery County, Kevin Steele, in a statement. “This is another example that there are predators on the Internet trying to take advantage of innocent young children. Parents must be ever vigilant to protect their children from these predators.”

The Montgomery County District Attorney’s Office said it was assisted in the investigation by Homeland Security Investigations, the New Jersey Internet Crimes Against Children Task Force and the County District Attorney’s Office. of Sussex, New Jersey.

Corcoran is charged with possession of child pornography, unlawful contact with a minor, corruption of minors and criminal use of a means of communication.

He was arraigned on June 13 before Magistrate District Judge Maureen C. Coggins.

Corcoran was later released after posting bail. He was also ordered to have no contact with minors and to refrain from using the Internet.

A preliminary hearing is scheduled for June 27.


Get more local news straight to your inbox. Sign up for free newsletters and patch alerts.

To request removal of your name from an arrest report, submit these required elements at [email protected]

Response rules:

  • Be respectful. It is a space for friendly local exchanges. No racist, discriminatory, vulgar or threatening language will be tolerated.
  • Be transparent. Use your real name and back up your claims.
  • Keep it local and relevant. Make sure your answers stay on topic.
  • Review the Patch Community Rules.

George Lamming, famous Caribbean novelist, dies at 94

0
Placeholder while loading article actions

George Lamming, a Barbadian author who placed the legacy of colonialism at the center of his novels and lyrical essays, earning a reputation as one of the finest Caribbean writers of his generation, died on June 4 in a nursing home in Bridgetown, the capital of his country. He was 94 years old.

His death was announced by Mia Mottley, the Prime Minister of Barbados. “Wherever George Lamming went,” she said in a statement, “he embodied that voice and spirit that cried out in Barbados and the Caribbean.” Mr Lamming’s daughter, Natasha Lamming-Lee, said he was ill but did not name a cause.

Alongside novelists and poets such as Kamau Brathwaite, Wilson Harris, Edgar Mittelholzer, VS Naipaul, Andrew Salkey and Derek Walcott, Mr. Lamming helped define a new Caribbean literature in the mid-twentieth century, exploring questions of history , politics, language and freedom at a time when colonial rule was giving way to independence.

Raised on a former sugar cane plantation outside of Bridgetown, he has written books highlighting the experiences of people marginalized because of their race, language, gender or income, and has broadcast a message of liberation and inclusion in his essays and speeches. “I’m kind of a preacher,” he said in a 2002 interview with the Small Ax newspaper. “I am a man with a message.”

Like Naipaul and many other Caribbean writers of their generation, Mr. Lamming launched his literary career in London, where he wrote his first semi-autobiographical novel, “In the Castle of My Skin” (1953), at age 23. He then reviewed the experience. of migration in “The Emigrants” (1954), a dark and sketchy novel about West Indian expatriates in England, and in his collection of essays “The Pleasures of Exile” (1960), which a New York Times reviewer described as “a neo-Gothic piece with arc-shaped ideas like flying buttresses.”

“My subject,” wrote Mr. Lamming in the latter, “is the migration of the West Indian writer, as a colonial and an exile, from his native kingdom, once inhabited by Caliban, to the tumultuous island of Prospero and its language.”

Mr. Lamming returned to the Caribbean for novels such as “Of Age and Innocence” (1958) and “Season of Adventure” (1960), which were set on the fictional island of San Cristobal, where ethnic African groups, Indians and Chinese were fighting. to overcome mutual suspicion while uniting against the white establishment.

It was difficult, he noted, to forge a new identity after years of colonialism. “I had always lived in the shadow of a meaning that others had given to my presence in the world”, observes an independentist leader in “Age and Innocence”, “and I had played no role in the making in this sense, like a chair that is entirely at the mercy of the idea guiding the hand of the man who builds it.

Mr. Lamming had delved into issues of race and ethnicity since the publication of his first and best-known novel. Named after verses by Walcott, “In the Castle of My Skin” shifted between third and first person while chronicling the upbringing of a young man named G, who joins his friends in fishing, diving for the coins thrown by tourists at the beach wondering how the king’s face ends up on pennies.

He also witnesses a workers’ riot, develops a dawning awareness of racial inequality (“No black boy wanted to be white, but it was also true that no black boy liked the idea of ​​being noir”) and went to Trinidad to work as a teacher. , just like Mr. Lamming did after high school.

“I tried to reconstruct the world of my childhood and adolescence,” Mr. Lamming wrote in the introduction to the 1983 edition of the novel. “It was also the world of an entire Caribbean society.”

The book won the Somerset Maugham Award for young writers in Britain and was praised by French philosopher Jean-Paul Sartre, Kenyan author Ngugi wa Thiong’o and American novelist Richard Wright, who wrote the introduction of the American edition.

Critics were also impressed: “Mr. Lamming is a poet by instinct rather than a novelist, a man with an individual and almost private approach to the English language,” wrote Orville Prescott of The Times. “His prose is poetic, sensual, imaginative, adorned with whimsical figures of speech and surprising twists of language.”

In part, Mr. Lamming’s prose style was shaped by his belief in gaining “spiritual possession of the landscape in which you live.” For him, this meant developing an understanding of the “rhythm of the wind…the smell of the sea…the texture of stone and rock”.

“They are not objects outside of you,” Caribbean Beat magazine quoted him as saying. “They are part of your consciousness.”

George William Lamming was born in Carrington Village on June 8, 1927. His parents were unmarried and he barely knew his father. Her mother was a housewife who later married a policeman.

Mr Lamming grew up during a time of social upheaval, prefiguring Barbados’ independence from Britain in 1966, and said he and his peers suffered a more psychological form of colonial cruelty than physical. “It was a terror of the mind; a daily exercise in self-harm,” he wrote in a 2002 essay. “Black against black in a battle for self-improvement.”

After winning a scholarship to the prestigious Combermere High School, he studied under the literary editor Frank Collymore, who welcomed him into his personal library and encouraged Mr. Lamming’s interest in writing poetry and of prose, publishing some of his early work in the Caribbean magazine BIM.

Mr Lamming then worked at a boarding school in Port-of-Spain, Trinidad, teaching English to Hispanic students, before moving to England in 1950, sailing on the same ship as Trinidadian writer Samuel Selvon. “If I hadn’t gone to England,” he told the Washington Post in 1999, “I would have written, but you wouldn’t have heard of me.”

After working in a factory in London, Mr Lamming landed a job with the BBC Colonial Service, where he was a presenter for shows such as “Caribbean Voices”, an influential platform for West Indian writers. He also became active in the city’s literary community, meeting Dylan Thomas and other poets at the Mandrake Club in Soho.

His conversations with English writers were more about business than literature or politics, he recalls: “A very good short-story writer, always in purple velvet, advised me never to visit an editor’s office to talk business without a small gun in my pocket. He gave examples of his success in such encounters.

Mr. Lamming was soon traveling abroad, visiting the United States on a Guggenheim Fellowship and speaking in 1956 at the Congress of Black Writers and Artists in Paris, where he impressed an audience that included James Baldwin and Frantz Fanon.

“Lamming is big, boned, messy, and intense,” Baldwin wrote in an essay on the event, “and one of his real distinctions is his refusal to be bullied into being a real writer. “

With his booming, gravelly voice and crown of graying hair, Mr. Lamming won a wide range of admirers, including Canadian novelist and short-story writer Margaret Laurence. They had a brief affair, according to her biographer James King, and she moved to London with her children in an unsuccessful attempt to settle down with Mr Lamming. (His only marriage, to artist Nina Ghent, had previously ended in divorce.)

By 1967, Mr. Lamming had launched a career in academia, lecturing and working as a writer-in-residence at schools including Brown, Duke, Penn, the University of Texas at Austin and the University of the West Indies in Jamaica. . He returned to Barbados in 1980 and lived for many years at the Atlantis Hotel near the fishing village of Bathsheba, where he said his writing was invigorated by daily swims in the ocean.

Mr. Lamming received the Order of the Caribbean Community in 2008 and a Lifetime Achievement Honor from the Anisfield-Wolf Book Awards in 2014.

In addition to his daughter, Lamming-Lee of Silver Spring, Md., survivors include his longtime companion, Esther Phillips; seven grandchildren; and 10 great-grandchildren. Her son, Gordon, died last year.

Mr Lamming’s later novels include ‘Water With Berries’ (1971), a political allegory centered on a West Indian revolutionary living in London, and ‘Natives of My Person’ (1972), about 16th century explorers and the origins of the colonialism. Towards the end of his life, he was working on a book about Christopher Columbus, imagining that the explorer had been arrested and tried by an indigenous community in the West Indies.

He spent years working on the project, but in a 2002 interview with Caribbean Beat he declined to say when it might be released: “The thing is, with these things, you never end.”

They are human! The Yankees take a big lead and fall to the Blue Jays | Quick reaction

0

TORONTO — The Yankees were late to play a bad game. It’s baseball. You can’t win them all even though sometimes you feel like you’re so good and hot that you’ll never lose again.

Sunday must have stung. Feeling and looking invincible, the Yankees took a big lead over the Toronto Blue Jays and then ruined the game.

Instead of sweeping the Jays for a 10-game winning streak that would have added to an already huge lead in the American League East, the Yankees spewed a five-point lead and lost 10-9.

Everyone knows the Blue Jays can knock the ball out of the stadium with anyone and that’s how they roared to save the series finale. The Yankees had an 8-3 lead before Lourdes Gourdes Jr., grand slammed in the sixth inning against Miguel Castro to make it a one-run game, then Teoscar Hernandez went deep with two in the seventh against Wandy Peralta to put Toronto ahead. 10-8.

From there, the Yankees clawed back a run in the eighth on a homer hit by Anthony Rizzo, but the Jays held on.

There were nine homers in the game, five from the Yankees and four from Toronto.

The Yankees’ greatest strength this season has let them down in this one. They had a rocky start from Luis Severino, who allowed five runs over five innings, and the bullpen also faltered by allowing five more.

The Blue Jays struck first, taking a 2-0 first-inning lead over Severino, who beat Bo Bichette with one out, then served a two-run homer to Vladimir Guerrero Jr.

The Yankees recovered a run in the second on a Gleyber Torres first homer off Jays starter Yusei Kikuchi, then took a 3-2 lead in the third when Joey Gallo worked a first walk and Josh Donaldson hit a two-out , two- running homer.

The Yankees’ lead grew to 6-2 in the fifth when they scored three on reliever Adam Cimber. Adam Judge doubled in a run and Torres made it an afternoon three-RBI with a two-out two-sack that popped the left field wall.

The Blue Jays salvaged a run in the fifth on a solo homer from George Springer to make it a 6-3 game, but the Yanks responded with two in the sixth on back-to-back homers from their No. 8 and No. 9 hitters. , Kyle Higashioka and Marwin González.

Leading 8-3, Severino returned to the mound for sixth with his pitch count in the 90s. A single line and walk later, Boone went to the bullpen, bringing in Miguel Castro. This move did not work. Castro retired the first two batters he faced, but walked the next to charge the bases and Gurriel Jr. cleared them with a grand slam that cut the Yankees’ lead to 8-7.

The lead was gone the next set when Gurriel took Peralta deep with two on board, making it a 10-8 game.

The Yankees have always made it interesting. Rizzo’s homer in the eighth brought them within a run, and then the next two batters hit a field single from Gonzalez and a walk from Jose Trevino, who hit for Gallo.

The Yanks had the runners tied and green lighted on board with the top of their order coming, but Blue Jay closer Jordan Romano came on and ended the threat by pulling LeMahieu out on a right flyball and Judge on a strikeout.

The Yankees threatened again in the ninth against Romano. Giancarlo Stanton walked with one out and Aaron Hicks scored a single with two downs to put runners in the corners. Hicks then stole second base to put the tying and winning runs in scoring position for Rizzo, who grounded himself short to end a 3 hour, 41 minute marathon.

NOTABLE

– Giancarlo Stanton was 0 for 4 with three strikeouts, leaving him 1 for 16 with a home run and two RBIs in his last five games.

— Rizzo has seven home runs and 17 RBIs in his last 15 games.

– Higashioka has homered three times in its last four games after having had none in its first 34.

LOOK AHEAD

Monday: Yankees at Rays, 7:10 p.m., YES. RHP Gerrit Cole (6-1, 3.33) vs. LHP Shane McClanahan (7-3, 1.84).

Tuesday: Yankees at Rays, 7:10 p.m., YES. LHP Nestor Cortes (6-2, 1.94) against TBA.

Wednesday: Yankees at Rays, 7:10 p.m., YES. LHP Jordan Montgomery (3-1, 2.72) vs. RHP Shane Baz (0-1, 5.40).

Thank you for counting on us to deliver journalism you can trust. Please consider supporting us with a subscription.

Randy Miller can be reached at [email protected].

WhatsApp now lets you mute people during group calls

0

WhatsApp rolled out several new features last week, including the ability to mute people during group calls (via Android Central). This sanity saving feature seems useful not only for turning off people who forget to do it themselves, but also if you’re in the same room as someone who’s also online and doesn’t want to hear the echo what he says.

While some conferencing apps, like Zoom and Microsoft Teams, allow hosts to mute all (or selected) participants, they generally don’t offer individual users the ability to mute whoever they want during a call. This feature offers a new level of control that’s probably best retained for chaotic meetings that involve up to eight people on video calls or up to 32 on voice calls.

Along with the new mute feature, WhatsApp now lets you message specific people in a group call, maybe if you want to make a note to someone in a meeting. or crack a joke that might not fly with the whole group. WhatsApp is also rolling out a new banner that will notify you when a new person has joined a call after it has already started.

The messaging service expands on more than just its group call feature. Friday, whatsapp announced that you can now choose which contacts can see your profile picture, about and last seen status which indicates when you were last active on the platform. This could help keep your profile private from business contacts or anyone you don’t want to have access to this information 24/7. Last year WhatsApp started hiding your last seen status to strangers by default due to potential privacy implications.

Earlier this week, WhatsApp finally rolled out the ability for Android users to transfer their chat histories to iPhone after the company initially began allowing users to transfer their chat data in the opposite direction (from iPhone to Android) last year.

Clinical Trial: Email for Older Black and Latino Patients Increased COVID Vaccination

0

What happened last year when a study was done to test the impact of emailing older black and Latino patients with the names of their primary care physicians and named senders? A statistically significant increase in vacancy rates among these populations, found a team of researchers.

The article, “Effect of electronic and mail-based outreach to primary care physicians for COVID-19 vaccination of black and Latino older adults: a randomized clinical trial,” involved a study of the impact of such awareness. It was published online on June 17 in Open JAMA Network, by a large team of researchers. The researchers were Tracy A. Lieu, MD, MPH; Eric P. Elkin, MPH; Patricia R. Escobar, MPH; Lucy Finn, MPH; Nicola P. Klein, MD, Ph.D.; Cimone Durojaiye, MPH; Stephanie Prausnitz, MS; Charles P. Quesenberry, Ph.D.; Debora Sawyer, MD; Silvia Teran, MD; Nancy Goler, MD; Stephen M. Parodi, MD; and Yi-Fen Irene Chen, MD

As the authors of the article write, “Vaccination is a crucial tool for controlling COVID-19, which has caused disproportionately high morbidity and mortality among black and Latino people in the United States. Vaccination rates among adults of these racial and ethnic groups were initially lower than those of Asian and white adults, and vaccination uptake among black adults continues to lag.Possible causes for this gap include more difficult access, skepticism about the efficacy or safety of vaccines and mistrust Primary care physicians (PCPs) can potentially play a key role in improving COVID-19 vaccination rates, especially for people black and Latino elderly who are hesitant to get vaccinated because PCPs are reliable sources of information.6,7 However, there is little evidence on the efficacy of PCPs for sensitization for p promote vaccination against COVID-19 in these high-risk groups. We conducted a randomized clinical trial of PCP sensitization for COVID-19 vaccination in older Black and Latino Americans in a socioeconomically diverse population. The objectives of this study were to assess the effects of PCP outreach using secure electronic messaging and sending on COVID-19 vaccination among Black and Latino individuals aged 65 years and older and to compare the effects of culturally appropriate and standard PCP messages.

And what did the researchers find? “This 3-arm randomized clinical trial compared secure electronic messaging and email outreach of PCP (culturally appropriate or standard PCP extension) with usual care for Black and Latino people aged 65 and older who had not responded to an earlier non-personalized email and mail outreach for COVID-19 vaccination. The intervention period was March 29 to April 22, 2021, with vaccination results tracked through May 20, 2021. The interventions were developed by The Permanente Medical Group (TPMG), in partnership with Kaiser Permanente Northern California (KPNC) , an integrated system serving a diverse 4.5 million members. For this study, we selected service areas with relatively low vaccination rates and high proportions of black and Latino individuals: California’s Central Valley, Fresno, South Sacramento, and San Jose. KPNC members age 65 and older were eligible “to participate in the clinical trial” if they had been sent in advance but had not received a COVID-19 vaccination (in any location in California, inside or outside KP) or had made a vaccination appointment with KP as of March 29, 2021. Previous outreach used emails (or letters when email addresses were not available) from the KP Regional COVID-19 Vaccination Team to invite individuals to book an appointment for a vaccine online or by phone.

Additionally, “participants in the culturally appropriate and standard sensitization groups were followed from their first study sensitization until first vaccination or until 28 days after their last study sensitization. Participants in the usual care group were followed from the date of first study sensitization mailout (March 29, 2021) through first vaccination or up to 28 days after mailout. last sensitization of the study on April 22, 2021 (resulting in a maximum observation period of 52 days). The primary analysis used intention-to-treat allocation and compared vaccination time between each sensitization group with usual care using Cox proportional hazards regression. The models included a fixed effect for study group and adjustment for race, ethnicity, language group, and geographic area.

Ultimately, the researchers write, “This randomized clinical trial found that secure messaging and mail outreach sent on behalf of individuals’ own PCPs led to a significant increase in COVID-19 vaccination rates among older adults. black and Latino women who had not responded earlier, a less personalized approach. If this culturally appropriate PCP outreach were conducted for all unvaccinated Black and Latino American adults ages 65 and older, assuming the same additional vaccination rate of 2.2% was achieved, an additional 23,000 people nationwide could have been vaccinated. This suggests that PCP outreach should not be overlooked as a potentially effective approach for Black and Latino older adults.

The researchers note that our study was unique in that it focused on black and Latino seniors. Very few outreach randomized clinical trials to promote vaccination against COVID-19 have been reported. An earlier trial in a university healthcare system with individuals of all ages and racial and ethnic groups found that texting increased vaccination rates by 1% among those who had not responded to a prior text message. . In comparison, our trial of PCP sensitization using e-mail and postal messages found an increase of up to 2.2% in black and Latino seniors who had not responded to prior sensitization and less personalized.

And here’s something important: the researchers write, “A notable aspect of our study was that email messages and mailings were sent in the name of each individual’s PCP. The increases in COVID-19 vaccination rates we have observed are consistent with surveys and expert opinion suggesting that physicians are key influencers with their patients. Our finding that electronic reminders for COVID-19 vaccination had significant effects aligns with trials of patient portal or text-based reminders for influenza vaccination and other studies of vaccination reminders.

The old millennium | Fire station

0

I am a new business owner…

I start again: I am a former company executive with…

Let’s try again: I am a business executive with over 14 years of experience in the business and over 7 years in headquarters but who has just been assigned to the company in which I reside.

If that sounds familiar, then we’re probably similar in other ways: we were raised in the fire service, where being an officer meant you paid your dues for over 10 years as a “full-back”. If you decided, you were promoted to engineer, and several years later you became an officer who was close to retirement, but you were there and you did it. You know the area you’re assigned to and the guys you work with well. That said, it is not the fire department that elevates the firefighters who are currently occupying seats on fire apparatus, myself included.

A disturbing conversation

A “new generation” of firefighters and firefighters is not a problem that arose overnight.

Attend any fire school on the weekend and you’ll most likely hear most mid-level supervisors complaining about “the next generation.” Common complaints from these lieutenants and captains are, “We don’t know how to talk to them” and “They don’t know how to perform the simplest tasks.”

These remarks fell by the wayside for me when I recently attended such a weekend event, as I usually push to the limit to access basic knowledge. After all, it didn’t affect me and I didn’t want to be dragged into negativity.

Flash forward a few weeks to my current assignment. My engineer and I were doing preventive maintenance on our devices. The station phone rang. I popped up and looked at the trainee firefighter from our sister company to get the phone. After looking at me, for what appeared to be sizing me up, he informed me that I should pick up the phone because I was “second most recent on the shift”. I answered with a simple “OK” and let my crew give advice to the trainee firefighter.

At first glance, you might think it was the conversation of concern that inspired me to write this article, but the inspiration came a whole day later when I received a text from the trainee firefighter, to asking me if I was crazy, apologizing and explaining that he didn’t understand that what he had done was wrong. It was then that I realized the disservice to him and the changes that need to be made in the way we serve the next generation of firefighters.

Customer service

A quality organization exists when all employees share the same vision. Many civilians become firefighters today for the same reasons civilians became firefighters 100 years ago: they want to serve their community, ride big trucks, and have exciting work.

Unfortunately, firefighting is not an organization. The department is an organization.

We are doing an extremely poor job of getting our new generation of employees on board with our vision. Throughout their schooling, recreational sports, and extracurricular activities, these individuals were led to believe that they could become anything they wanted to be simply by working hard. Valuable descriptions of how to achieve the goals and of certain failures and difficulties along the way have probably been omitted.

Our new generation expects the customer service of a hotel bellboy at the cost of a free valet.

They need to be shown where the organization started, where it is now, where it is going in the short and long term, and where we would like to see them in the mix. We need to replace instant gratification with instant ownership.

Communication

For the life of me, I couldn’t get over the fact that this firefighter texted me about a problem at the fire station. It intrigued me at first, then it became more and more clear.

This firefighter graduated from high school virtually. He passed his first interview with the department virtually. He only knew how to solve problems – you guessed it –virtually. How could I hold him accountable for staying within his communication comfort zone? Also, how could I solve this organizational puzzle?

The thing is, it wasn’t a problem. He was simply a young man adjusting to his generational environment.

I texted the firefighter, explaining that, yes, I was initially angry about the situation, but also that I had done him serious wrong by not explaining why I was angry. I used the channel of communication he felt most comfortable with – texting – and laid out the problem of the situation: how we have a hierarchical structure and why seniority in the services fire is important.

Then I gave him time to talk. I let him express himself on the fact that he had not understood until this precise moment that something was wrong and that everything would be fine now.

This firefighter and I now have a bond that will never be broken, because we have found a way to close the communication loop: encode, send, receive, decode, return.

It is our duty as fire officers – and firefighters who have been around – to find the most effective communication methods for all of our firefighters, not just those inside our generational environment.

For those wondering, this firefighter and I are now sitting around the kitchen table having some of the best conversations I’ve ever had in the fire station.

Plobal Apps Raises $8.5M in Round Led by Elevation Capital and Bessemer Venture Partners

0

The total capital raised to date is $14 million

TORONTO, June 16, 2022 /PRNewswire/ – Global Appsa no-code mobile app platform for e-commerce stores, raised $8.5 million, led by Elevation Capital and Bessemer Venture Partners. Elevation and Bessemer also co-led the funding round in 2021, bringing the total capital raised by Plobal Apps to $14 million over the past 6 months.

Plobal Apps enables D2C brands to quickly build and launch their mobile apps, drive installs, engage customers, and increase revenue. With 73% of all e-commerce transactions conducted through a mobile device, shopping experiences are designed for the mobile customer first. In mobile commerce, mobile apps offer greater personalization for customers, and communication can be tailored based on user interests, location, usage, and behavior. This leads to higher conversion rate, AOV and customer lifetime value.

One of the largest app building platforms in the Shopify ecosystem, Plobal Apps helps merchants drive up to 5x higher conversion rates compared to mobile web.

The company’s mission is to democratize mobile commerce technology to create a level playing field for e-commerce brands globally. For most brands, building apps was expensive, required expertise, and time-consuming. With DIY apps, Plobal Apps has helped solve this problem for merchants. A bigger problem was that after the app was created, these merchants didn’t know how to drive installs and generate revenue. Plobal Apps focuses on what happens after the mobile app is created and aims to make the mobile app the most successful sales channel for a merchant.

“We’ve come a long way in our journey. Brands have now started to realize the importance of a proprietary marketing channel. For many of these D2C brands, personalization and retargeting have become difficult with the increase in policies regulations, and third-party data restrictions With rising acquisition costs and an emphasis on retention, brands are increasing proprietary platforms such as email, text, and mobile. mobile apps to reach their customers and truly own their audience on conversion, deliverability and engagement,” said Atul Poharkar, Founder of Plobal Apps.

Akarsh Shrivastava, Principal of Elevation Capital, said, “At Elevation, we have always been excited about the potential of D2C brands. However, with ever-increasing digital marketing costs and increasingly difficult targeting and marketing, brands need to better own and monetize these customers. . Recent privacy changes have only reinforced these tailwinds. Plobal’s easy-to-build platform, complete with out-of-the-box marketing manuals, helps brands build and operate cutting-edge consumer-facing apps, allowing them to dramatically improve retention, repeat purchases and customer lifetime value. . We are delighted to partner with Atul and the Plobal team.”

Plobal Apps works closely with Shopify mid-market and enterprise customers, with a focus on generating revenue for merchants. With popular and fast-growing brands such as Steve Madden, Goose Creek, Matt & Nat, Koovs and Rare Rabbit as clients, Plobal understands how to drive successful conversions from mobile apps. The company processes millions in the GMV app every month for its enterprise merchants at all levels.

Anant Puripartner, Bessemer Venture Partners, said, “At Bessemer, we believe the future of e-commerce is in apps, as they enable better customer engagement as well as the ability to explore more forms of commerce like streaming. live and influencer based selling. Building an app is just the first step and that’s why we are thrilled to partner with Atul and the whole team at Plobal Apps; not only do they help create mobile apps for their customers in minutes, but they also help them drive adoption, engagement and revenue through the app.”

With a reach of nearly 2.5 million Shopify merchants, Plobal sees a huge market opportunity. Fresh capital from this round will be directed towards building a greater presence in North Americatechnological innovation and the launch of new products.

SOURCE Global Applications

Study from Westmead Hospital finds text messaging program improves lifestyle risk factors in heart attack survivors – thepulse.org.au

0

A study of the text messaging program, TEXTMEDS, was successful in informing and supporting heart attack survivors on how to prevent a second heart attack.

The randomized controlled study led by Cardiologist and Academic Director of Westmead Hospital and Professor of Medicine at the University of Sydney’s Westmead Applied Research Centre, Dr Clara Chow, investigated whether texting and telephone support to patients could improve risk factors in high-risk individuals. subsequent cardiovascular events.

The trial was the first of its kind to implement a systematic digital health intervention in around 20 hospitals across urban and rural Australia.

About half of all cardiovascular events occur within the first year after a heart attack or stroke, with 20-40% of these patients being readmitted with a subsequent coronary event within 12 months.

To reduce their risk, people who have had a heart attack are encouraged to maintain a healthy lifestyle; manage risk factors for heart disease, including blood pressure, cholesterol and diabetes; and take the medications prescribed by their doctor.

The TEXTMEDS study aimed to improve patient adherence to medication, lifestyle and behavior change.

Hospital admissions for people who have had a heart attack are usually short, and there may not be enough time to provide information and education to support their recovery and how to prevent another heart attack,” Dr. Chow said.

“Post-hospitalization prevention programs can be helpful, however, even with access to these programs, approximately two-thirds of people do not attend due to various barriers including returning to work, hours of rigid schedule, distance or lack of perceived need.”

Participants received four text messages per week for the first six months, then three messages per week for the next six months.

The digital platform developed by the research team applied algorithms that enable the selection of appropriate and personalized messages to support patients who have recently suffered a heart attack across Australia. The text messages explained things like blood pressure and cholesterol goals, how each of the medications worked, and the importance of taking medication regularly. They also covered health topics such as physical activity, diet, quitting smoking and mental health after a heart attack.

Study participants showed improvements in healthy lifestyle measures after 12 months, with text group participants more likely to have a normal body mass index and more likely to report eating five or more servings of vegetables and two servings of fruit each day.

“Even though this study found no significant impact on medication adherence, TEXTMEDS demonstrates that a simple, inexpensive, and personalized SMS-based program can provide systematic post-hospital discharge education and support people after a heart attack with minimal staff.

Of the 509 patients in the text messaging group who responded to a user feedback survey, 86% agreed that the text messaging program was helpful and 63% agreed that the text messaging program reminded them to take their medications and encouraged them to change their way of life.

58% said their diet had become healthier through texting and 48% said they exercised more regularly through texting.

The study was funded by the National Health and Medical Research Council in Australia.

US veterans missing in Ukraine fear capture, families say

0
Placeholder while loading article actions

Two American veterans have disappeared in Ukraine, and it is feared they have been captured by Russian forces, family members of the missing Americans said on Wednesday.

Alexander J. Drueke, 39, and Andy Tai Huynh, 27, both from Alabama, disappeared in recent days near Kharkiv, a Ukrainian city not far from the Russian border, according to their families. Drueke had served in the US military and Huynh is a Marine Corps veteran, they said.

In phone interviews, the two families shared similar accounts in which the men contacted them on June 8 to tell them they would be unreachable during a multi-day mission. Neither has been heard from since, they said.

Drueke’s mother, Lois, said she received a phone call on Monday from another US citizen who said he was in Ukraine with her son. The caller, whom she did not identify, told her that intercepted communications suggested Russian forces had detained two Americans, she said.

The Russian Embassy in Washington did not immediately respond to a request for comment.

Ukrainian war volunteers return home, counting on a tough fight

alexander Drueke had told his family that he was teaching Ukrainian troops how to use American-made weapons, his mother said.

“Alex was very convinced that he was trained in a way to help Ukrainians be strong and push Putin back,” she added, referring to Russian President Vladimir Putin. “He didn’t go there to fight, but to train.”

Joy Black, who identified herself as Huynh’s fiancée, said he volunteered to fight alongside Ukrainian forces. She also received a phone call on Monday from a person who appeared to be American who told her that Huynh was missing.

“The response we received from our government was very helpful,” Black said. “They took it very seriously. We got the call on Monday morning, and it just went up so high, so fast.

News of the Americans’ disappearance was first reported by London’s Telegraph on Wednesday. The State Department said the Biden administration, which discouraged Americans from joining the war effort, was “aware of unconfirmed reports of two American citizens being captured in Ukraine,” but declined to comment further.

“We are closely monitoring the situation and are in contact with the Ukrainian authorities,” the statement said. “…We also reiterate once again that U.S. citizens should not travel to Ukraine due to the active armed conflict and the singling out of U.S. citizens in Ukraine by the Russian government security official.”

Speaking to the media on Wednesday afternoon, White House spokesman John Kirby said he had no information to share about the missing Americans or if the US government believed they had been captured.

The situation creates another difficult scenario for the United States in its diplomacy with Russia. The Kremlin has detained other Americans for months or years, including WNBA star Brittney Griner and Marine Corps veteran Paul Whelan. Another American held by Russia, Marine Corps veteran Trevor Reed, was released in a prisoner exchange in April.

It is not known how many Americans joined the war. Shortly after the conflict began in late February, Ukrainian officials said around 4,000 people had expressed an interest in doing so.

At least one US citizen, 22-year-old Marine Corps veteran Willy Joseph Cancel, was killed in action.

American killed in Ukraine was a volunteer, other fighters say

Drueke served two tours in Iraq with the US military, leaving around 2010 as a staff sergeant, his mother said. He had struggled with post-traumatic stress since leaving the military, but seemed to find purpose in the Ukraine mission, she added.

Huynh served in the Marine Corps for a few years, including on the Japanese island of Okinawa, his fiancée said.

The Washington Post could not immediately verify the military service history of either man.

Lois Drueke said she last spoke with her son by phone on June 5, then received a message three days later on the Signal encrypted communications platform. His message said he would “go dark” and unreachable for a few days, and would be in touch again after completing a mission.

Alice Crites and Missy Ryan contributed to this report.

Stealth Linux malware. Aoqin Dragon targets Southeast Asia and Australia. Iranian spear-phishing campaign. BlackCat RaaS described.

0

In one look.

  • Stealth Linux malware.
  • Aoqin Dragon targets Southeast Asia and Australia.
  • Iranian spear-phishing campaign.
  • BlackCat RaaS described.

Stealth Linux malware.

Researchers from Intezer and BlackBerry have discovered a very stealthy strain of Linux malware dubbed “Symbiote”. Notably, the malware is a shared object library that infects all processes running on a machine:

“What differentiates Symbiote from other Linux malware we usually encounter is that it has to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable running to infect a machine, it is a shared object library (SO) which is loaded into all running processes using LD_PRELOAD (T1574.006) and infects the machine from Once it infects all running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability. “

Researchers believe that Symbiote was designed to target the financial sector in Latin America.

Aoqin Dragon targets Southeast Asia and Australia.

Sentinel One has published a report on a Chinese threat actor nicknamed “Aoqin Dragon” (pronounced, roughly, “ow-keen”) who conducts cyber espionage in Southeast Asia and Australia:

“We assess the primary threat actor to be espionage and relates to targets in Australia, Cambodia, Hong Kong, Singapore, and Vietnam… The threat actor is familiar with using lures documents with pornographic themes to infect users and makes heavy use of USB shortcut techniques to spread the malware and infect additional targets.Attacks attributable to Aoqin Dragon typically drop one of two backdoors, Mongall and a modified version of the Heyoka open source project.

Iranian spear-phishing campaign.

Checkpoint observed an Iranian spear-phishing campaign that targeted “former Israeli officials, high-ranking military personnel, researchers at research institutes, think tanks, and against Israeli citizens”. The attackers set up a fake URL shortening service, “Litby[.]us”, to redirect users to a fake Yahoo login page:

“One of the simple goals of this campaign is to gain access to its victims’ inboxes, especially for Yahoo inboxes from the feeds we observed. Phishing pages include several steps: ask the user’s account ID followed by an SMS code verification. Interestingly, the truncated phone number in the phishing page was customized specifically for the target and matches public records. We suspect that a once the victim entered their account ID, the phishing backend would send a password recovery request to Yahoo, and the 2FA code would allow attackers to access the victim’s inbox.”

BlackCat RaaS described.

Microsoft released a report on the BlackCat ransomware-as-a-service operation. The researchers said, “BlackCat is one of the first ransomware written in the Rust programming language. Its use of a modern language illustrates a recent trend where threat actors are switching to languages ​​like Rust or Go for their payloads in their attempt to not only avoid detection. by conventional security solutions, but also to challenge defenders who might try to reverse engineer said payloads or compare them to similar threats. BlackCat can target and encrypt Windows and Linux devices and VMWare instances. It has extensive capabilities , including affiliate-configurable auto-propagation for their usage and environment encountered.”

5 Advantages and Disadvantages of Mass SMS Marketing

0

YONKERS, WESTCHESTER, NY – June 14, 2022 – They say work smarter, not harder, and that sentiment could no longer hold true in modern marketing. Every marketer wants to reach as many people as possible in the shortest possible time, which is essential given how fast things are changing today.

As cold calling and emailing existing and potential audiences becomes less effective, texting has become a preferred communication channel for many. Getting your message across via text can be very effective with the right strategy, and many businesses regularly use bulk texting services.

Bulk SMS is a marketing tool that simultaneously sends promotions, alerts or any other type of message to hundreds or thousands of recipients. There are many benefits to mass texting; fortunately, running a successful campaign shouldn’t be difficult.

This brief guide will help you discover the benefits of starting a mass texting campaign and what to avoid.

Pros: Bulk SMS is profitable

One of the best advantages of using a mass texting service is its cost effectiveness as a means of communication. By sending a mass SMS, companies, schools and municipalities can reach many people in a short time.

Contact methods such as snail mail and emails take longer to compose and are less cost effective than text messaging. The same can be said for cold calling, which requires a dedicated team of phone reps if you’re not using an automated dialing system.

Disadvantage: less human connection

There is something to be said for the human connection when it comes to marketing; in many situations, it remains an essential asset. For example, mass texting is a fantastic strategy for reaching multiple people simultaneously, but it can feel robotic if you’re not careful how you craft your message.

A simple solution to this potential problem is to take the time to develop your message and communicate it to your audience with enthusiasm and tact. Use language that sounds human and give your recipient simple instructions to follow in your call to action.

Advantage: quick form for wide reach

Nothing beats mass texting when you need to reach lots of people quickly. Sending a bulk text is easily one of the best communication methods used in marketing campaigns today. Having the ability to have a fast and wide range is extremely important in situations where you need to alert a large population as quickly as possible.

Municipalities often use mass texting services to send emergency broadcasts because almost everyone has a smartphone and immediately checks an SMS. Likewise, if a school needs to reach out to the student population about a closure or event, they can reach out to their entire school in no time.

Disadvantage: people might think it’s spam

We’re no strangers to daily “Scam Likely” calls. With the scale of spam, it’s easy to feel hesitant about alerts from unknown contacts. People tend to be more cautious of content that could be construed as spam and are unlikely to interact with anything they deem dangerous.

There is a simple workaround and ways to avoid sending texts that look like spam. First, communicate who is sending the message and for what purpose. If the recipient knows why they are receiving a message, they will respond more positively. Also be mindful of how often you are mass texting, as communication is off-putting and can alienate voters.

Pros: Bulk texting is super easy

Marketing is a demanding profession that requires being on the lookout for trends and thinking outside the box. Therefore, finding a way to make your job easier is a must and pays off over time. The great thing about mass texting is that it’s easier than you might imagine and a reasonably streamlined process overall.

All you need to do is compose a thoughtful message, select the contacts you want to receive the text from, and select the best time and date to reach them. Bulk texting services and software do the heavy lifting in creating the code, so marketers just hit send when everything is ready.

Set up a mass marketing campaign now

As you have read, setting up a mass marketing campaign has many advantages, and the disadvantages are easily avoidable with little practice and know-how. At this point, any business with a large audience to reach needs a mass texting service.

Learning how to run a mass texting campaign can dramatically improve your reach or help build customer loyalty. Best of all, mass texting software is generally user-friendly, so you shouldn’t feel nervous about learning it.

MP Adam van Koeverden apologizes after dropping F-bomb on Canadian vaccination mandates

0

Ontario MP Adam van Koeverden has apologized for insulting a Canadian living abroad who called the former Olympian “a disgrace of a Canadian” for the way he addressed his concerns about the mandates of vaccination.

“Last week I let my emotions get the better of me and I responded in an unacceptable way to a direct message, and I regret that,” said van Koeverden, who represents the Ontario riding of Milton for the Liberals. , in social media. Publish.

“I want to apologize to the person I offended with the message and anyone else I let down.”

Kate Faith, a teacher from Brantford, Ontario. who lives in New Zealand, told CBC News she was not vaccinated. She said she decided against getting the vaccine because she feared she would suffer a reaction that would prevent her family from visiting her in New Zealand.

Faith said vaccination mandates requiring all passengers coming to Canada to be fully vaccinated prevent her from boarding a flight to Canada to visit her parents or attend important family events.

“Last year my grandfather passed away and I had to watch his funeral on FaceTime and right now my uncle is sick and I’m not allowed to come home and see him,” she said.

Faith told CBC News she was fired from her teaching job in November due to her vaccination status. She said she returned to teaching in April when vaccination mandates in New Zealand were dropped.

She said she had written to all Liberal and New Democrat MPs expressing her frustration over the length of Canada’s vaccination mandates, but none of them responded. She said she started contacting MPs on Instagram, but only one MP responded.

In a tense Instagram exchange with van Koeverden, she asked the MP why the vaccination mandates are still in place and suggested it had to do with “corruption and MPs not doing the right thing”.

A tense exchange

“Well, you seem a lot smarter than the epidemiologists I talk to. Sorry for answering,” van Koeverden said in a response.

Faith told van Koeverden that she was a 29-year-old woman who had COVID two months ago and asked her why she wasn’t allowed to fly.

“Not here to tell you Kate, later,” van Koeverden replied.

Faith urged van Koeverden to get evidence to support the vaccination warrants and called the MP “a Canadian’s disgrace”.

“Fuck you,” van Koeverden replied.

Former Olympian Adam van Koeverden was elected to the House of Commons as a Liberal MP in 2019. He is now Parliamentary Secretary to the Minister for Health and Minister for Sport. (Canadian Press)

The MP added that he had ‘made a mistake responding to someone like you’ and wished Faith ‘good luck’.

“He wasn’t receptive and he was quite condescending, just saying I’m not a scientist, but neither was he,” she said. “He just took it all away and said it was justified and said fuck off because I called out his negative behavior.”

Van Koeverden said in his Twitter post that he realizes the past two years have been exceptionally difficult for everyone.

“Going forward, I will work to be more patient and conduct myself with the high standard that people deserve from their elected representatives,” he said in his apology.

MPs need to listen: Lantsman

Faith said Conservative MP for Toronto Melissa Lantsman, who called for an end to vaccination mandates in the House of Commons, responded to her directly about her concerns.

“We told her we were working to reunite her with her family,” Lantsman told CBC News.

Lantsman said that while being an MP is hard work and it can be difficult not to lose your temper, people need to know that MPs are listening to them about their concerns.

Faith said she saw van Koeverden’s tweet back in her language and didn’t think it was genuine.

“I think it would be pretty cool and important for him to reach out to me and apologize. Otherwise, I think it’s just lip service,” she said.

Pumping Now: Launch of the Fuel Information Management System

0



The Information and Communication Technology Agency (ICTA) has announced the launch of the Fuel Information Management System to improve the efficiency of fuel distribution nationwide.

The initiative is a collaboration between ICTA, Ceylon Petroleum Corporation and the Ministry of Power and Energy.

The fuel information management system will provide the public with visibility into which gas stations are offering fuel and what is available. During the first phase, the system will be updated daily in the morning with fuel shipment information, as well as fuel station details, amount of fuel shipped and stock availability.

The public could search fuel availability by location, gas station and fuel type and the platform will be accessible via web, mobile and SMS. Implementing the system would alleviate the burden, time and hassle of the public queuing at gas stations not knowing when the next tanker of fuel will be received by the gas station.

ICTA Chairman Jayantha De Silva said, “We are pleased to introduce this system with the Ceylon Petroleum Corporation and the Ministry of Power and Energy. Our teams have worked tirelessly to implement this system and we believe it is a timely move to ease the hassle and burden faced by the public.

During the second phase of the system’s implementation, gas stations will be able to issue tokens to the general public. At the same time, the public could also subscribe to updates once stations start rebroadcasting fuel. This feature will soon be available in the system.

The public can log into the system via fuel.gov.lk and follow the instructions. Moreover, one can also use the SMS function by following three simple steps.


1.Step 1 – Type FUEL and send to 1919

2.Step 2 – Fuel availability information will be displayed as follows,

a.Name of shelter

b. Shed phone number

c.Available fuel capacity: P92 (capacity), P95 (capacity), D (capacity), SD (capacity), Kerosene (capacity)

d.Bowser dispatched date and time

e. Date and time of last update


Softball Tournament Honors Shenendehowa’s Deanna Rivers

0

Meanwhile, another road tragedy forever changes the lives of family members and friends who mourn the loss of another student’s young life.

“That crash on the Northway last weekend was very similar to ours,” said Debbie Rivers, Deanna’s mom. “She was probably coming home and doing nothing wrong and this guy hits her and now she’s gone and he’s walking around. It’s maddening actually.

In that May 28 crash, a New Jersey man was arrested and charged with drunk driving and speeding in a crash that killed a 22-year-old University of Albany student. He now faces charges of manslaughter and aggravated homicide while driving a vehicle. On June 3, mourners gathered at Ballston Spa to bid farewell to crash victim Katryn Fisher on Friday.

Deanna Rivers and her friend Christopher Stewart, both students at Shenendehowa High School, were killed in a drug and alcohol-related crash on the Northway in Saratoga County 10 years ago in December.

The softball tournament gives the high schoolers one last game to end their high school careers while honoring Rivers’ memory. She and Stewart were killed at 17, just months after graduating.

The close-knit softball community that has been such a big part of Deanna Rivers’ life continues to serve as the backbone of an organization that has raised approximately $75,000 over 10 years. This money was distributed to a long list of organizations in the Capital Region, from Joseph’s House, a shelter in Troy where Deanna volunteered for her church, to first responder organizations who worked at the site of the crash and helped save Stewart’s and Rivers’ lives. friends, Bailey Wind and Matt Hardy, who both suffered serious injuries. The foundation has supported Albany’s Westland Hills baseball and softball organization and other community sports programs. The prevention of drunk driving and impaired driving is a permanent mission of the foundation.

“Every organization we donate to, everything we do, has something to do with it,” Debbie Rivers said. “That’s how she was. She was always the child who wanted to help others and give back. It was just his nature.

Shenendehowa Superintendent L. Oliver Robinson will speak at this year’s event.

“Deanna Rivers is the epitome of Shen Pride. Her legacy is an important message for our current and future students at Shen – how she gave back to her community and how she excelled in the classroom and on the softball field – is a story we are proud to share,” Robinson said. . “The Deanna Rivers Foundation has provided our community with connection through sports while awarding scholarships to future leaders, supporting their dreams in memory of Deanna.”

The return of the tournament will be a kind of reunion.

“We ran the tournament flat out and then COVID hit,” Brian Rivers said.

The peak year was 2019. Deanna Rivers softball jersey was number 19 and in 2019 the group gave away $19,000 to the community.


But the pandemic has not stopped their efforts. In 2020, foundation volunteers purchased, packaged, collected and distributed $20,000 worth of food to needy families and overloaded the shelves of the Shenendehowa Helping Hands Food Pantry at Jonesville Methodist Church.

Tournament organizers this year opened the list of softball players who graduated from the classes of 2020 and 2021 and who missed the tournament due to the pandemic.

In the past seven years of hosting the tournament, 72 high schools have been represented.

“Being able to reunite the girls from the past two years who haven’t had the opportunity to play means a lot to us,” said Brian Rivers. Some of these players are friends of their daughter Jenna, who played softball for Shen. Jenna Rivers is also a foundation board member and has just completed her freshman year at Siena College. She plans to get her master’s degree and work as a high school teacher.

The foundation’s board of directors and tournament volunteers, including coaches and referees, have been instrumental in helping the organization achieve its goals. A long list of businesses in the Capital Region donate food and supplies as well as giveaways for the draws.

“So many people have stood by us – and continue to stand by us – over the past 10 years,” Debbie Rivers said. In 2022, in honor of the foundation’s 10th anniversary, an additional $10,000 will be distributed.

PJ Anadio of Herkimer Community College, Mike Brehm of Shaker, Gary Sears of Niskayuna, and travel softball coach Tim O’Gorman served as head coaches throughout the tournament’s eight years. Deanna’s uncle and longtime assistant coach Joe Lanzone joins fellow assistant Lexi Garrison as key volunteers.

Garrison, who is PJ’s assistant coach for the purple team, participated in the 518 Memorial Tournament in 2019 and later played at Herkimer.

“PJ is quite special. Every year, for his team, he only gives his number 19 jersey to someone who replicates what Deanna was. He will choose a player, he will let us know and then we will write him a letter. He also puts on a number 19 banner. PJ and Deanna hit it off and he was trying to recruit her to play Herkimer,” Debbie Rivers said. “I think she brought him into our lives for a reason and he’s been there ever since.”

Shenendehowa softball assistant coach Stephen Decker will lead a children’s clinic with the help of former Shenendehowa softball students. At last count, 55 children were registered.

Deanna Rivers Foundation 518 Memorial Softball Tournament

Sunday 10 a.m. at Miss Shen Fields, Clifton Common Boulevard, Clifton Park

  • Fans are welcome, raffle tickets for gift baskets and donations will be collected at the tournament
  • Raffle tickets can also be purchased through Venmo until noon on Sunday. Donations and raffle ticket purchases can be made through Venmo at @DMRfoundation. Ticket purchasers do not need to be at the tournament to win.

This column is sponsored by Times Union [email protected], the Capital Region’s network of business and professional women. Register today at: https://womenatworkny.com


“I will never forget that night,” Decker said of the accident. “I got the phone call that morning because one of the other kids involved in the accident (Hardy) who I actually had on my JV baseball team at the time. Now, to come full circle and be asked to help is an honor. I worked with Jenna Rivers during my first year working with Shen’s softball program. It will be a nice feature to have all the kids back this year who missed out due to COVID. It will be great to see everyone again.

Liana Bonavita, News10ABC’s soon-to-be-changing athletic director, is the tournament’s emcee.

When the final pitch rolls on Sunday, a champion is determined and a Bonavita-chosen MVP wins a $500 purse. Then the Rivers family will move on to another mission. They will turn their attention to another parole hearing for Dennis Drue, scheduled for July. Drue, 30, formerly of Halfmoon, is serving a 5- to 15-year sentence at the medium-security Collins Correctional Institution in Erie County for the Dec. 1, 2012 crash that killed Rivers and Stewart. In September 2013, Drue pleaded guilty to the 58 charges he faced while admitting he was drunk, speeding and texting when he drove his Volvo sedan into the back of the teenagers’ vehicle, a Ford Explorer.

They plan to create another petition on Change.org and write letters against his release from prison. Around 21,000 people signed the petition while he was on parole in 2020.

Debbie Rivers said she has supported other mothers who have lost children and also speaks in schools about preventing DWI. She recently spoke to students participating in the Anti-DWI Billboard Project at Shenendehowa High School. Prom and graduation seasons are often when school and police officials spend time pleading with teens not to drive while impaired by drugs or alcohol.

“I have met three or four mothers who have lost a child in an accident and we are still in touch. So we help each other get through this together. And I talk to the classes and I just tell my story and you’re just trying to save a life and touch those kids,” Debbie Rivers said.

Just as parents of school shooting victims relive the nightmare every time another mass shooting occurs, victims of DWI-related deaths also find themselves in trouble when other families suffer the same fate.

“People don’t look beyond the accident. You know what I mean? They don’t know what’s going on at every party,” Debbie Rivers said.

“Every birthday,” added Brian Rivers.

Deanna Rivers has always brought out the best in everyone, her parents said. And it is memory that gives them—and its foundation—its strength.

Joyce Bassett’s All In column usually publishes Mondays in the Times Union.

A gun dealer looking to open in Riverhead is the author of a blog disparaging Jews, black people and praising the founder of the Proud Boys hate group

0

A firearms executive seeking to open on Elton Street in Riverhead wrote a blog for several years in which he espoused views accusing Jews of controlling Congress, posted racist views about black people and launched a campaign to funding for the legal defense of a member of the Proud Boys after the man had been convicted of stabbing another man during a political confrontation.

Anthony Niosi, director of Niosi Firearms Development, which proposed a shooting range, firearms training center and gun store at 680 Elton Street, ran the “SPQR.Today” blog from December 2011 to September 2017.

Niosi in his blog refers to Proud Boys founder and former leader Gavin McInnes, a supporter of violent extremism, as “one of the essential resources for the thinking right”.

Niosi talks about McInnes, whom he describes in the blog post as “an acquaintance”:

“His articulate defense of traditional values ​​and his success in illuminating the fascist tactics the militant left employs to silence conservatives came at a cost,” Niosi wrote.

In a pitch to donate to “Tommy’s Legal Defence” (September 3, 2017), Niosi called out Tommy Christiansen, the Proud Boys member just convicted in the stabbing incident, one of “mostly individuals anonymous caught in the emerging violence of the militant left.

McInnes, co-founder of VICE Media, founded the Proud Boys in the midst of the 2016 presidential election. The Proud Boys describe themselves as “western chauvinists” with an “anti-politically correct” and “anti-white guilt” agenda.

Niosi said in a Thursday night text-messaging interview that he didn’t know McInnes well.

“I only met Gavin once, I guess over six years ago,” Niosi said. “He, his wife, his two daughters and then his infant son visited my house on Dune Rd, WHB. We had been introduced by a mutual friend, and at the time I knew him as someone who had been on Fox TV for several years, basically, if memory serves as a comedic commentator,” Niosi wrote in a text. He called the occasion a “chilling interaction” and said: “I’m not aware of what he’s advocating right now.”

However, he said, “I don’t mean…I’m oblivious to the Proud Boys as part of the zeitgeist.”

In his blog, Niosi called black people “groans about American racism” that “I’ve heard all my life. Barack Obama’s election in 2008 came with ‘a silver lining’ in that “His victory would be to ‘pay for’ the whining…”, he wrote. (“Blue Lives Matter”, July 15, 2016.)

“After a trillion dollars (yes, with a ‘t’) spent on Great Society programs over the past 50 years, the vast majority of black Americans have, fortunately, been given the opportunity to rise to the highest positions. prestigious in our company,” Niosi continued.

“And the dregs then? Activists, dependent multigenerationals, anarchists, nihilists?

“I’m starting to think that skin color is no longer a barrier to getting elected or a multi-million dollar network deal.

“I’m beginning to think the barrier is immersion in ghetto culture, violence, misogyny, rejection of education, and imitation of gang appearance and speech,” Niosi wrote.

He continues, offering advice to “drop the ghetto/gang talk, dress, and attitude” because “America has evolved to the point where the choices of an individual, not the chance of race, will determine his fate. (As written.)

“AnyHowitzer, let’s hope the current situation defuses before self-isolating thugs learn that the locks on our front doors are for their protection, not ours,” he concludes. (As written.)

In a June 29, 2017 article titled “Run…don’t walk,” Niosi addressed the question of whether a person crossing the street “while being approached by a black person” to avoid passing by is racist. Statistics provided by the NYPD show “you shouldn’t cross the street in New York when approached by a black person; they should run,” Niosi wrote, noting that the percentages of those arrested by the NYPD for major violent crimes who are black were disproportionately higher than the percentage of blacks in New York’s population, offering a “logic” that doesn’t does not take other factors into account. , such as the predispositions of arresting officers or the focus on arrests in relation to the crime committed.

Niosi devotes many of his blog posts to discussions of Jews, Israel, and US policy toward Israel and the Middle East. He is an advocate for the BDS (Boycott, Divestment, Sanctions) movement and calls Zionists and Congress members and the media “Israel’s fifth column”.

He says American Jews have ‘dual loyalties’, meaning they are loyal to Israel as well as the United States

“And not to be outdone, Diaspora Jews have been granted infinite preferential treatment by claiming anti-Semitic threats against their synagogues, schools, businesses, lives and personal property. Almost all of these threats have come to light under false flags with the recent arrest of Mr. Michael Kadar, a Jew with American and Israeli citizenships. (As written.)

Referring to an article by Victor Davis Hanson, Niosi writes: “Jew’s [sic] The problem is that they refuse to assimilate. Paranoid for their safety (even in America, their last best hope), they shun their loyalties and are seen as “internationalists” or “cosmopolitans”. And when bad times inevitably follow good ones; as ‘F-ing Treaters’ with divided loyalties.

Niosi said in a text last night that he had ‘no general opinion on any race or religion’. If RiverheadLOCAL’s request for comment on the views it has published on blacks and Jews “is designed to imply bias,” he said, “I will rely on forty years of working with all the ethnicities and religions, including my current business partner. I will freely admit that a reading of some of my polemics clearly illustrates my opposition to any theocratic governance that upsets the opinion of current liberal and academic thought,” he said. he declares.

“One can oppose the actions of a nation without opposing the individual citizens of that nation,” Niosi said.

Michele Lynch, vice president of the Riverhead Anti-Bias Task Force, said today that Niosi’s blog statements should be a red flag for the town of Riverhead.

“Someone making statements like this on a blog is definitely not someone the city should be doing business with — especially this kind of business,” Lynch said.

“These are racist and anti-Semitic thoughts,” she said.

The name of Niosi’s blog itself is associated with the white supremacist movement.

SPQR is an acronym for the Latin phrase “Senatus Populusque Romanus” meaning “The Roman Senate and People”, which in Roman antiquity was a shorthand way of designating the entire Roman state.

“SPQR” has since been adopted by American white supremacist groups as a symbol of their movement. For example, he appeared on flags at the Unite the Right rally in August 2017.

Niosi said he was unaware that “SPQR” had been adopted as a hate symbol by white supremacist groups.

He said he was a lifelong student of Roman history and pointed out that SPQR is the title of a book by classics professor Mary Beard, which he said he was currently reading.

The survival of local journalism depends on your support.
We are a small family business. You rely on us to stay informed, and we rely on you to make our work possible. Just a few dollars can help us continue to provide this important service to our community.
Support RiverheadLOCAL today.

Learn more about Passkeys, passwordless login technology coming to iOS 16 and Android

0

This story is part WWDC 2022CNET’s full coverage from and about Apple’s annual developer conference.

What is happening

Apple and Google will update their phone software and web browsers later this year with a technology called passkeys, designed to be easier to use and more secure than passwords.

why is it important

Passwords are plagued with problems, but tech giants have cooperated to design a convenient alternative that reduces vulnerabilities and hacking risks.

Apple and Google will introduce support for security keys later this year, a new login technology that promises to be more secure than passwords for protecting access to our bank accounts and emails. Apple demonstrated security keys at its Worldwide Developers Conference and said they would come iOS16 and Mac OS Ventura this autumn.

Access keys are as easy – perhaps easier – to use than passwords. They replace the riot of keystrokes needed for passwords with biometric verification on our phones or computers. They also stop phishing attacks and banish the complications of two-factor authentication, such as SMS codes, which reinforce weaknesses in the password system.

After you set up a password for a site or app, it’s stored on the phone or personal computer you used to set it up. Services like Apple’s iCloud Keychain or Google’s Chrome Password Manager can sync passkeys across your devices. Dozens of tech companies have developed the open standards behind security keys in a group called the FIDO Alliancewho announced security keys in May.

“Now is the time to embrace them,” said Garrett Davidson, authentication technology engineer at Apple, in a WWDC talks about access keys. “With access keys, not only is the user experience better than with passwords, but whole categories of security – like weak and reused credentials, credential leaks, and phishing – are simply no longer possible.”

You will have to spend some time on the learning curve before security keys reach their potential. You’ll also need to decide if Apple, Microsoft, or Google is the best option for you.

Here is an overview of the technology.

What is a password?

This is a new type of login ID consisting of a bit of numerical data that your PC or phone uses when connecting to a server. You approve each use of this data with an authentication step, such as fingerprint verification, facial recognition, a PIN, or the login pattern familiar to Android phone owners.

Here’s the catch: you’ll need to have your phone or computer with you to use the passkeys. You cannot log into a password-secured account from a friend’s computer without your own device.

Security keys are synchronized and backed up. If you get a new Android phone or iPhone, Google and Apple can restore your security keys. With end-to-end encryption, Google and Apple cannot see or change access keys. Apple has designed its system to keep security keys safe even if an attacker or Apple employee compromises your iCloud account.

How does setting up a password work?

It’s quite simple. Use your fingerprint, face, or other mechanism to authenticate a passkey when a website or app prompts you to set one up. That’s it.

A three-step illustration of the authentication key login process on an Android phone

These steps show how to sign in with passkeys on an Android phone: choose the passkey option, choose the appropriate passkey, and authenticate with a fingerprint ID. Facial recognition is also an option on compatible phones.

Google

How do I use a password to log in?

When using a phone, a password authentication option appears when trying to log into an app. Tap that option, use your chosen authentication technique, and you’re there.

For websites, you should see a password option in the username field. After that, the process is the same.

Once you have a passcode on your phone, you can use it to make logging in easier on another nearby device, like your laptop. Once logged in, this website may offer to create a new password related to the new device.

What if I need to log into a website while using someone else’s computer?

You can use a password stored on your phone to log in to another nearby device, like a borrowed laptop. The login screen on the borrowed laptop will have the option to present a QR code that you can scan with your phone. You’ll use Bluetooth to make sure your phone and computer are nearby, and then let you use fingerprint or face ID verification on your own phone. Your phone will then communicate with the computer over a secure connection to complete the authentication process.

Why are access keys more secure than passwords?

Access keys use a proven security foundation called public key cryptography for the login operation. It’s the same technology that protects your credit card number when you enter it on a website. The beauty of the system is that a website only has to base its passkey record on your public key, data designed to be openly visible. The private key used to set up a password is stored only on your own device. There is no database of passwords that a hacker can steal.

Another great advantage is that security keys block phishing attempts. “Security keys are inherently tied to the website or application for which they were configured, so users can never be tricked into using their security key on the wrong website,” Ricky Mondellowho oversees authentication technology at Apple, said in a WWDC video.

Using passkeys requires you to have your device at hand and be able to unlock it, a combination that offers the protection of two-factor authentication but with less hassle than SMS codes. And with passkeys, no one can snoop over your shoulder to watch you type in your password.

When will I see the access keys?

Master keys could emerge this year.

At its Worldwide Developers Conference, Apple said it will bring access keys to iOS 16 and MacOS Ventura, its major operating system software updates expected this fall. In May, Google said it would bring support for Android software passkeys by the end of 2022 for developer testing, said Google Authentication Manager Mark Risher. Passkey support is expected to arrive in Chrome and Chrome OS at the same time. Microsoft is planning Windows support in the coming months.

Some websites and apps will be eager to update their login software to use security keys so that they can enjoy the security benefits. Others will move more slowly. Even though access keys are spreading rapidly, don’t expect passwords to disappear.

Will websites and apps require me to use passkeys?

You are unlikely to be forced to use security keys when the technology is new and unfamiliar. Websites and apps you already use will likely add passkey support to existing password methods.

A person uses a phone to scan a QR code to activate passkey login on a nearby computer

If you need to connect to a friend’s computer who doesn’t have your password, scanning a QR code will allow your phone to handle the authentication process.

Apple

When you sign up for a new service, Access Keys may be presented as the preferred option. Eventually, they may become the only option.

Will access keys lock me into the Apple or Google ecosystems?

Not exactly. Although security keys are rooted in a company’s technology suite, you will be able to disconnect, for example, from the world of Apple to use security keys with those of Microsoft or Google.

“Users can sign in on a Google Chrome browser running on Microsoft Windows, using a password on an Apple device”, Vasu Jakkala Microsoft leader in security and identity technologies, said in a blog post in May.

Passkey advocates are also working on technology to allow people to migrate their passkeys from one area of ​​technology to another, according to Apple and Google.

How are password managers involved with access keys?

In short, they are not, for the moment. Password managers are playing an increasingly important role in generating, storing, and synchronizing passwords. But the passkeys will be rooted to your phone or personal computer, not your password manager.

That could change, however.

“We expect a natural evolution toward an architecture that allows third-party passkey managers to plug in and portability across ecosystems,”

Google’s Risher expects security keys to evolve to reduce barriers between ecosystems and accommodate third-party security key managers. “That’s been a talking point since the start of this industry push.”

1Password maker AgileBits has just joined the FIDO Allianceand DashLane and LastPass are already members.

Brazil asks Mexico to solve the problems that delay travelers

0

Passengers, wearing protective masks following an outbreak of the coronavirus disease (COVID-19), wait for flights at the Aeromexico counter at Benito Juarez International Airport in Mexico City, Mexico, July 1, 2020. REUTERS/Edgard Garrido

Join now for FREE unlimited access to Reuters.com

Register

MEXICO CITY, June 9 (Reuters) – Brazilian officials on Thursday expressed concern over a bureaucratic standoff thwarting the plans of hundreds of Brazilians trying to travel to Mexico.

Brazil’s foreign ministry said hundreds of Brazilians are unable to process an electronic authorization required to enter Mexico and it is following the matter “with concern”.

The ministry added in a statement that it had requested urgent action from the Mexican Ministry of Foreign Affairs and Tourism and the National Institute of Migration (INM) to resolve the problem with the website that processes the authorization.

Join now for FREE unlimited access to Reuters.com

Register

Mexico ended a visa waiver program for Brazilians in December 2021, but Brazilians traveling by air can enter Mexico if they submit a so-called electronic authorization form 30 days before travelling.

About 200 people struggled to submit the form last week, according to news outlet GZH.

The Mexican consulate in Sao Paulo, whose Facebook page has been inundated with complaints, said in an email to Reuters that it was not involved in the electronic authorization process, noting that the service is provided by the Institute. National Migration Board (INM).

“INM’s electronic authorization system continues to experience problems. So far, there is no estimate when it will return to normal,” the consulate said, adding that those who need authorization should try again or make an appointment with the consulate to apply for a visa.

“I’m about to lose nearly 10,000 reais ($2,042) and see my dreams turn into a nightmare,” one person wrote on Facebook, while GZH quoted a couple saying they missed their flight for a five-day trip due to publish.

On the INM website, most requests received a message that the authorization “could not be processed”.

“If you want to travel to Mexico, you can go to a Mexican consulate to get a visa,” the post read.

Neither Mexico’s INM nor the ministries of foreign affairs and tourism immediately responded to a request for comment.

Join now for FREE unlimited access to Reuters.com

Register

Reporting by Carolina Pulice, Gabriel Araujo and Kylie Madry; Editing by Brendan O’Boyle

Our standards: The Thomson Reuters Trust Principles.