Sunday, March 31, 2013

North Carolina Standoff Ends With 3 Dead

HARRISBURG, N.C. -- Authorities in a Charlotte suburb say a man suspected of shooting two neighbors has committed suicide after a six-hour police standoff.

The Charlotte Observer is reporting that Cabarrus County sheriff's deputies said late Friday that the suspected shooter shot himself as deputies and SWAT team members surrounded the house where he was hiding.

Late Friday afternoon, deputies responded to a report of a man shooting a gun at a house. They said the suspect shot two neighbors in what was described as a neighborhood feud. Neighbors told the newspaper that the two victims were adult males.

WBTV-TV reports that a woman and her young children were able to escape the home where the initial shootings occurred.

Sheriff Brad Riley couldn't immediately be reached for comment by the Associated Press.

"; var coords = [-5, -72]; // display fb-bubble FloatingPrompt.embed(this, html, undefined, 'top', {fp_intersects:1, timeout_remove:2000,ignore_arrow: true, width:236, add_xy:coords, class_name: 'clear-overlay'}); });

Source: http://www.huffingtonpost.com/2013/03/30/north-carolina-standoff_n_2982780.html

mike the situation jacksonville jaguars jacksonville jaguars benjarvus green ellis shaka smart hungergames bagpipes

Man held in Paris over sawed off elephant tusk

PARIS (AP) ? Authorities say a man has been arrested overnight for allegedly breaking into Paris' Museum of Natural History and cutting off a tusk from a centuries-old elephant skeleton with a chainsaw.

A police official said a neighbor of the Left Bank museum alerted authorities after hearing the sawing sound at around 3 a.m. Saturday.

The suspect, about 20 years old, had the tusk in his possession when police arrested him soon afterward outside the museum. Paris prosecutors' office spokeswoman Agnes Thibault-Lecuivre said the motive of the suspect wasn't immediately clear.

Museum official Jacques Cuisin told BFM-TV that the skeleton, which was draped under a plastic covering Saturday, belonged to an elephant that Portugal's king gave to French King Louis XIV in the late 17th century. Cuisin said it can be repaired.

Source: http://news.yahoo.com/man-held-paris-over-sawed-off-elephant-tusk-201654767.html

free ecards flying car masters golf tournament the replacements how to hard boil eggs new nfl uniforms derbyshire

'G.I. Joe: Retaliation' Introduces A Whole New Joe

Sequel to 2009's 'Rise Of Cobra' does a tonal turnaround, giving fans a more faithful adaptation of the real American heroes.
By Brett White


Dwayne Johnson in "G.I. Joe: Retaliation"
Photo: Paramount

Source: http://www.mtv.com/news/articles/1704530/gi-joe-retaliation-guide.jhtml

sleigh bells meek sturgis sturgis whitney houston laid to rest daytona bike week mary kay ash

Saturday, March 30, 2013

DSB2Go


Detect Safe Browsing to Go, known by the less wordy "DSB2Go," is a nifty USB device that offers users a locked-down personal Web browser to protect users' Web activity and accounts from malware designed to intercept login credentials and steal information. With DSB2Go, it doesn't matter if the computer has keyloggers or other types of malware installed, because all user activity and data are encrypted within the device's hardened browser. It is extremely easy to use, as the user just has to plug it in to the computer before logging into the site.

DSB2Go protects users from malware infections, phishing attempts, and pharming attacks. The device also foils man-in-the-middle and man-in-the-browser attacks. There is usually a trade off between security and convenience as the user gives up ease-of use to be secure, or being less secure in order to make it easy to use. DSB2Go balances the two successfully, as the only inconvenience is remembering to carry the USB device.

Many kinds of modern malware burrow deep into the user system in order to avoid being detected by antivirus and other security products. This means users may not even be aware their computers are infected with a banking Trojan or other data-stealing malware. When users access sensitive sites, such as online banking or business applications, from an infected computer, the malware intercepts login credentials and can take over the account. DSB2Go removes the uncertainty, since as long as the users are using the virtualized Web browser, all Web activity and data is encrypted and hidden from the malware. Even if the user is on a Zeus-infected computer, the malware can't penetrate the DSB2Go environment to access the data.

The device doesn't try to protect all Web activity but just those sites administrators identified beforehand in a whitelist on the management portal. Businesses can use DSB2Go as an extra layer of security to protect employees accessing certain business-critical applications, or roll out the service to customers accessing a specific online service. At $37.89 per device for an annual subscription, this can become a fairly expensive solution for large deployments, but Easy Solutions offers volume pricing and discounts.

Before making the plunge, businesses can also sign up for a 15-day free trial, during which they get three DSB2Go USB devices and the ability to whitelist up to three sites on the management portal.

Getting Started
Easy Solutions sent a USB device and created an account on the company's Detect Monitoring Service portal for this review. The company's IT administrator logs into the portal and navigates to the "DSB2Go" tab to activate devices, create groups, define "protected applications," and view usage activity. When I logged in, I saw the USB drive I had was already activated.

If I had additional devices, I could activate it using the serial numbers. I could? set a password for each device and assign a "group." Groups allow administrators to assign basic policies to the device, such as the types of applications the user could access and authentication requirements.

Groups, Devices, Sites
After creating a group, I can set the device's security level?entering the device password or a unique username/password combination before the hardened Web browser launches?or turn it off to use the device without any restrictions. Each device is then assigned to a group.

This way, I could ensure all the devices within a department had the same security level.

The interface was pretty sluggish, which may have been the fault of the test environment I was using. The pages took a while to load when switching tabs, and some windows didn't close right away.

The whitelist lives in the portal's "protected sites" section. I listed all the URLs to sites users are allowed to access using DSB2Go. This part can get tedious quickly for applications which redirects across several subdomains since administrators must specify each address separately. Gmail redirects users to accounts.google.com before displaying the inbox on mail.google.com, for example. For this review, I listed Gmail, Salesforce, TDBank, and Bank of America. I listed both onlinebanking.tdbank.com and www.tdbank.com?for TDBank. If the URL I am adding has SSL (uses HTTPS), then I have to upload the site's certificate.

I can do this manually (downloading the site certificate through the regular browser, or if it is an internal application, using the SSL certificate I have) or use the "scan for certificate" feature. This nifty trick checks the URL and grabs the valid SHA1 fingerprint. Saving the SSL certificate protects users from domain hijacking and other spoofing attacks where users are maliciously redirected to other sites.

I assigned at least one group to each URL. This way, I maintained a single whitelist for the entire organization but could specify a subset for each group. If the site's group didn't match the device's group, the user would not be able to go to that site.

While the list is easy to create, it can get long pretty quickly because of the individual sub-domains that need to be rested. There is no quick way to search or sort the URLs. I was able to filter the view to display URLs assigned to specific groups, but overall, the list is unweildy to work with after a certain length.

The end-user doesn't have any control over what sites the device allows. The entire user experience is managed by the administrator via the portal. This is a great way for adding basic access policies to certain business applications.

Simple for Users
From the user perspective, it's dead simple: plug in the drive into the USB port and open up the special Web browser. The Web browser displays icons for each site the device is authorized to use. After about four or five sites, this screen appears really cluttered and there doesn't seem to be a way to sort the order the icons appear in.

Users click on the icon to go to the permitted site. If there is a problem with the SSL certificate, the user will be blocked.

Other than the fact that the user cannot type in a URL at all in the address bar, this special browser acts just like any other browser. Users can hit the back button to go back in the browsing session and open multiple tabs.

If while browsing through the approved application, an internal link goes to a different subdomain that wasn't already approved (such as customerservice.tdbank.com in the above banking example), the user is? automatically blocked. It would have been nice if the configuration service supported wildcards, so I could just say accept all *.tdbank.com sites without having to list each one individually. On the other hand, this means administrators have granular control, being able to specify which services are allowed: users are allowed to use Gmail and Calendar, but not Groups and Drive, for example.

The fact that the end-user doesn't have to download or install software was a big plus, although I wondered how many people would lose the USB drive or forget to keep it within reach.

I was disappointed the service is currently limited to only Windows users. Mac OS X and Linux users are currently not protected. When I plugged the device in to a Linux laptop, it didn't even detect anything in the USB port.

Secure Browsing?Up To A Point
There are other virtual browser options for businesses, but many of them are out of the SMB's reach. DSB2Go addresses the fact that SMBs need this kind of browser technology, too.

Since all the settings are handled by the cloud service, DSB2Go is perfect for active business travelers who use different devices or access the Internet using open networks, or for customers who need to access a specific service or application. I am concerned about the fact that there is no way for administrator to verify that users are actually using DSB2Go. The user can easily skip the drive altogether and just use the regular Web browser.

Taking advantage of security provided by DSB2Go requires a significant behavior change, as the administrator has to convince the end-user that using this device is worth the extra effort. Other than that, though, DSB2Go is a nifty device that can really help businesses keep their customers and employees while accessing sensitive Web sites.

Source: http://feedproxy.google.com/~r/ziffdavis/pcmag/~3/lKK7qH0jOWc/0,2817,2417213,00.asp

What Time Do Polls Open Krysten Ritter v for vendetta Voting Locations atlanta falcons voting hours election results

Treasury's Lew heading to Europe for talks on economy

WASHINGTON (Reuters) - U.S. Treasury Secretary Jack Lew will travel to Europe in early April, his second international trip since taking office a month ago, to discuss recent deterioration in the euro zone and prospects for boosting global economic growth.

Lew will travel to Brussels, Frankfurt and Berlin on April 8-9 to meet with the leaders of the European Council and the European Commission as well as European Central Bank chief Mario Draghi, among others, the Treasury said on Friday.

He will hold "discussions with his counterparts on economic developments in Europe and policies to boost global growth and promote financial stability," the Treasury said in a statement.

The euro zone crisis flared up again recently after a bailout of Cyprus' banks hit despositors for the first time since the crisis started, raising fears of contagion and possible bank runs.

(Reporting By Pedro Nicolaci da Costa; Editing by Chizu Nomiyama)

Source: http://news.yahoo.com/treasurys-lew-heading-europe-talks-economy-193801928--business.html

winning lottery numbers megamillions winner kansas jayhawks mega millions results louisville lotto numbers susan powell

Friday, March 29, 2013

Google to deliver goods quickly to online shoppers

SAN FRANCISCO (AP) ? Internet search leader Google is taking another step beyond information retrieval into grocery delivery.

The new service, called Google Shopping Express, will initially provide same-day delivery of food and other products bought online by a small group of consumers in San Francisco and suburbs located south of the city. The company, based in Mountain View, Calif., didn't say how many people will be part of the test.

If the pilot program goes well, Google Inc. plans to expand delivery service to other markets.

"We hope this will help users explore the benefits of a local, same-day delivery service, and help us kick the tires on the new service," Google said in a Thursday statement.

The delivery service is part of Google's effort to increase consumer reliance on the Internet, so it will have more opportunities to show online ads, which generate most of its revenue.

Google has learned that the more time people spend online, the more likely they are to use its dominant search engine or one of its other popular services, like its YouTube video site or Gmail, that include advertising.

The delivery service also could spur merchants to buy more online ads if Google's same-day delivery service encourages consumers to do more of their shopping online. Having to wait days or, in some cases, more than a week for the delivery of online orders ranks among the biggest drawbacks to Internet shopping.

It's a problem that Amazon.com Inc. and eBay Inc., which operate the largest e-commerce sites, already have been trying to solve by offering same-day service in some U.S. markets. Wal-Mart Stores Inc., the world's largest retailer, also offers same-day delivery in five markets.

A mix of national, regional and neighborhood merchants are enlisting in Google Shopping Express. The best-known names on the list include Target Inc. and Walgreen Co. All the merchants in the Google program will sell certain items through a central website. Google has hired courier services to pick up the orders at the merchant stores and then deliver them to the customer's home or office.

Although the couriers will be working on a contract basis, they will be driving Google trucks and wearing company-issued uniforms.

It remains unclear whether Internet shopping and same-day delivery can be profitable. Online grocer Webvan collapsed in 2001, largely because it couldn't devise a pricing plan that would pay for the costs of same-day delivery without alienating shoppers unwilling to pay too much extra for the added convenience.

Google is still trying to figure out how much to charge for its same-day delivery service. For the six-month test period in the San Francisco area, consumers won't have to pay a surcharge. Google instead will receive a commission from participating merchants.

The expansion into same-day delivery comes at the same time that Google is preparing to close some of its older online services so it can devote more attention and money to other projects.

The realignment has irked some Google users. The biggest complaints have centered on Google Reader, which allows people to automatically receive headlines and links from their favorite sites, and iGoogle, which allows Web surfers to design a page consisting of the Google search engine surrounded set up other online features, such as local weather reports and stock market quotes.

Google Reader is scheduled to close in July and iGoogle will shut down in November.

Google shares fell $8.47 to close at $794.19 on Thursday.

Source: http://news.yahoo.com/google-deliver-goods-quickly-online-shoppers-213009918--finance.html

july 4th Malware Monday First Row Sports American flag Happy 4th of July 4th Of July Desserts fireworks

Opinion: Same-sex marriage opponents' final argument (CNN)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS and RSS Feed via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/295467254?client_source=feed&format=rss

Jabari Parker 2012 australia Brothers Grimm Tate Stevens Miss Universe 2012 x factor

Say no to Gray Marriage (satirical take on gay marriage) (Americablog)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS Feeds and Widgets via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/295070000?client_source=feed&format=rss

Early voting results BBC Dick Morris Daily Show provisional ballot npr rush limbaugh

Shutterstock Launches Offset, A New Brand For Its Curated Collection Of Licensable Images

PrintThe leading online stock photography company Shutterstock launched a new search tool called Spectrum in January, which allowed users to search through the site?s 22 million images with keywords and specific colors. Today Shutterstock officially announced Offset, its new brand for its collection of top notch images that have been specifically curated for creative distinction and quality. ?These are images you?ll want to spend time with,? says Matthew Smith, director of New Products at Shutterstock.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/A8atFNi6Al0/

shumpert hopkins hopkins dear john derrick rose torn acl pacers undrafted free agents

Credit Card Interest Rate Roundup | Bankrate.com

  • 13.02% (all fixed)
  • 15.12% (all variable)

The average annual percentage rate, or APR, for variable-rate credit cards fell 3 basis points to 15.12 percent from 15.15 percent, according to Bankrate's latest survey of interest rates. A basis point is one-hundredth of 1 percentage point. The APR for fixed-rate cards remained at 13.02 percent.

The amounts that banks can charge before a credit card account is opened can't be capped, according to a final ruling Friday from the Consumer Financial Protection Bureau. The agency said any fees incurred before an account's opening are not subject to a provision in the Credit Card Accountability, Responsibility and Disclosure Act of 2009 that says fees in the first year can't exceed 25 percent of the credit card's limit. The ruling from the CFPB reflected a federal court ruling last year.

Source: http://www.bankrate.com/finance/credit-cards/rate-roundup.aspx

nick young elizabeth smart south dakota state long beach state beasley trailblazers michael beasley

Senate won't be on Judd's resume (CNN)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories Stories, RSS and RSS Feed via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/295240368?client_source=feed&format=rss

the shining mariano rivera mariano rivera jobs report tiger woods masters 2012 nikki haley stan van gundy

The Sne Stand Cradles Your iPad In Its Graceful Curve

We've all spent a lifetime staring at TVs several feet away, so it makes sense that man lacks the requisite strength to hold a tablet for prolonged viewing sessions. Resorting to a stand is nothing to be ashamed of, particularly if it's got the graceful curves of the sne. More »


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/0HcwKkuee4E/the-sne-stand-cradles-your-ipad-in-its-graceful-curve

erin andrews erin andrews tour de france Magic Mike Anderson Cooper Gay NBA draft 2012 alicia sacramone

Friday, March 22, 2013

Women pay the price for avoiding financial risk

Women need to "lean in" financially as well as professionally to overcome an inclination to avoid risk, according to a new report that shows men have more money invested in taxable securities, as well as their 401(k)s, IRAs and savings accounts.

The only accounts where women have higher average balances, the report said, are in relatively low-risk money market funds.

Women's reluctance to take risks and the potential shortfall they face in retirement have been a growing concern among policymakers and women's advocates. An opinion survey from Prudential insurance company last year found that while about 70 percent of men are willing to take financial risks, fewer than half of women were.

(Read More: More Women Are Breadwinners, But It's Complicated)

But the new report, released by the online rewards program for savings and debt-management SaveUp.com, is based on actual account balances entered by 20,000 site users in the past month and provides a remarkably clear and up-to-date snapshot of men's and women's financial habits.

The figures are stark and startling. The average man with a savings account had a balance of nearly twice as much as the average woman, and is taking an even greater advantage of high-yield tax-deferred instruments: Men's average IRA balance was 72 percent more than the average woman's, and they have 30 percent more in taxable investments.

(Read More: No Longer a Niche Market, Firms Target Female Investors)

"Insufficient market exposure is going to cause a compounding gap over time," said Priya Haji, CEO and co-founder of SaveUp, who follows Facebook COO Sheryl Sandberg's book in advising women to "lean in" on their professional life.

The one category in which women outdo men is staying out of debt, with the average American woman owing $34,645, versus the average man's $42,842. A large part of the American male's debt load, the study suggests, goes toward his car. Men carry 32.3 percent more in car-loan debt than women. Women also lead men in student loans, a promising sign that women are investing more in their futures.

(Read More:Nature or Nurture? Why Women Don't Save for Retirement)

But while it's a good thing that women are less encumbered, Haji said, their unwillingness to take on debt is just more of an indicator of a timidity that manifests itself in many of life's pursuits. "I'm not saying there aren't women who drive racecars or skydive. There are," she said. "But it's broader than just money. This is an aspect of our nature."

Women need to make a concerted effort to overcome this natural tendency by dedicating some portion of their income to investing in the market, and to seek out financial help from professional advisers.

The disparity in the sexes' respective accounts may also come from differences that are less innate. In short, women are not paid as much as men. Better investing and more education alone, Haji said, "won't offset lower salaries. The compounded effect of not negotiating for higher salaries, and regular increases over a career, is also feeding into the savings differential."

(Read More: Is Women's 'Retirement Gap' Really a Pay Gap?)

Women's aggregate pay is complicated, too, by childbearing and child care, which can take women out of corporate jobs during a time when their male counterparts are contributing steadily to employer-sponsored retirement accounts. (It's not clear from the SaveUp numbers how many female users included in the study are married, and therefore have some access to the higher average balances owned by men.)

"Leaning in," succeeding at work at home also be a drain on funds that women might otherwise invest. A recent survey sponsored by Working Mother magazine and the Chase Slate card showed that while working mothers look forward to a raise in 2013, they are more likely to use the extra money to take care of immediate financial problems. The survey's respondents said paying off debt was second only to balancing work and family among working moms' concerns.

"Younger women are not thinking about retirement," said Jennifer Owens, editor-in-chief of Working Mother. "For many of them, paying for child care is a bigger concern at this point."

? 2013 CNBC LLC. All Rights Reserved

Source: http://feeds.nbcnews.com/c/35002/f/653351/s/29d660c8/l/0L0Snbcnews0N0Cbusiness0Cwomen0Epay0Eprice0Eavoiding0Efinancial0Erisk0E1C8985288/story01.htm

London 2012 Track And Field Jordyn Wieber michael phelps Kerri Strug Ledecky Nadia Comaneci Rebecca Soni

SKorea misidentifies China as cyberattack origin

A South Korean police officer from Digital Forensic Investigation walks inside the Cyber Terror Response Center at National Police Agency in Seoul, South Korea, Friday, March 22, 2013. South Korea said Friday it was preparing for the possibility of more cyberattacks as a new team of investigators tried to determine if North Korea was behind a synchronized shutdown of tens of thousands of computers at six South Korean banks and media companies.(AP Photo/Ahn Young-joon)

A South Korean police officer from Digital Forensic Investigation walks inside the Cyber Terror Response Center at National Police Agency in Seoul, South Korea, Friday, March 22, 2013. South Korea said Friday it was preparing for the possibility of more cyberattacks as a new team of investigators tried to determine if North Korea was behind a synchronized shutdown of tens of thousands of computers at six South Korean banks and media companies.(AP Photo/Ahn Young-joon)

A South Korean police officer from Digital Forensic Investigation comes out from the Cyber Terror Response Center at National Police Agency in Seoul, South Korea, Friday, March 22, 2013. South Korea said Friday it was preparing for the possibility of more cyberattacks as a new team of investigators tried to determine if North Korea was behind a synchronized shutdown of tens of thousands of computers at six South Korean banks and media companies.(AP Photo/Ahn Young-joon)

A South Korean police officer from Digital Forensic Investigation walks inside the Cyber Terror Response Center at National Police Agency in Seoul, South Korea, Friday, March 22, 2013. South Korea said Friday it was preparing for the possibility of more cyberattacks as a new team of investigators tried to determine if North Korea was behind a synchronized shutdown of tens of thousands of computers at six South Korean banks and media companies.(AP Photo/Ahn Young-joon)

In this photo released by Korean Broadcasting System, KBS employees try to recover a computer server a day after a cyberattack caused computer networks at the company to crash, in Seoul, South Korea, Thursday, March 21, 2013. Investigators have traced a coordinated cyberattack that paralyzed tens of thousands of computers at six South Korean banks and media companies to a Chinese Internet Protocol address, but it was not yet clear who orchestrated the attack, authorities in Seoul said Thursday. The discovery did not erase suspicions that North Korea was to blame. IP addresses are unique to each computer connected to the Internet, but they can easily be manipulated by hackers operating anywhere in the world. (AP Photo/KBS)

Customers use the automated teller machine at a branch of Nonghyup Bank in Seoul, South Korea, Thursday, March 21, 2013. Investigators have traced a coordinated cyberattack that paralyzed tens of thousands of computers at six South Korean banks and media companies to a Chinese Internet Protocol address, authorities in Seoul said Thursday. Nonghyup Bank was one of the six targets. (AP Photo/Lee Jin-man)

(AP) ? In an embarrassing twist to a coordinated cyberattack on six major South Korean companies this week, investigators said Friday they wrongly identified a Chinese Internet Protocol address as the source.

A joint team of government and private experts still maintains that hackers abroad were likely to blame, and many analysts suspect North Korea. But the error raises questions about investigators' ability to track down the source of an attack that shut down 32,000 computers Wednesday and exposed big Internet security holes in one of the world's most wired, tech-savvy countries.

South Korean investigators said Thursday that a malicious code that spread through the server of one of the hackers' targets, Nonghyup Bank, was traced to an IP address in China. Even then it was clear that the attack could have originated elsewhere because hackers can easily manipulate such data.

But the state-run Korea Communications Commission said Friday that the IP address actually belonged to a computer at the bank. The IP address was used only for the company's internal network and happened to be identical to a public Chinese address.

"We were careless in our efforts to double-check and triple-check," KCC official Lee Seung-won told reporters. He blamed the error on investigators' rush to give the public details on the search for a culprit.

Yonhap news agency, in an analysis Friday, called the blunder "ridiculous" and said the announcement is certain to undermine government credibility.

Yonhap criticized officials for failing to dispel public anxiety in a country where people's lives are closely interwoven with services provided by media and financial institutions.

An initial assumption that the attack came from abroad may have made investigators jump to conclusions, said Lee Kyung-ho, a cybersecurity expert at Seoul's Korea University.

"They rushed," he said. "They should've investigated by checking the facts step by step."

The investigation will take weeks. Investigators have said the attacks appeared to come from "a single organization" and suspect the hackers were from outside the country. Lee Seung-won, the KCC official, discounted the possibility that the attack could have come from within South Korea, but he didn't elaborate.

Lee Kyung-ho and many other South Korean experts suspect North Korea is behind the attack on broadcasters YTN, MBC and KBS, as well as Nonghyup and two other banks.

While there are many possible explanations, he said, including a homegrown hacker, the culprits are most likely to be North Koreans angry over ongoing U.S.-South Korean military drills. Lee said Pyongyang is well aware that an attack on financial institutions and media companies would create lots of publicity and turmoil in South Korea's vibrantly capitalistic society.

North Korea has issued many threats against the South and the U.S. in recent days, but by Friday it had yet to mention the South Korean computer crashes in state-run media.

South Korean officials say they have no proof of Pyongyang's involvement. The country is preparing to deal with more possible attacks, presidential spokesman Yoon Chang-jung told reporters earlier Friday. He didn't elaborate.

Determining who's behind a digital attack is often difficult, but North Korea is a leading suspect for several reasons.

It has unleashed a torrent of threats against Seoul and Washington since punishing U.N. sanctions were imposed for Pyongyang's Feb. 12 nuclear test. It calls ongoing routine U.S.-South Korean military drills a threat to its existence. Pyongyang also threatened revenge after blaming Seoul and Washington for a separate Internet shutdown that disrupted its own network last week.

Seoul alleges six previous cyberattacks by North Korea on South Korean targets since 2009.

Wednesday's cyberattack did not affect South Korea's government, military or infrastructure, and there were no initial reports that customers' bank records were compromised. But it disabled cash machines and disrupted commerce.

All three of the banks that were hit were back online and operating regularly Friday. It could be next week before the broadcasters' systems have fully recovered, though they said their programming was never affected.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/495d344a0d10421e9baa8ee77029cfbd/Article_2013-03-22-SKorea-Computer%20Crash/id-23bd09f0f0904f37883c9f3b4d338775

aaron carter black history month did groundhog see his shadow soul train don cornelius rod parsley barry sanders jr nick carter sister

Matthew Keys Needs to Stop Talking

It's fairly safe to say that Matthew Keys won some sympathy in the days after his indictment for hacking charges. But after staying relatively silent, the Reuters social media editor is starting to talk publicly about this case. This feels like a bad idea.

RELATED: Conservatives Are Having Fun Fact-Checking Reuters' Marco Rubio Report

On Wednesday evening, Keys took to Facebook to make the case for his innocence. The 26-year-old denied the charges in an itemized fashion, adding scare quotes where appropriate. Having done that he wrote, "My attorneys have said much of the same over the past few days, but I feel it might mean more coming from me directly." It's the most substantive thing Keys has said since his indictment last Thursday, and national media organizations pounced on the update like kittens chasing yarn. The headlines may as well read, "Matthew Keys Is Innocent, Says Matthew Keys." But hey, there's nothing wrong with arguing for your innocence in the face of serious federal charges, right? Some might say that argument is best made by lawyers in a courtroom, but we'll get back to that.

RELATED: Deadly House Parties Blamed On 'Project X' Movie

The tricky thing is that Keys is saying a lot of other stuff, too. Most of his tweets and Facebook updates are only tangentially related to his court case. There are lots of "I'm fine" posts and normal banter between cyberfriends, and that's generally okay. Keys has also, for lack of a more relevant phrase, been doing a little bit of trolling.

RELATED: John McAfee Can't Stay Out of the Spotlight

That verb is mostly relevant since, in the days after the indictment, a series of reports emerged about Keys' somewhat shadowy past on the Internet. BuzzFeed's Ryan Broderick connected Keys to a number of old blogs and concluded that the he was an "infamous LiveJournal troll." Gawker's Adrien Chen added additional details to that narrative based in part on his interactions with Keys back in 2010, when Keys publicly infiltrated the upper tiers of Anonymous and the alleged hacking incident took place. To our knowledge, Keys hasn't responded to these trolling allegations, aside of trolling?Gawker founder Nick Denton. He has responded to at least one news report from The New York Observer. Contesting a small detail about his current employment status, Keys sneers at the story's author about what she "bothered to read" before writing her post and added, "Don't let a little thing like accuracy stand in the way of a good story." That's hardly condemning and arguably irrelevant in terms of Keys' court case, but it's not a nice way to react.

RELATED: The Close Calls of Whitey Bulger

Recent history offers some tough lessons about chatty hackers facing federal charges. Just two days ago, a federal judge convicted?Andrew "Weev" Auernheimer for violating the same law that Keys is accused of breaking. Pending appeal, Weev will now spend the next three or so years in jail and must pay a $75,000 fine for lifting 114,000 email addresses from an AT&T database. While some find the hacking charges somewhat dubious ? Weev didn't necessarily "hack" into AT&T's server as much he did sneak in the back door ? the punishment is very real. And believe it or not, the prosecution used what Weev had said on Reddit the night before the sentencing as reason to believe he would offend again. (Pro tip: Don't refer to what you're going to do "next time," when you're about to be sentenced for doing that thing.)

RELATED: How Much Money Can CNN Afford to Spend on Mashable?

This is all to say that Matthew Keys is on thin ice. He seems to have won the support for a large number of people online who believe that U.S. hacker laws need updating, and that's good. For the alleged Anonymous assist, an elementary-level hack that basically amounts to cyber graffiti, Keys faces up to 25 years in prison and half a million dollars in fines. That's pretty crazy! However, federal prosecutors don't seem intimidated by the Internet's disapproval of their tactics. They just sent Weev to jail and effectively rubbed his face in his last minute attempt to empathize with peers on Reddit. There's not telling how closely they'll scrutinize the growing list of statements Keys has made across various platforms since his indictment. Keys does have lawyers, good ones, and it's probably best to let them do the talking at this point.

It's almost impossible to think about this situation without hearing the Miranda rights in your head. "You have the right to remain silent," we all know the words. "Anything you say can and will be held against you in a court of law?" Those words are deeply embedded in our cultural and political memory. Keys was apparently never arrested or detained, so it's unclear* if anyone ever read him his rights. Matthew Keys, these are your rights. So long as you understand what you're doing, carry on. But tread softly, because you tread on your dreams.

* - We asked him, but Keys didn't respond in time for this post.

Source: http://news.yahoo.com/matthew-keys-needs-stop-talking-022056813--finance.html

global payments eli young band wrestlemania country music awards 2012 wrestlemania 28 results earl scruggs game of thrones

Fashion Site Nasty Gal Flirts With Free Shipping To Encourage Shoppers To Splurge

nastygal-logoLA-based online fashion outlet Nasty Gal, which picked up almost $50 million in funding last year in two rounds (both from Index Ventures), is now using some of that cash to bankroll a limited time offer of free overnight shipping for customers who spend $150+. The site sells -- in its own words -- ?unapologetically sexy? fashions, targeting "fashion-forward, free-thinking girls".

Source: http://feedproxy.google.com/~r/Techcrunch/~3/FQ4arpQoF4k/

braxton miller braxton miller Whitney Heichel Tippi Hedren Big Tex Sweetest Day optimal

Nicki Minaj Nip Slip Alert: Take 2!

Source: http://www.thehollywoodgossip.com/2013/03/nicki-minaj-nip-slip-alert-take-2/

terminator salvation terminator salvation deron williams jarhead montrose marshawn lynch earthquake bay area

Thursday, March 21, 2013

Starbucks seeks to double loyalty card members

Starbucks is planning a big push behind its loyalty program, with plans to double membership by the end of the year.

Starting in May, the world's biggest coffee company says members will be able to earn points when they buy bags of Starbucks coffee at supermarkets. Customers would have to go online and enter a code on the bag to get their point.

Starbucks Corp. had announced the move last year but hadn't said when it would be available. The details on the rollout were to be announced at the company's annual meeting Wednesday.

The Seattle-based company says a number of other marketing campaigns will also help push its membership to 9 million by end of this fiscal year, up from its 4.5 million current members. Starting next month, for example, customers will also be able to earn points at the company's recently acquired Teavana shops.

A Starbucks spokeswoman did not have details on how spending patterns change when people join the loyalty program.

The My Starbucks Rewards program was launched in 2009 and gives people free drinks and food based on the number of points they earn. People earn one point for every purchase, regardless of how much they spend.

Starbucks shares rose 29 cents to $57.12 in midday trading Wednesday.

? 2013 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Source: http://www.nbcnews.com/business/starbucks-seeks-double-loyalty-card-membership-1C8978082

daytona 500 start time ryan zimmerman oscars red carpet jennifer lopez wardrobe malfunction hugo hugo nfl combine

Wednesday, March 20, 2013

Star Real Estate: Gretzky, Tiegs and Swift Are Selling | ExtraTV.com

?Extra?s? real estate expert Michael Corbett takes a look at some gorgeous star homes for sale, from hockey star Wayne Gretzky?s mansion, to supermodel Cheryl Tiegs? Bel-Air oasis, to singer Taylor Swift?s house in Hyannis Port.

Check it out!


For more information, go to JoyceRey.com (Wayne Gretzky), HurwitzJamesCo.com (Cheryl Tiegs) and Luxe.TruliaBlog.com (Taylor Swift)!

Source: http://www.extratv.com/2013/03/19/star-real-estate-gretzky-tiegs-and-swift-are-selling/

white lion mike d antoni resigns holes ncaa brackets 2012 odd lamar d antoni

Toronto Restaurant Guide For Food Connoisseurs

A Toronto restaurant guide provides a glimpse into both the well-known and tucked away eating joints in the city, which deliver many interesting, sometimes surprising, cuisines to visitors. This city woos guests with varied sights and sounds along with their sumptuous fare, which is both delicious and reasonably priced for increased enjoyment. The restaurants in Toronto are a prime destination in their own right and an ideal way to end your dream day. Whether you order a quick, tasty lunch or a lavish four-course dinner, it is going to be a delicious food experience. In addition to local dishes, it is also possible to order from Chinese, Italian, Indian and even American menus in Toronto.

Italian Cuisine

The best Italian restaurants in Toronto are present at the St. Lawrence Market. This is the central part of the city's old town and here you can try anything from spaghetti and pizza to ravioli with mushroom, cra or squash. There are fantastic options available for dessert, such as creme brulee, tiramisu and cream caramel. If you love delicious wine, and crave it as a dinner accompaniment, you will find plenty of options at Italian restaurants.

Latin American Cuisine

For Latin American or Mediterranean cuisine, Kensington market in Toronto is an ideal location. Here you can choose from a wide range of fish preparations and healthy roasted vegetables. Most people consider Mediterranean cuisine to be the healthiest of them all, so why not try it here and find out the reason behind the hullabaloo. Latin American food such as tortillas, seafood and beef soups, as well as fresh fruit salads, are among the menu options available.

Chinese Cuisine

Chinese food is another highly popular option with visitors, and one can enjoy a variety of Chinese offerings in Toronto. This includes pork, braised duck, stuffed deep fried bean curd, noodles, chicken and seafood preparations. From the decor of the restaurants to the music in the background, everything transports the guests at these restaurants to China and this adds to the fun of the dining experience.

Indian Cuisine

With the ever-increasing Indian population in Toronto and the numerous city tourists, there are a number of Indian restaurants operating in the city. Choose from healthy South Indian dishes such as idli, vada, and sambar, or go for authentic Punjabi fare such as chicken curry or the kebabs and roasts that are simply mouth watering. There are many Indian restaurants in Kensington Market, including both regular and cheap restaurants to fancier, more expensive establishments.

French Cuisine

For lovers of French food, there are a number of restaurant options in Toronto. These sophisticated places mostly offer seafood highlights. As with all things Parisian, these eating-places are chic and elegant, with savory fare and wine accompaniments to complete the picture.

A Toronto restaurant guide is an exhaustive list of both established and new players in the world of gourmet delights in the city. Whatever your favourite cuisine may be, you are sure to find a place in Toronto that suits your needs. There are Italian, Latin American, Indian, French and Chinese restaurants available for tourists looking to have inexpensive, quick meals, as well as fine dining experiences.

About the Author:
I am Burl Pratt. Writing is my passion.

Source: http://www.articlesnatch.com/Article/Toronto-Restaurant-Guide-For-Food-Connoisseurs/4492206

Tropical Storm Debby legend of korra magic mike trailer Alan Turing brave Stephanie Rice Meet the Pyro

Ericsson loses ruling in Airvana trade secrets case

NEW YORK (Reuters) - Airvana Network Solutions Inc, a Massachusetts broadband network company, has won a preliminary injunction against Ericsson in a trade-secrets lawsuit that seeks more than $330 million from the Swedish telecommunications network equipment maker.

State Supreme Court Justice Barbara Kapnick in Manhattan ruled that Airvana had shown it was likely to succeed on the merits of its lawsuit and would suffer irreparable harm if the injunction were not granted.

Under the injunction, which was issued on Tuesday, Ericsson cannot use certain hardware unless it employs software developed by Airvana.

Airvana filed the lawsuit last year, claiming Ericsson stole its trade secrets and attempted to drive it out of business.

The lawsuit alleged that Ericsson secretly worked with a Korean partner to create "knock-off" hardware based on technology developed by Airvana that could then be sold to wireless carriers Verizon Wireless and Sprint Nextel Corp. Verizon Wireless is a joint venture of Verizon Communications Inc and Vodafone Group Plc.

Airvana, founded in 2000 by former Motorola Inc executives, accused Ericsson of attempting to replace Airvana's design with a so-called "in-house" product that is actually based on Airvana's work.

Ericsson had argued in court that it had modified Airvana's designs to the point where the new hardware was no longer "based on" Airvana's design, according to the judge's decision.

But Kapnick disagreed, concluding that the hardware in question was based on Airvana's work.

The case is Airvana Network Solutions Inc v. Ericsson Inc et al, New York State Supreme Court, New York County, No. 650360/2012.

(Reporting by Joseph Ax; Editing by Gerald E. McCormick, Bernard Orr)

Source: http://news.yahoo.com/ericsson-loses-ruling-airvana-trade-secrets-case-175240325--finance.html

nick santino bruce arians the misfits hook troy miracle andy whitfield

Neanderthal brains focused on vision and movement leaving less room for social networking

Mar. 19, 2013 ? Neanderthal brains were adapted to allow them to see better and maintain larger bodies, according to new research by the University of Oxford and the Natural History Museum, London.

Although Neanderthals' brains were similar in size to their contemporary modern human counterparts, fresh analysis of fossil data suggests that their brain structure was rather different. Results imply that larger areas of the Neanderthal brain, compared to the modern human brain, were given over to vision and movement and this left less room for the higher level thinking required to form large social groups.

The analysis was conducted by Eiluned Pearce and Professor Robin Dunbar at the University of Oxford and Professor Chris Stringer at the Natural History Museum, London, and is published in the online version of the journal, Proceedings of the Royal Society B. Looking at data from 27,000-75,000-year-old fossils, mostly from Europe and the Near East, they compared the skulls of 32 anatomically modern humans and 13 Neanderthals to examine brain size and organisation. In a subset of these fossils, they found that Neanderthals had significantly larger eye sockets, and therefore eyes, than modern humans.

The researchers calculated the standard size of fossil brains for body mass and visual processing requirements. Once the differences in body and visual system size are taken into account, the researchers were able to compare how much of the brain was left over for other cognitive functions.

Previous research by the Oxford scientists shows that modern humans living at higher latitudes evolved bigger vision areas in the brain to cope with the low light levels. This latest study builds on that research, suggesting that Neanderthals probably had larger eyes than contemporary humans because they evolved in Europe, whereas contemporary humans had only recently emerged from lower latitude Africa.

'Since Neanderthals evolved at higher latitudes and also have bigger bodies than modern humans, more of the Neanderthal brain would have been dedicated to vision and body control, leaving less brain to deal with other functions like social networking,' explains lead author Eiluned Pearce from the Institute of Cognitive and Evolutionary Anthropology at the University of Oxford.

'Smaller social groups might have made Neanderthals less able to cope with the difficulties of their harsh Eurasian environments because they would have had fewer friends to help them out in times of need. Overall, differences in brain organisation and social cognition may go a long way towards explaining why Neanderthals went extinct whereas modern humans survived.'

'The large brains of Neanderthals have been a source of debate from the time of the first fossil discoveries of this group, but getting any real idea of the "quality" of their brains has been very problematic,' says Professor Chris Stringer, Research Leader in Human Origins at the Natural History Museum and co-author on the paper. 'Hence discussion has centred on their material culture and supposed way of life as indirect signs of the level of complexity of their brains in comparison with ours.

'Our study provides a more direct approach by estimating how much of their brain was allocated to cognitive functions, including the regulation of social group size; a smaller size for the latter would have had implications for their level of social complexity and their ability to create, conserve and build on innovations.'

Professor Robin Dunbar observes: 'Having less brain available to manage the social world has profound implications for the Neanderthals' ability to maintain extended trading networks, and are likely also to have resulted in less well developed material culture -- which, between them, may have left them more exposed than modern humans when facing the ecological challenges of the Ice Ages.'

The relationship between absolute brain size and higher cognitive abilities has long been controversial, and this new study could explain why Neanderthal culture appears less developed than that of early modern humans, for example in relation to symbolism, ornamentation and art.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by University of Oxford.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. E. Pearce, C. Stringer, R. I. M. Dunbar. New insights into differences in brain organization between Neanderthals and anatomically modern humans. Proceedings of the Royal Society B: Biological Sciences, 2013; 280 (1758): 20130168 DOI: 10.1098/rspb.2013.0168

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_science/~3/LwDMmdiA4zQ/130319093639.htm

roland martin suspended lake vostok montgomery county public schools the river dr dog ke$ha earl