Thursday, 28 February 2013

Data says developers headed to GDC 2013 prefer mobile over ...

playstation-4

The Nintendo Wii U is selling so badly that the buzz at DICE was that no one was talking about new projects for the machine, only cancelled ones. The Xbox 360 is still the best-selling console in the US month in and month out, but sales are down 28-percent year-on-year. Sony?s PS Vita is drowning, dragged below the waves of consumer attention because of ridiculously high prices. The video game console industry may still bring in the lion?s share of overall video game revenue, but the outlook is not great. Nothing demonstrates this quite like new data coming from the organizers of the 2013 Game Developers Conference.

After conducting a survey of developers attending this year?s conference, the UBM Tech Game Network found that while the money has historically been in console games, the majority of industry professionals are abandoning living room devices for smartphones and tablets. An impressive 55 percent of attendees are currently working on their next game on those mobile devices, up from 38 percent who say their most recent finished game was a smartphone/tablet game.

PC and Mac developers are doing the same. Nearly 49 percent of developers are working on those platforms for their next game, up from nearly 35 percent who say their last game was for PC/Mac.

For consoles, things are ugly indeed. The Xbox 360 and PlayStation 3 are winding down dramatically. Just over 12-percent of respondents said their next game will be on PS3, and just over 13-percent said their next game will be on Xbox 360. Even though Sony?s already announced the PlayStation 4 and Microsoft is expected to announce the Xbox 720 sometime in the next few months, only 11-percent of respondents said their next game is coming to those machines.

Interest in Nintendo?s consoles, both Wii U and Nintendo 3DS, is shockingly low. Only 5-percent of respondents plan to release their next game on Wii U, and under 3-percent are planning their next game for Nintendo 3DS.

This is a transitional period for the game console industry, and a crucial one at that. In the middle of last decade, the Nintendo DS and PlayStation 2 were still ascendant, making both the portable and home console markets seem invulnerable. While Xbox 360, PS3, the PSP, and especially Wii were all successful in their own rights, none came close to replicating the success of those others. It simply may not be possible for the console market to reclaim its prominence in the age of the smartphone.

Source: http://www.digitaltrends.com/gaming/developers-headed-to-gdc-2013-prefer-mobile-over-console-and-are-starting-to-shun-nintendo/

nj transit PSEG hocus pocus hocus pocus mta schedule PECO Hurricane Sandy update

Tina Fey: No Way Would I Host the Oscars!

Source: http://www.thehollywoodgossip.com/2013/02/tina-fey-no-way-would-i-host-the-oscars/

dallas mavericks washington capitals amare stoudemire tallest building in the world the pitch brandon inge freedom tower

Wednesday, 27 February 2013

Donkey, buffalo found in South African meat products

CAPE TOWN (Reuters) - Donkey, water buffalo and other unconventional ingredients have been found in almost two thirds of hamburgers and sausages tested in South Africa, a study released on Tuesday showed.

The tests by the University of Stellenbosch were planned before a scandal broke out in Europe over horsemeat labelled as beef that raised concerns worldwide over the risks to human health from a complex and nebulous meat supply chain.

"Our study confirms that the mislabelling of processed meats is commonplace in South Africa and not only violates food labelling regulations, but also poses economic, religious, ethical and health impacts," co-author Louw Hoffman of the university's Department of Animal Sciences, said in a statement.

Soya, donkey, goat, water buffalo and plant material were found in up to 68 percent of the 139 minced meats, burger patties, delicatessen meats, sausages and dried meats tested by the university. The items were not listed as ingredients.

Pork and chicken were the most common fillers found in products that were not supposed to contain them, according to the study that used DNA testing techniques and was published in the journal Food Control.

No similar discoveries had been made over the past two years, when DNA testing became more widely used in South Africa.

Stricter food labelling laws came into effect in the continent's largest economy in March last year, with mandatory information required on content, country of origin and allergens.

But there is no mandatory government testing of food sold in South Africa.

"It is a wake-up call for the industry to abide with the new labelling regulations," Hoffman, a noted game meat researcher, told Reuters.

He said extensive tests over two weeks of more than 100 samples had found no trace of horse meat.

(Reporting by Wendell Roelf; Editing by Jon Herskovitz and Tom Pfeiffer)

Source: http://news.yahoo.com/donkey-buffalo-found-south-african-meat-products-140125978.html

News Ryan Lanza Facebook usa today foxnews yahoo news cnn news Connecticut shooting

China tensions with Japan sell fireworks?

Some manufacturers of New Year fireworks are profiting from strong anti-Japanese sentiment related to territorial disputes. Just check out the names of certain pyrotechnics for sale on Beijing streets.

By Peter Ford,?Staff Writer / February 6, 2013

A vendor walks out from a room where boxes of firecrackers with the words 'Tokyo Big Explosion' are stored in Beijing, Wednesday. The vendor said Chinese authorities have asked that the fireworks not be sold due to its name on the package. China and Japan are in a tense dispute over East China Sea islands that have inflamed anti-Japanese sentiment among Chinese.

Andy Wong/AP

Enlarge

Nothing defines Chinese New Year like fireworks. On the stroke of midnight, Beijing erupts in a riotous, deafening barrage of explosions that out-bangs any war zone.

Skip to next paragraph Peter Ford

Beijing Bureau Chief

Peter Ford is The Christian Science Monitor?s Beijing Bureau Chief. He covers news and features throughout China and also makes reporting trips to Japan and the Korean peninsula.

Recent posts

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

This year?s celebration, though, will carry ugly undertones of real war in the midst of rising tensions with neighboring Japan. On sale on the city?s streets in advance of Saturday night?s festivities is a box of pyrotechnics called ?Tokyo Explosion.??

Most fireworks here bear more benign names. ?Golden Snakes Dancing Crazily? is expected to be popular, as Chinese welcome in the Year of the Snake. ?Wish You Get Rich? and ?Billionaire? play to traditional desires.

But some manufacturers are seeking to profit from a seething undercurrent of anti-Japanese sentiment that has bubbled to the surface as a dispute with Japan over ownership of a group of uninhabited islands in the East China Sea grows increasingly bitter.

?I Love the Diaoyu Islands? is one such product, referring to the Chinese name for the islands. In Japan they are known as the Senkakus.

?Aircraft Carrier Shows China?s Might? is another, celebrating the October 2012 launch of the Liaoning, China?s first carrier, which has become a symbol of Beijing?s growing military strength.

Tensions around the islands edged up another notch this week, when the Japanese government revealed that a Chinese naval frigate had ?locked on? to a Japanese vessel with its missile-guidance radar system.

On Wednesday, Japanese Prime Minister Shinzo Abe called the incident a ?dangerous? and ?provocative? act ?that could have led to an unpredictable situation.?

On the Chinese Internet, however, angry micro-bloggers hailed the Chinese action.

?We should shoot at Japanese vessels before we warn them,? advocated Li Xu on Sina.com?s popular Twitter-like Weibo platform. ?The only way to punish Japan is to annihilate all Japanese,? added another commentator calling himself Truelove Leo.

The aggressively named fireworks reflect an anti-Japanese mood that the Chinese authorities sometimes seem eager to feed. Government and ruling Communist Party officials orchestrated anti-Japanese demonstrations last year when the island dispute broke out, and Chinese TV is flooded with drama series ? one much like another ? set during the Sino-Japanese war (1937-1945), featuring inhuman ?Japanese devils? as the popular Chinese phrase has it.

There is even a theme park in Shanxi Province where tourists can dress up as soldiers in the Eighth Route Army, the Communist Party?s main military force during the war, sing anti-Japanese war songs, and join in mock guerrilla battles against the Japanese invaders.

A public opinion poll released at the end of last year found that 87 percent of Chinese had a negative opinion of Japan, up from 66 percent a year earlier. And the feeling is mutual. A Japanese government survey in December found sympathy for China at a record low, with less than 20 percent of respondents reporting an affinity for their giant neighbor.

Not everybody buys into the prevailing atmosphere, however. When one Chinese blogger posted a screenshot from a recent TV drama capturing a particularly gory and ludicrous scene of a Chinese man tearing a ?Japanese devil? in half with his bare hands, most of the comments were scathing.

?Another brainwashing drama,? scoffed one. ?The Communist Party is unparalleled in this field.?

Source: http://rss.csmonitor.com/~r/csmonitor/globalnews/~3/wcyelXd30ig/China-tensions-with-Japan-sell-fireworks

ncaa tournament marchmadness mike d antoni nba trade rumors 2012 ncaa tournament schedule laurent robinson dantoni

B. Smith to be guest chef in White House mess

WASHINGTON (AP) ? Restaurateur B. Smith will be the guest chef Wednesday in a White House restaurant run by the Navy.

Word got out during an interview that Michelle Obama taped ahead of time and was broadcast Tuesday on Smith's program on SiriusXM radio.

Smith said her menu will be soulful and healthy. Mrs. Obama described White House staff as anxious to get their lips on Smith's food.

Smith's restaurant at Washington's Union Station serves Cajun, Creole and Southern food. She also has two restaurants in New York.

The White House mess was established in 1951. Cabinet secretaries can make reservations to eat in, while West and East wing staff are served by a takeout window.

Smith's stint is part of Black History Month observances by the White House.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/386c25518f464186bf7a2ac026580ce7/Article_2013-02-26-Michelle%20Obama-Guest%20Chef/id-c8b0b86a091c462fbf517a1002aa32bb

tesla model s tesla model s act Black Ops 2 Secede ben roethlisberger Diwali

HP sells webOS operating system to LG Electronics

SAN FRANCISCO (Reuters) - Hewlett-Packard Co said on Monday it will sell the webOS operating system to South Korea's LG Electronics Inc, unloading the smartphone software it acquired through a $1.2 billion acquisition of Palm in 2010.

LG will use the operating software, used in now-defunct Palm smartphones years ago, for its "smart" or Internet-connected TVs. The Asian electronics company had worked with HP on WebOS before offering to buy it outright.

Under the terms of their agreement, LG acquires the operating software's source code, associated documentation, engineering talent, various associated websites, and licenses under HP's intellectual property including patents covering fundamental operating system and user interface technology.

HP will retain the patents and all the technology relating to the cloud service of webOS, HP Chief Operating Officer Bill Veghte said in an interview.

"As we looked at it, we saw a very compelling IP that was very unique in the marketplace," he said, adding that HP has already had a partnership with LG on webOS before the deal was announced.

"As a result of this collaboration, LG offered to acquire the webOS operating system technology," Veghte said.

Skott Ahn, President and CTO, LG Electronics, said the company will incorporate the operating system in the Smart TV line-up first "and then hopefully all the other devices in the future."

Both companies declined to reveal the terms of the deal.

LG will keep the WebOS team in Silicon Valley and, for now, will continue to be based out of HP offices, Ahn said.

HP opened its webOS mobile operating system to developers and companies in 2012 after trying to figure out how to recoup its investment in Palm, one of the pioneers of the smartphone industry.

The company had tried to build products based on webOS with the now-defunct TouchPad tablet its flagship product.

HP launched and discontinued the TouchPad in 2010, a little over a month after it hit store shelves with costly fanfare after it saw poor demand for a tablet priced on par with Apple's dominant iPad.

WebOS is widely viewed as a strong mobile platform, but has been assailed for its paucity of applications, an important consideration while choosing a mobile device.

(Additional reporting By Paul Sandle and Alistair Barr; Editing by Gerald E. McCormick, Tim Dobbyn and M.D. Golan)

Source: http://news.yahoo.com/hp-sells-webos-operating-system-lg-electronics-002413794--finance.html

warren sapp the masters i robot the big c the visitor king of kings ostara

Mexico arrests head of teacher's union on fraud charges

MEXICO CITY (Reuters) - Mexico arrested the powerful head of the main teachers' union on fraud and embezzlement charges on Tuesday, striking out at a high-profile opponent of the new government's reform efforts and seeking to assert President Enrique Pena Nieto's authority.

Attorney General Jesus Murillo said Elba Esther Gordillo was arrested on suspicion of embezzling $200 million of union funds, laying out the case against her just a day after Pena Nieto signed into law a major education reform that Gordillo opposed.

Gordillo is accused of using intermediaries to move money to bank accounts in Switzerland and Liechtenstein, then back to the United States, in order to buy property in San Diego and pay for works of art and plastic surgery.

"Clearly, we're facing a case in which the money of education workers has been misused illegally for the benefit of various people, including Elba Esther Gordillo," Murillo said. "Under this government nobody is above the law."

Gordillo, 68, is known as the "The Teacher" in Mexico. She has led her union for more than two decades and was long a prominent member of Pena Nieto's centrist Institutional Revolutionary Party, or PRI.

She also became a symbol of alleged corruption in the country, drawing widespread criticism for her expensive clothes and lavish lifestyle.

Murillo said she used union money to pay bills of $3 million at luxury U.S. department store Neiman Marcus. Detailing the charges against her, Murillo said she had declared income of just 1.1 million pesos ($86,000) between 2009 and 2012.

He said other people involved in the suspected fraud included Gordillo's dead mother, the 99 percent owner of one of the companies used to move funds.

Gordillo was detained at Toluca airport near the capital on Tuesday evening along with three other people.

Her arrest mirrors the removal of her predecessor Carlos Jonguitud 24 years ago by then-President Carlos Salinas, who took office pledging ambitious reforms, similar to the changes Pena Nieto has vowed since taking office on December 1.

Salinas also ordered the dramatic 1989 arrest of Joaquin Hernandez Galicia, known as "La Quina," who led the union at Mexico's state-run oil giant Petroleos Mexicanos, or Pemex.

Hernandez was sentenced to 35 years in prison after soldiers raided his home, where they said they found about 200 Uzi submachine guns and 30,000 cartridges. However, critics say the weaponry was planted to frame Hernandez and he was eventually released in 1997.

Salinas was also a member of the PRI, the party which ruled Mexico for most of the 20th century and returned to power with Pena Nieto last year after 12 years on the sidelines.

Opponents of Pena Nieto raised the question of whether Gordillo's arrest might have been ordered for political reasons.

The conservative National Action Party, which ran Mexico between 2000-2012 and is now in opposition, said it hoped that the investigation "is managed responsibly, seriously, and without political ends."

UNION POWER

Gordillo has held a firm grip over the teachers' union, whose 1.3 million members make it one of the most powerful in Latin America.

She has long been viewed as an impediment to education reform in Mexico, and one of Pena Nieto's first acts in office was to push for a major revamp of the education system.

Gordillo's union fought against Pena Nieto's new education law, which aims to limit union control over hiring and teaching standards in a bid to improve school standards.

Pena Nieto also plans major changes to the Mexican tax system and state oil monopoly Pemex, a company with its own powerful union that has been accused of corruption.

The blow to Gordillo harks back to the days when the PRI governed under a strong presidency that brooked no dissent.

Gordillo, was born into poverty in the south of the country and started working as a teacher at 15.

Widowed at 18, she moved to Mexico City, befriended the union leader of the day and began her ascent through the organization's ranks. After Salinas became president in 1988, teachers' protests broke out over wages, and he turned to Gordillo to bring order, naming her union boss.

Gordillo was a heavyweight of Mexican politics and at one point led the PRI in the lower house of Congress. She quickly thwarted government efforts to decentralize education, give parents a bigger role and weaken the union.

But she fell out with PRI leaders ahead of the 2006 presidential election and founded the small New Alliance Party.

($1 = 12.8 pesos)

(Editing by Dave Graham, Kieran Murray and Jackie Frank)

Source: http://news.yahoo.com/mexico-arrests-head-teachers-union-suspicion-fraud-022004391.html

chris carter superbowl 2012 kickoff time what time is the super bowl 2012 nfl mvp lana del rey snl performance nick diaz sheryl sandberg

Hot air balloon crash in Egypt kills 19 foreigners

LUXOR, Egypt (AP) ? A hot air balloon flying over Egypt's ancient city of Luxor caught fire and crashed into a sugar cane field on Tuesday, killing at least 19 foreign tourists, a security official said.

It was one of the worst crashes involving tourists in the country already struggling with a decimated tourism industry, two years after the 2011 uprising that ousted former leader Hosni Mubarak.

According to an Egyptian security official, the balloon carrying 21 tourists caught fire, which triggered an explosion in its gas canister, then plunged at least 300 meters (1,000 feet) from the sky. It crashed into a sugar cane field outside al-Dhabaa village just west of the city of Luxor, 510 kilometers (320 miles) south of Cairo, the official said, speaking on condition of anonymity as he was not authorized to talk to the media.

The casualties included French, British, Chinese and Japanese nationals, the official said. Two survivors of the crash were taken to a local hospital with critical injuries.

Bodies of the slain tourists were scattered across the field around the remnants of the balloon. An Associated Press reporter at the crash site counted eight bodies as they were put into body bags and taken away.

Hot air ballooning, usually at sunrise over the Karnak and Luxor temples as well as the Valley of the Kings, is a popular pastime for tourists visiting Luxor.

Tourism is one of Egypt's economic pillars and main revenue of foreign currency.

The site of the accident has seen accidents in the past. In 2009, 16 tourists were injured when their balloon stuck a cellphone transmission. A year earlier, seven tourists were injured in a similar crash.

Source: http://news.yahoo.com/hot-air-balloon-crash-egypt-kills-19-foreigners-064947739.html

Huell Howser Justin Bieber Smoking Weed Katherine Webb Cut for Bieber AJ McCarron Johnny Manziel ups

Tuesday, 26 February 2013

Israel carries out Arrow missile interceptor test: official

"I want to thank you for working on our marriage for 10 Christmases. It's good, it is work, but it's the best kind of work. There's no one I'd rather work with." ? Ben Affleck, thanking his wife, Jennifer Garner, as he accepted the best picture Oscar for "Argo."

Source: http://news.yahoo.com/israel-carries-arrow-missile-interceptor-test-official-064443952.html

paul mccartney Sandy Hook Victims new york times columbine breaking news Google News Newton

Monday, 25 February 2013

Hubble sees a glowing jet from a young star

Feb. 24, 2013 ? The Hubble Space Telescope has captured a new image showing an object known as HH 151, a bright jet of glowing material trailed by an intricate, orange-hued plume of gas and dust.

It is located some 460 light-years away in the constellation of Taurus (The Bull), near to the young, tumultuous star HL Tau.

In the first few hundred thousand years of life, new stars like HL Tau pull in material that falls towards them from the surrounding space. This material forms a hot disc that swirls around the coalescing body, launching narrow streams of material from its poles. These jets are shot out at speeds of several hundred kilometers (or miles) per second and collide violently with nearby clumps of dust and gas, creating wispy, billowing structures known as Herbig-Haro objects -- like HH 151 seen in the image.

Such objects are very common in star-forming regions. They are short-lived, and their motion and evolution can actually be seen over very short timescales, on the order of years. They quickly race away from the newly-forming star that emitted them, colliding with new clumps of material and glowing brightly before fading away.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by NASA.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.

Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/~3/qbSvdIFTYxY/130224082136.htm

teresa giudice atlanta hawks 2012 white house correspondents dinner forrest gump bernard hopkins nfl draft grades devils

Quvenzhan? Wallis As Annie: Oscar-Nominated Actress Cast In Upcoming Film

Quvenzhan Wallis Annie

Quvenzhan? Wallis has been cast as Annie.

Sony has found its Annie.

Quvenzhan? Wallis, the nine-year-old Oscar-nominated actress, has been cast in the upcoming "Annie" reboot, Sony announced on Sunday.

?With the recent Academy Award nomination and critical acclaim, Quvenzhan? Wallis is a true star and we believe her portrayal as Annie will make her a true worldwide star," Hannah Minghella, president of production for Columbia, said in a statement. "She is an extraordinary young talent with an amazing range, not only as an actress but as a singer and dancer, and we can?t wait for audiences to further discover her.?

"Annie," which is set for a 2014 release, will be directed by Will Gluck ("Friends With Benefits").

Wallis is nominated for an Academy Award for Best Actress for her portrayal of Hushpuppy in "Beasts of the Southern Wild." She is the youngest nominee in history for the honor.

  • Best Picture

    "Argo"

  • Best Picture

    "Lincoln"

  • Best Picture

    "Amour"

  • Best Picture

    "Zero Dark Thirty"

  • Best Picture

    "Silver Linings Playbook"

  • Best Picture

    "Les Miserables"

  • Best Picture

    "Life of Pi"

  • Best Picture

    "Django Unchained"

  • Best Picture

    "Beasts of the Southern Wild"

  • Best Actor

    Daniel Day-Lewis, "Lincoln"

  • Best Actor

    Bradley Cooper, "Silver Linings Playbook"

  • Best Actor

    Hugh Jackman, "Les Miserables"

  • Best Actor

    Denzel Washington, "Flight"

  • Best Actor

    Joaquin Phoenix, "The Master"

  • Best Actress

    Jennifer Lawrence, "Silver Linings Playbook"

  • Best Actress

    Jessica Chastain, "Zero Dark Thirty"

  • Best Actress

    Naomi Watts, "The Impossible"

  • Best Actress

    Quvenzhane Wallis, "Beasts of the Southern Wild"

  • Best Actress

    Emmanuelle Riva, "Amour"

  • Best Supporting Actor

    Tommy Lee Jones, "Lincoln"

  • Best Supporting Actor

    Robert De Niro, "Silver Linings Notebook"

  • Best Supporting Actor

    Philip Seymour Hoffman, "The Master"

  • Best Supporting Actor

    Alan Arkin, "Argo"

  • Best Supporting Actor

    Christoph Waltz, "Django Unchained"

  • Best Supporting Actress

    Anne Hathaway, "Les Miserables"

  • Best Supporting Actress

    Sally Field, "Lincoln"

  • Best Supporting Actress

    Helen Hunt, "The Sessions"

  • Best Supporting Actress

    Amy Adams, "The Master"

  • Best Supporting Actress

    Jacki Weaver, "Silver Linings Playbook"

  • Best Director

    Steven Spielberg, "Lincoln"

  • Best Director

    David O. Russell, "Silver Linings Playbook"

  • Best Director

    Ang Lee, "Life of Pi"

  • Best Director

    Michael Haneke, "Amour"

  • Best Director

    Behn Zeitlin, "Beasts of the Southern Wild"

  • Best Animated Feature Film

    "Brave"

  • Best Animated Feature Film

    "Frankenweenie"

  • Best Animated Feature Film

    "ParaNorman"

  • Best Animated Feature Film

    "The Pirates! Band of Misfits"

  • Best Animated Feature Film

    "Wreck-It Ralph"

"; var coords = [-5, -72]; // display fb-bubble FloatingPrompt.embed(this, html, undefined, 'top', {fp_intersects:1, timeout_remove:2000,ignore_arrow: true, width:236, add_xy:coords, class_name: 'clear-overlay'}); });

Source: http://www.huffingtonpost.com/2013/02/24/quvenzhane-wallis-as-annie-film_n_2754948.html

hocus pocus hocus pocus mta schedule PECO Hurricane Sandy update ellen degeneres tomb of the unknown soldier

Sunday, 24 February 2013

Louisville withholds allegations vs. former Miami Hurricanes assistant coach Clint Hurtt

The University of Miami?s NCAA saga stretched into another day Friday, with few developments publicly revealed.

The University of Louisville still is withholding the Notice of Allegations for former UM football assistant coach Clint Hurtt, whose allegations have been received, Louisville acknowledged earlier this week.

Louisville is a public school and by law is required to distribute the information to those who formally make a public records request.

A source close to Hurtt told The Miami Herald that he will be fighting some of the allegations. His athletic director, Tom Jurich, defended Hurtt?s character this week, saying, ?Since Clint?s been here, he has never done an iota wrong. ? He?s been exemplary here. He?s done a great job. He?s never bent a rule here, let along broke one. To me, he?s earned a lot of equity from that.?

A conference call that had been scheduled for Friday with the NCAA?s Committee on Infractions took place in the morning, according to a Miami Herald source. Former Miami basketball assistant coaches Jake Morton and Jorge Fernandez, as well as former football wide receivers coach Aubrey Hill, filed a motion asking for their individual cases to be tossed out because of the botched NCAA investigation, The Associated Press reported. The AP cited an unnamed source indicating the Committee on Infractions agreed to ?consider the request? of the three former UM assistants, adding that the hearing would be held during the originally scheduled June14-15 dates, not in July.

Also on Friday, UM Board of Trustees chair Leonard Abess had a letter that he authored published in the Opinion section of The Miami Herald, on behalf of the UM trustees.

?Despite the often unwieldy investigation, the [UM], at President [Donna] Shalala?s and the Board of Trustees? insistence, has held itself to the highest standards in its model cooperation with the NCAA,?? Abess wrote. ??While I believe that the [UM] will emerge stronger and more committed than ever to the letter and the spirit in which the NCAA?s rules of conduct were established, the trustees respectfully, but firmly, add our own voice to President Shalala?s in asking that no further sanctions be imposed ??

Source: http://www.miamiherald.com/2013/02/23/3248702/louisville-withholds-allegations.html

higgs boson Malware Monday First Row Sports American flag Happy 4th of July 4th Of July Desserts fireworks

Game of Thrones Season 3 Promo: Fresh Footage!

Source:

reggie wayne taylor allderdice vincent jackson vicki gunvalson pierre garcon brown recluse spider wiz khalifa taylor allderdice

Smugglers still cashing in on Michigan can refund

A Michigan deposit is shown printed on a beverage in Detroit, Saturday, Feb. 23, 2013. Michigan lawmakers want to crack down on can and bottle smugglers they say are scamming Michigan for undeserved recycling refunds, corrupting a generous 10-cent per container payback policy once infamously portrayed in a "Seinfeld" episode and which beverage officials now claim costs the state millions of dollars annually. Lawmakers say it's a serious problem, especially in border counties, and they want to toughen penalties on people who try to return un-marked, out-of-state cans and bottles for refunds. (AP Photo/Carlos Osorio)

A Michigan deposit is shown printed on a beverage in Detroit, Saturday, Feb. 23, 2013. Michigan lawmakers want to crack down on can and bottle smugglers they say are scamming Michigan for undeserved recycling refunds, corrupting a generous 10-cent per container payback policy once infamously portrayed in a "Seinfeld" episode and which beverage officials now claim costs the state millions of dollars annually. Lawmakers say it's a serious problem, especially in border counties, and they want to toughen penalties on people who try to return un-marked, out-of-state cans and bottles for refunds. (AP Photo/Carlos Osorio)

A Michigan deposit is shown stamped on a beverage in Detroit, Saturday, Feb. 23, 2013. Michigan lawmakers want to crack down on can and bottle smugglers they say are scamming Michigan for undeserved recycling refunds, corrupting a generous 10-cent per container payback policy once infamously portrayed in a "Seinfeld" episode and which beverage officials now claim costs the state millions of dollars annually. Lawmakers say it's a serious problem, especially in border counties, and they want to toughen penalties on people who try to return un-marked, out-of-state cans and bottles for refunds. (AP Photo/Carlos Osorio)

(AP) ? Michigan lawmakers want to crack down on can and bottle smugglers they say are scamming Michigan for undeserved recycling refunds, corrupting a generous 10-cent per container payback policy once infamously portrayed in a "Seinfeld" episode and which beverage officials now claim costs the state millions of dollars annually.

"Seinfeld" characters Kramer and Newman failed miserably in their comedic attempt to cash in on the refund, when they loaded a mail truck full of cans and bottles in New York and attempted to drive them to Michigan. But lawmakers say it's a serious problem, especially in border counties, and they want to toughen penalties on people who try to return unmarked, out-of-state cans and bottles for refunds.

"If you are intending to defraud ... then you should be held accountable for it," said Republican Rep. Kenneth Kurtz of Coldwater. He recently introduced legislation aimed at cracking down on scammers who drive car and truck loads of cans from Indiana, Wisconsin and Ohio ? states that do not offer refunds ? to stores across the border in Michigan.

His legislation would make an attempt to return between 100 and 10,000 non-returnable containers punishable by up to 93 days in jail and a $1,000 fine. Current law sets penalties only for those who actually return fraudulent containers.

Michigan's 10 cent-per-container refund ? the highest in the country ? was enacted more than 30 years ago to encourage recycling. Many say it's worked. The state's recycling rate for cans and bottles was nearly 96 percent in 2011. By contrast, New York, one of nine states with nickel deposits on most containers, saw only a 66.8 percent redemption rate in 2007, the most recent figure available.

Despite measures Michigan lawmakers have taken over the years, including tougher penalties for bottle scammers and new machines that kick out fraudulent cans, store owners and distributors along the border say illegal returns persist.

Mike Hautala owns Hautala Distributing, which services Gogebic and Ontonagon counties in the western part of the Upper Peninsula near the Wisconsin border. He said for every case of beer his distributorship delivers to a store along the border, it picks up about seven more cases of empty cans.

The state loses $10 million to $13 million a year to fraudulent redemptions, according to most recent 2007 estimates from the Michigan Beer and Wine Wholesalers Association. Angela Madden, the association's director of governmental affairs, said that number has likely gone down slightly because of changes implemented since, but not by much.

Bill Nichols, store director at Harding's Friendly Market in Niles about three miles from the Indiana border, said the store takes in about $6,000 worth of cans a week. He said every week he kicks out people for trying to return large garbage bags full of cans from Indiana, a state that offers no refund.

"You can go into the parking lot and look at the license plates and see that it says Indiana," he said.

Distributors pick up the containers people drop off at stores and pay the store a dime for every container. If the distributor picks up more bottles and cans than it left ? the likely result of fraudulent redemption ? the distributor is left in the hole, Madden said. If the distributor picks up fewer cans than it dropped off, the money that does not go back to the store is sent to the state. Twenty five percent of that money is sent back to retailers and 75 percent is put in a fund that pays for things like environmental cleanup, she said.

Hautala said he lost about $25,000 last year picking up more returned containers than he delivered. He said his company will recover some of that money from distributors who sell more containers than they pick up.

In 2008, Michigan passed laws aimed at cracking down on bottle fraud. One of the primary components required manufacturers to place a special mark on Michigan cans and bottles and said those containers could only be sold in Michigan or other states that have deposit laws.

A report the Department of Treasury delivered to Michigan lawmakers last fall estimated that the technology may have helped reduce redemptions of out-of-state containers by nearly 4 percent. But that reduction could also come from decline in sales, the report said.

As containers were given Michigan-specific marks, vending machines used in stores to count the cans and bottles were formatted with new technology to read the mark and reject cans that come in from across the border.

But Madden told the committee that many retailers have not yet taken advantage of the technology. She said while the state has provided funding for business to pay for the $5,000 machine upgrade, many "just refuse." If a store has an older model machine, they might have to shell out big bucks for a brand new machine that is compatible with the new technology, she said.

Hautala said only four machines are in the two counties his company serves.

And the machines are not "100 percent fool-proof," Nichols said. If a person repeatedly puts an out-of-state can into the machine, it will often accept it, he said.

Michigan is not alone in its fight against bottle fraud. Mark Oldfield, spokesman for California's Department of Resources Recycling and Recovery, said the state, which gives a 5-cent refund for most containers and 10 cents for those more than 24 ounces, is losing about $30 million to $50 million a year from redeeming out-of-state cans. The state's redemption rate for the first six months of 2012 was 87 percent.

Oldfield said a new law in California this year requires people who bring in more than 25 pounds of aluminum or plastic, or more than 100 pounds of glass, to report the source and the destination of the material to the state. Border patrol stations along the major highways near the border also gather license plate numbers and information of vehicles seen bringing in cans and bottles.

Despite their best efforts to clamp down on fraudulent bottles, a federal lawsuit may shake things up even more. In 2012, a federal appeals court in Cincinnati struck down the Michigan law that makes beverage companies put a special mark on cans sold in the state. It said the Michigan law is illegally affecting interstate commerce by dictating where cans can be distributed.

Joy Yearout, spokeswoman for Michigan Attorney General Bill Schuette, said the office has requested a stay on the ruling and plans to file a petition with the U.S. Supreme Court in April.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/3d281c11a96b4ad082fe88aa0db04305/Article_2013-02-23-Can%20Return-Michigan/id-21478f705963420aaea434310eae3c74

dodgers sale tami roman jetblue captain los angeles dodgers christie brinkley seattle mariners geraldo rivera

Saturday, 23 February 2013

Video: New Mexico-Colorado State preview

February, 22, 2013

Feb 22

6:00

PM ET

'; })(jQuery);

Source: http://espn.go.com/blog/collegebasketballnation/post/_/id/76891/video-new-mexico-colorado-state-preview

Pretty Little Liars Rob Parker Comcast Pokemon X and Y Rob Ryan Silver Linings Playbook bethenny frankel

Windows 8 picture passwords: Their great untapped potential

Love it or hate it, Windows 8 is the bellwether for PCs. Where Microsoft goes, PCs follow. And now Microsoft is making a grab for the mobile market, too. The latest version of Windows is designed with touchscreens in mind, and one bright side of that evolution is the addition of features that make Windows more intuitive and easier to use on all devices.

Windows 8 picture passwords are an example of such a feature?a new, alternative password system that most Windows 8 users aren't even aware of.

Actually, the term picture password is a bit of a misnomer. Sure, the password allows you log in to your machine using a picture instead of an alphanumeric string of characters, but what you're actually doing is sketching a custom sequence of gestures on top of a picture to verify your identity. For example, if you use a photo of a your family, you might sketch a straight line from one person's nose to the next person's nose. Calling these passwords gesture passwords would be more appropriate, but admittedly, that name doesn't have the same alliterative appeal.

Worse, highlighting the feature's similarity to the gesture-based login systems on phones and tablets could further alienate die-hard desktop owners already leery of Windows 8.?And that's a shame, because picture passwords are a nice alternative to traditional passwords and should have been integrated into PC operating systems a long time ago.

Such password aren't inherently better than your old alphanumeric passwords, but they could be a more convenient (and no less secure) way to log in to your PC.

Gestures are an alternative, not an improvement

Microsoft clearly designed picture passwords with mobile devices in mind, since trying to type a traditional 8- to 16-character alphanumeric password with a virtual keyboard is a recipe for rage. That said, the picture password feature works well enough on nontouch systems too?simply substitute your mouse for your fingertip.

Microsoft

Sketching a series of complex gestures takes a little longer than typing a traditional alphanumeric string on a desktop PC (long live the keyboard), but it's still easier than remembering a complex string of characters; and it's roughly equivalent in terms of security. And, arguably, picture passwords are a little more secure on desktops than on touchscreen devices, because you don't have to worry about anyone guessing your gesture password by examining your monitor for greasy fingerprints.

That last scenario may sound like something out of a trashy espionage thriller, but the threat of a "smudge attack" is real enough to warrant serious study. Researchers at the University of Pennsylvania coined the term in 2010 when they were able to successfully deduce gesture passwords used to unlock Android phones from smudge marks left on the screen. You can read the full?study for more details, but the most important takeaway is that while gestures are faster, simpler, and more convenient to use when you're logging in to a touch-capable device, they have their own unique vulnerabilities and aren't necessarily any safer than traditional alphanumeric passwords.

We're likely to see a rash of new hacking techniques targeted specifically at touchscreen PCs, so if you're going to add a gesture password to your Windows 8 PC, make sure it's a good one.

How to create a strong picture password

Thankfully, setting up a picture password in Windows 8 is child's play. Just remember that you need to have a locally accessible image to use as the foundation of your picture password before you begin. You also need an alphanumeric password linked to your account in case of emergency, so make sure it's something strong. If the picture password feature fails for any reason, or if you simply forget the gestures you've chosen, you can use your plain-text password to log in to your system.

Run a search for the picture password wizard to get started.

First, press the Win-W key combination and search for Picture Password. Under the Settings category of results, you should find an entry for Change to create picture password; launching that wizard is the first step in creating your custom picture password.

When the picture password wizard first opens, you're greeted with a big ol' page of PC Settings. Click the Create picture password button about halfway down the page. If you haven't already assigned a plain-text password to your account, you must take care of that before Windows 8 will allow you to continue.

After clicking the 'Create picture password button, you'll be asked to enter your plain-text password. Once Windows 8 verifies that you are who you say you are, you must sit through a quick?animation that explains the types of gestures you can assign to your picture. In short, you can use any combination of three taps/clicks, straight-line drags, and/or circles.

The login system of the future is here! At least, that's what Windows 8 wants us to think.

Click the Choose picture?button, browse to your preferred image directory, and choose the image you'd like to use as a base for your gestures. The picture is the only thing you'll see when logging in, so try to pick an image with a resolution sufficient that the image remains attractive when splayed across your screen. Once you select the image, you're asked to position it on-screen; simply drag the image to your desired location and click the Use this picture?button.

Time to start gesturing. This process is obviously designed for touchscreen PCs and tablets, but it works with a mouse as well. Remember the order and direction of all of the gestures you drew on the screen; if you draw a line from left to right?in the image, for example, you'll also have to draw the line from left to right when unlocking your system.

For maximum security, avoid taps and use circles and lines exclusively. These gestures are harder to guess because they incorporate both positional data and directional data, so an unauthorized user would need to correctly deduce the start point, end point, and direction of your gesture. Every security expert we spoke to about this process cautioned against using gestures that follow the contours of the image in predictable ways, like circling faces or drawing lines between landmarks. Instead, pick an image with strong contrast to create bright reference points, and come up with a creative, convoluted series of gestures to make your password extra strong.

You can't see my finger, but I'm drawing a moustache on Iron Man for my picture password.

Once you've finished doodling your new password, you should be ready to rock. Window 8 defaults to the picture password anytime the system is locked or restarted, and ideally all you have to do is draw your gestures on screen to unlock the system.

If you want to switch gears and input your plaintext password instead, just tap the corresponding button in the left pane of the picture password screen. You should also be aware that picture password logins can be disabled from within the Windows 8 group policy editor; many businesses do not allow picture passwords to be used on networked machines for security reasons, so be prepared for that if you plan to bring your Windows 8 device to work.

Source: http://www.pcworld.com/article/2028724/windows-8-picture-passwords-their-great-untapped-potential.html

survivor snl peter frampton smokey robinson smokey robinson Sandy Hook Elementary School Colors Cassadee Pope

Video: Giant gun law loopholes stymie prosecutors



>>> gun crimes, of course, have taken on a much higher profile in this country, since the shootings at the school in newtown, connecticut, which reignited the heated debate over gun control . tonight we unveil an nbc news exclusive, showing law enforcement officials say serious gaps in this country's gun laws make it hard for them to do their jobs. we get our report from our national investigative correspondent, michael isikoff .

>> reporter: fbi agents seized a video of this neo-nazi convention.

>> this is a war!

>> reporter: while investigating the owner of an ohio sporting goods store. the search turned up an arsenal in what authorities say was a possible racist plot.

>> the fbi averted a catastrophe in this case. there's no doubt about it.

>> reporter: the store owner, richard schmidt , a convicted felon , is charged with illegally stockpiling 18 firearms, including assault weapons , shotguns and pistols, body armor , high-capacity magazines and more than 40,000 rounds of ammunition.

>> and they were all over the place. he had one in his coat pocket.

>> reporter: schmidt had served 13 years for homicide in an ohio state prison. under federal law , he was barred from owning any firearms. he has pled not guilty to the new weapons charges and his lawyer declined to comment. nbc news has learned the fbi was also concerned that schmidt may have been drawing up a hit list, after finding notebooks showing the names and addresses of jewish and african-american leaders in detroit. agents briefed wendell anthony about the potential threat.

>> appears to me like this guy is a one-man army. very unsettling, very disturbing. and it really kind of made me angry.

>> reporter: the fbi also warned, scout kauffman, a jewish community leader.

>> names of tenants in our building, names of some of the people in leadership positions in our organization, including mine.

>> reporter: prosecutors are determined to find out where and how schmidt got his guns. but that's proving a difficult task, because of what they say are giant loopholes in the nation's gun laws . one big issue, congress has prohibited a national computeri computerized database of gun sales. so agents at the atf tracing center in west virginia are forced to use technology out of a 1940s , poring through cardboard boxes, water logged sales records, and even micro feesh. agents believe schmidt acquired his firearms at gun shows or private sellers, where under federal law , background checks are not required.

>> there's no documentation required for private transactions. so whatever occurs in that zone, is invisible to us.

>> reporter: an estimated 80% of those convicted of gun crimes get their weapons through private sales. more evidence of what some prosecutors say are alarming gaps in the nation's gun laws . michael isikoff , nbc news, bowling green , ohio.

Source: http://video.msnbc.msn.com/nightly-news/50897667/

billy crystal oscar winners 2012 billy crystal oscars 2012 angelina jolie oscars chardon high school christopher plummer viola davis

Pop singer Jermaine Jackson changes last name to Jacksun

LOS ANGELES (Reuters) - Pop singer Jermaine Jackson officially has changed his name to Jermaine Jacksun for "artistic reasons," Los Angeles court officials said on Friday.

The Jackson 5 member and older brother of pop stars Michael and Janet Jackson filed a petition to change his name in Los Angeles Superior Court in November 2012. The change became official on Wednesday after a hearing, a court spokeswoman said.

The 58-year-old singer, who is on tour in Europe with his three surviving brothers, Jackie, Marlon and Tito, did not attend.

"If Prince and P Diddy can do it, why can't and shouldn't Jermaine?" Jacksun's attorney, Bret D. Lewis, said when the petition originally was filed.

Jermaine Jackson unofficially adopted the name Mohammad Abdul Aziz after converting to Islam in 1989.

(Reporting by Eric Kelsey; Editing by Jill Serjeant and Paul Simao)

Source: http://news.yahoo.com/pop-singer-jermaine-jackson-changes-last-name-jacksun-012719132.html

tupac shakur sledge hammer tax day freebies madison bumgarner wnba draft tax day april 17

Friday, 22 February 2013

We ranked football and men?s basketball coaching tandems in the power conference...

Sorry, Readability was unable to parse this page for content.

Source: http://www.facebook.com/AthlonSports/posts/586535508043218

small business saturday best cyber monday deals best cyber monday deals macaulay culkin Larry Hagman macys apple

Samsung looks past Apple, takes aim at BlackBerry

He gained a few unexpected fans in the gay community?today, but notoriously God-fearing quarterback Tim Tebow may have scared off the very supporters who saw him as a Christian celebrity even as his NFL career has fizzled ? they're calling his about-face on an anti-gay marriage pastor "disastrous," and declaring "his street cred with the evangelical community" all but gone.

Source: http://news.yahoo.com/samsung-looks-past-apple-takes-aim-blackberry-134053206.html

pecan pie recipe Hector Camacho Jill Kelly McKayla Maroney gronkowski jeremy renner best buy black friday deals

Town of Union Debates Family Homeless Shelter

Door County -

A Door County community voted down a proposal Wednesday night to let a church in the Town of Union operate a homeless shelter for families.

Union town board members were asked whether to grant Southern Door Community Church a conditional-use permit for it to serve as a temporary shelter. The board's decision came after resident after resident spoke against a shelter in their community.

Last October, the church pastor, Reverend Paul Peterson, approached the town board to seek approval for a shelter in partnership with Green Bay's Freedom House.

The proposal would convert about half of the church's sanctuary space into private rooms, where up to five families at a time could live while applying for jobs. They would be able to stay at the shelter for up to 90 days.

"As much as it's a great thing to help others, there's a lot of outlets for us to do that currently. I don't think our town is the right place for it," Jenny Jandin said.

"You know these people are usually linked to the small crimes and things. Do we really want to have that around here?" Cory Cornette asked.

"What do we do with the folks that fall through the cracks?" Reverend Peterson argued. "We do nothing? Well, here's a church that says we can do something, and it costs you nothing."

But the opposition far outweighed the support.

"There was nothing ever presented to any of us where he's going to get the money and all this. I mean, sure, they say donations and all this, but there was nothing in black and white," Beatrice Jeanquart said.

And the town board decided to deny the permit.

"It's not unexpected. It's sad, but you take a deep breath and figure out what's next," Peterson said.

The town chair told us he denied the permit based on input he had gotten from members of the community over concerns of a decrease in property value and safety concerns.

Earlier, Peterson told us concerns about safety were not an issue of security but of misinformation.

Peterson said it would "probably be the safest place in Union township because all of the staff will have to go through those background checks. Anyone who volunteers will go through them. We have kids in here. We have to be absolutely certain that there's no one here that could cause any harm to them. So the issue of security is just something that's non-existent."

The reverend said he does not plan to appeal the board's ruling.

Source: http://www.wbay.com/story/21291320/2013/02/20/town-of-union-debates-family-homeless-shelter

mayweather vs cotto shumpert hopkins hopkins dear john derrick rose torn acl pacers

One Direction's 3-D Film Brings Fans To 'The Toilet With Us, No Lie'

Much like their video for 'One Way or Another,' the guys will take fans everywhere in their 3-D movie.
By Jocelyn Vena


Niall Horan in "One Way or Another"
Photo: Simco Limited

Source: http://www.mtv.com/news/articles/1702344/one-direction-one-way-or-another-3d-movie.jhtml

happy holidays Stores Open On Christmas Day Santa Claus Feliz Navidad Netflix down Ryan Freel Melissa Nelson

Thursday, 21 February 2013

Futurity.org ? 'Dr. Google' can ease cancer confusion

In a survey of nearly 2,000 US adults, researchers found that those who sought health information on the Internet were more likely to have positive beliefs about cancer prevention. (Credit: "computer mouse" via Shutterstock)

CORNELL / U. PENNSYLVANIA (US) ? When it comes to cancer, the Internet can actually clarify misinformation rather than fuel fatalistic fears, a new study finds.

Inundated with reports about cancer causes and prevalence, many people adopt fatalistic attitudes about its prevention, believing that getting cancer is a matter of fate or luck, previous research has shown. But a new study suggests that the Internet can be used as a tool to help clarify cancer confusion and promote prevention practices.

?We were surprised. In the age of WebMD and ?Dr. Google,? we were concerned about the potential for the internet to widen gaps in knowledge and behaviors to prevent cancer,? says Jeff Niederdeppe, assistant professor of communication at Cornell University who co-authored the report with Derek Freres, a researcher at the University of Pennsylvania and Chul-joo Lee, assistant professor of communication at the University of Illinois.

?Some websites contain inaccurate and incomplete information, posted without editorial review, which could add to levels of confusion and a sense that everything causes cancer,? Niederdeppe says. ?We were also concerned that the ability to jump quickly from one snippet of information to another via links could lead to information overload.?

But, as reported in the Journal of Communication, the team found that such interlinked, integrated information can actually promote learning. In a survey of nearly 2,000 US adults, aged 40 to 70, they found that those who sought health information on the Internet were more likely to have positive beliefs about cancer prevention.

Moreover, the effect was strongest for those with low levels of formal education, suggesting that the internet has potential to be a powerful tool to reduce inequalities in cancer knowledge and prevention behaviors.

This is important because those with positive outlooks are more likely to engage in healthy behaviors that could help prevent cancer, such as eating fruits and vegetables and getting screened for cancer, Niederdeppe says.

?Reducing cancer fatalism, especially among people with low socioeconomic status, is arguably one of the most important public health goals in the nation,? Lee says.

In previous studies, Niederdeppe and Lee showed that frequent exposure to short reports about cancer in the media, particularly via local television, can increase cancer fatalism over time. Another recent study showed that newspaper coverage that includes information about how to avert the threats can help reduce feelings of information overload. But there is much left to learn, Niederdeppe says.

?There are still large gaps in cancer-related knowledge between socioeconomically advantaged and disadvantaged populations. Access and use of the internet aren?t magic bullets that are going solve these issues, but there is considerable potential to use the web to reduce harmful beliefs about cancer?s causes and prevention,?

Researchers from the University of Illinois contributed to the study that was supported by the National Cancer Institute.

Source: Cornell University

Source: http://www.futurity.org/health-medicine/dr-google-can-ease-cancer-confusion/

andrew luck pro day josh johnson kim kardashian flour matt forte jeremy shockey new orleans saints ireland

Robert Caro wins $50,000 history prize

NEW YORK (AP) ? Robert Caro has won yet another literary prize, this one worth $50,000.

The New-York Historical Society announced Thursday that Caro had won its American History Book Prize for the fourth volume of his Lyndon Johnson series, "The Passage of Power." Caro is a two-time Pulitzer Prize winner and a recipient of the National Book Award. His other books include the Robert Moses biography "The Power Broker."

"The Passage of Power" focuses on the first few weeks of Johnson's presidency, after he had taken office upon the assassination of John F. Kennedy.

Source: http://news.yahoo.com/robert-caro-wins-50-000-history-prize-185626936.html

john edwards trial brandon weeden felicia day nfl 2012 draft st louis rams miami dolphins buffalo bills

Wednesday, 20 February 2013

EU regulators unsatisfied with Google's response to privacy policy concerns

EU regulators unsatisfied with Google's response to privacy policy concerns

European Union regulators weren't exactly content with Google after it rolled up most of its privacy policies into a monolithic document early last year, and it doesn't seem like that's about to change. After giving Page and Co. four months to respond to 12 recommendations regarding its new policy, French regulator CNIL has come to the conclusion that "Google did not provide any precise and effective answers." Though EU officials aren't happy with Mountain View's responses, Google says its policies respect European law and that it replied with steps to address the concerns by the January 8th deadline. Still, data protection regulators are committed to their investigation and are aiming to form a group before the summertime that would respond to the search titan.

Filed under: ,

Comments

Source: Reuters

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/CFS2ahE85XU/

amelia earhart Sally Ride Ichiro minka kelly James Holmes court Rupert Sanders bachelorette

Apple Hit By Hackers Who Struck Facebook

Apple Inc. said Tuesday that it has been attacked by hackers who infected a small number of the company's Mac computers. WSJ's Jessica Lessin reports. (Photo: Getty Images)

Apple Inc. said Tuesday that some of its employees' Mac computers were attacked by hackers, a rare admission for a company that has long touted its security over PCs running Windows software.

Apple said a "small number" of computers became infected after employees visited a website for software developers that transmitted the malicious computer code.

Apple said Tuesday it would release a software update to protect Mac users, and is working with law enforcement to find the source of the so-called malware.

The disclosure is unusual for Apple, which generally doesn't detail particular attacks. In the past, the company has generally issued notices on its support page of possible vulnerabilities and issued software updates to fix them.

Why is an old iPhone still worth hundreds of dollars? New research suggests a surprising explanation: hoarding. Kelli Grant explains on digits. Photo: Getty Images.

Apple had for years boasted that its computers were resistant to malicious software, a key selling point over computers running Microsoft Corp.'s software. Hackers have increasingly targeted Macs in recent years, reflecting the growing popularity of the Apple brand and the rising number of Macs being used in companies.

The malicious code in the latest attack is believed to have been the same discovered by Facebook Inc., which said on Friday that its employees' computers were breached by hackers last month.

The companies played down the impact of the attacks on their operations, and Apple and Facebook said no data appeared to have been stolen. But the events underscore the vulnerability of some of the world's most sophisticated technology companies to an ever-changing array of attacks, with outside experts increasingly tracing the break-ins in the U.S. to foreign countries.

Twitter Inc., the popular microblogging site, earlier this month said it had been the victim of an attack that may have granted hackers access to information including usernames and email addresses for about 250,000 of its users.

Motivations of the attackers seem to be proliferating. In the case of technology companies, people rummaging through their computer networks seem to be searching for product-development plans and other intellectual property.

At government institutions, reported targets include information about intelligence-gathering and weapons systems. In other cases, intruders have looked for information about critical pieces of U.S. infrastructure, such as electricity and energy distribution networks.

A report on Tuesday by security research firm Mandiant Corp. pointed to cyberespionage efforts by a group in China it linked to the military.

At the CIO Network on January 15, 2013 in San Diego, CA, Former U.S. Secretary of Homeland Security Michael Chertoff talks about the various methods governments and companies can use to respond to a cyber attack.

At the CIO Network on January 15, 2013 in San Diego, CA, Former U.S. Secretary of Homeland Security Michael Chertoff discusses the various types of cyber crimes that threaten U.S. companies as well as our energy grid and various utilities.

"From our visibility, it is massive and it is growing exponentially over the years," said Dan McWhorter, Mandiant's managing director of threat intelligence.

Chinese government officials rejected the allegations.

The attacks show how the range of targets are broadening beyond organized criminals, many based in Eastern Europe, seeking customer data like credit card numbers.

A report to be published Wednesday by a U.S. research firm, Trustwave Holdings Inc., says of the 450 data breaches that Trustwave investigated in 2012 for its own clients around the world, more than 33% originated from Romania, and 29% from the U.S.

China was the fifth-most-common source, Trustwave said, accounting for nearly 4% of the attacks, while nearly 15% have unknown origins.

Many highly publicized attacks have been based on a tactic called "spear-phishing," where email users are tricked into opening a legitimate-sounding message that contains code called malware that lets attackers penetrate corporate networks.

Apple and Facebook appeared to be affected by another exploit, called a "watering hole" attack. Facebook, in a blog post, on Friday said it discovered the attack after finding a suspicious Internet domain in its computer logs that it traced to a single employee laptop.

The social network then launched what it called a "significant" investigation, working with other companies it believed to have been affected, as well as with law enforcement authorities.

Some security researchers said they believed the attack may have originated in China, but Facebook hasn't commented on where it may have originated.

Apple, for its part, said Tuesday, "The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers."

Last year, hundreds of thousands of Macs were hit by a massive attack from a malware program known as "Flashback." Apple released a security update for its software at the time.

Chester Wisniewski, a senior security adviser at Sophos Canada, said he has recently noticed an increase in more sophisticated "data stealing" software designed for Apple's Mac computers.

Mr. Wisniewski suggested this might be due to the type of decision maker within a company liable to have an Apple computer rather than a PC: "Executives and VPs are more likely to have Macs," he said.

Twitter, meanwhile, responded to its attack by resetting passwords for infected accounts. "This attack was not the work of amateurs, and we do not believe it was an isolated incident," Twitter said, but didn't elaborate.

Reuters

Apple and Facebook said no data appeared to have been stolen. Above, a man looks at his Apple iPad.

Mandiant said it found evidence linking the attacks it studied to the Chinese military, including IP addresses of intruders registered in Shanghai.

It also said the size of the infrastructure of the attacker it researched suggests a large organization with at least dozens and possibly hundreds of people at work.

Mr. McWhorter said that unlike hacking attacks that seek credit card numbers and other personal information that can be easily sold, the Chinese attacks it followed often ignored sensitive financial data to instead focus on stealing intellectual property.

"Anyone that has intellectual property that makes their business work and makes them run and makes them more profitable" is at risk, he said.

Trustwave's data meanwhile, show that hacking attacks by organized criminals seeking valuable customer data still dominate the cyberattacks on big and small businesses, at least in total numbers.

"The vast majority of what we see is financially motivated?going after financial data and trying to make money off it," said Nicholas Percoco, a senior vice president at Trustwave.

A report published last year by a unit of Verizon Communications Inc. that also investigates cybercrime found a similar geographic distribution of hackers. In the 855 intrusions from 2011 it studied from its own clients and in conjunction with the U.S. Secret Service and other international police groups, Verizon found that 67% of attacks originated from Eastern Europe, 20% from the U.S., and 2% from East Asia.

But the numbers don't paint a complete picture, said security experts. While companies are now more aware of attacks that lead to financial crimes?and hiring companies such as Trustwave and Verizon to investigate them?espionage-focused hacks have been typically harder to identify and track.

When intellectual property or trade secrets get stolen "there is no fraud algorithm to let you know," said Chris Porter, a managing principal at Verizon. It takes companies longer to realize they've been the victim of an espionage attacks, he said, and when American companies do they often deal directly with the Federal Bureau of Investigation, which doesn't release data on the topic.

"We are finally shining a light on this a little bit," said Mr. Porter.

?John Letzing
contributed to this article.

Write to Jessica E. Lessin at jessica.lessin@wsj.com and Geoffrey A. Fowler at geoffrey.fowler@wsj.com

A version of this article appeared February 20, 2013, on page B1 in the U.S. edition of The Wall Street Journal, with the headline: Apple Gets Hit by Hackers.

Source: http://online.wsj.com/article/SB10001424127887324449104578314321123497696.html?mod=rss_about_china

jodie foster amber alert seahawks natalie wood patriots Sandy Hook Hoax 2014 Corvette