View Post

Researchers claim China trying to hack South Korea missile defense efforts

In Business, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , ,

Enlarge / South Korea is deploying Lockheed Martin's THAAD missile defense system, and that's sparked the ire of the Chinese government, as well as military and "hacktivist" hacking groups, according to FireEye.... Read More
View Post

1,200 InterContinental hotels were breached by credit card stealing malware

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

1,200 InterContinental hotels were breached by credit card stealing malware - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.wind... Read More
View Post

The 3 biggest cybersecurity threats to America

In Business, Security, Video by Tech InsiderLeave a Comment

Tech News Keywords:

There are a number of different ways someone could cripple the United States through hacking techniques, but there's a good reason why this hasn't happened yet. David Kennedy, a former Marine intelligence specialist , explains what he thinks would be the most devastating attack on the country and why it's crucial to keep up with other countries when it comes to our cyber capabilities.Read more: http://www.businessinsider.com/sai... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1anchorperson0.658
2person0.738
3coal black color0.875

Hemu Nigam discusses the Facebook murder, social media

In Business, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , ,

The Facebook broadcast of the murder of Robert Godwin shocked the world and brought up important questions about social media and cyber security. So what is needed to move forward? CGTN's Asieh Namdar spoke with Hemu Nigam, CEO of SSP Blue, an online security consultancy.... Read More
View Post

Virtual offices take on Manhattan addresses without expensive rent

In Business, Science & Nature, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , , ,

New York City is home to some of the most coveted real estate on the planet, but these prestigious properties can come at a serious cost. Shared office space provides one option for businesses looking to cut down on rent, but some companies are moving to cyber spaces to keep their Manhattan addresses without paying Manhattan prices. CGTN’s William Denselow reports.... Read More
View Post

Question Club: Is Fate of the Furious driving the franchise in the wrong direction?

In Business, Emerging Technology, Events, Government, Legal, Science & Nature, Security by The VergeLeave a Comment

Tech News Keywords: , , , , , , , , ,

Back in 2001, a moody, slick little $38 million action movie called The Fast and the Furious became a big hit, racking up more than $200 million in box office returns worldwide. A sequel was inevitable, but the series’s rapid expansion has been surprising, especially considering its unevenness and its gleeful, unabashed ridiculousness. From timeline-warping leaps to outsized stunts to its habit of converting villains to anti-hero buddies, the series has unabashedly embraced an over-the-top aesthetic where no twist is too ridiculous, if it’s played straight enough. What started out as ... Read More
View Post
Number of Items Identified: 12
Item #Item NameScoreItem Classification
1printed circuit0.652electrical device, computer circuit, printed circuit
2computer circuit0.682
3electrical device0.683
4device0.841
5laser0.623optical device, laser
6optical device0.623
7electronic device0.6
8coal black color0.887
9black color0.793

U.S. at risk of cyber-attacks from North Korea, Iran?

In Government, Security, Video by Fox Business NewsLeave a Comment

Tech News Keywords: , , , ,

Published on Apr 17, 2017U.S. Army Col. Tony Deane (Ret.), former New York State Homeland Security Director Michael Balboni and former State Department official David Tafuri on cyber threats from North Korea and Iran. Category License Standard YouTube License ... Read More
View Post

Lawyers, malware, and money: The antivirus market’s nasty fight over Cylance

In Business, Government, Healthcare, Legal, Science & Nature, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , , , ,

Enlarge / Is it "fresh malware"? Or is it something else repackaged?from an image by Sarah Shuda read... Read More
View Post

New leak shows how a major hacking group cracked Windows and international banks

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

New leak shows how a major hacking group cracked Windows and international banks - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus... Read More
View Post

The DeanBeat: Silicon Valley, sci-fi, and games are coming together

In Business, Events, Gaming, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

Last year, I started writing stories about the uncanny melding of science fiction, real-world technology, and games in mainstream entertainment such as HBO’s Westworld. The sci-fi in games and other entertainment used to be really out there, divorced from real-life technology and the near future. But then came lightning fast advances in artificial intelligence for voice services and self-driving cars, and that blurred the line between sci-fi and Silicon Valley. Masayoshi Son, CEO of Japan’s SoftBank conglomerate, ... Read More
View Post

Facebook is stepping up efforts to automatically identify fake accounts and Likes

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Facebook is stepping up efforts to automatically identify fake accounts and Likes - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Choru... Read More
View Post

Australia goes anti-privacy today, starts storing all user metadata

In Government, Legal, Mobile Technology, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

The Federal government of Australia, back in 2015, passed a controversial law whereby the carriage service providers or broadband providers are required to store all non-content data or metadata of their customers for up to a period of two years to help out law enforcement agencies. But, there’s more to it. … Due to a legal loophole in the legislation, telecom companies like Telstra weren’t required to actually store all this data, until now. So beginning this week, all the juicy and secret metadata of Aussies will be retained by broadband companies and will be shared with the government, and just so you know, they don’t need a warrant for that. So what actually is metadata? ... Read More
View Post

Microsoft patches Word bug that email scammers tried to exploit to steal banking information

In Business, Government, Security by Venture BeatLeave a Comment

Tech News Keywords: , ,

If you get an email that contains an unfamiliar Microsoft Word document, for goodness sake, don’t open it. The file could unleash a secret program designed to hoover up your banking information and send it to a cyber-criminal. In recent weeks, scammers have been running a massive email campaign to trick people into clicking on booby-trapped Word documents. Clicking on the documents serves to start a download ... Read More
View Post

Don't look down! Pool in Texas offers swim with a unique view

In Security by ABC 7 NYLeave a Comment

Tech News Keywords: ,

HOUSTON, Texas -- Video of a swim in a new Houston pool is not for the faint of heart.Market Square Tower offers a glass-bottomed pool that is 40 stories up.Check out this video: The roof pool is one of two pools in the building.Sister station KTRK-TV reports the building is downtown Houston's tallest residential high-rise, and it's within walking distance from some of the city's top restaurants, bars and theater district. Some of the other amenities include, a cyber lounge, basketball court, poker suite, indoor virtual golf, and a spa complete with sauna, steam and treatment ro... Read More
View Post

Don't look down! Houston pool offers swim with a unique view

In Security by ABC 7 NYLeave a Comment

Tech News Keywords: ,

HOUSTON, Texas -- Video of a swim in a new Houston pool is not for the faint of heart.Market Square Tower offers a glass-bottomed pool that is 40 stories up.The roof pool is one of two pools in the building.Sister station KTRK-TV reports the building is downtown Houston's tallest residential high-rise, and it's within walking distance from some of the city's top restaurants, bars and theater district.Some of the other amenities include, a cyber lounge, basketball court, poker suite, indoor virtual golf, and a spa complete with sauna, steam and treatment rooms.If you see yourself living there, the... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1starting gate0.788barrier, starting gate
2barrier0.789
3green color0.717
4bottle green color0.691

'If networks attacked, we'll fight back': German army launches new cyber command

In Business, Security, Video by RTLeave a Comment

Tech News Keywords: , ,

Germany's Defence Minister has unveiled a new cyber army that will eventually number thousands of staff. One of its missions, is to defend against alleged 'Russian hackers'. READ MORE: https://on.rt.com/87z5RT LIVE http://rt... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1siren0.896acoustic device, siren
2acoustic device0.896
3device0.917
4azure color0.994

Hackers activated emergency sirens in Dallas on Friday night

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Hackers activated emergency sirens in Dallas on Friday night - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Cho... Read More
View Post

Experian turns to biometrics startup to combat fraud

In Government, Legal, Security by Venture BeatLeave a Comment

Tech News Keywords: ,

(Reuters) – Credit bureau Experian has joined forces with technology firm BioCatch to use behavioral biometrics to help its clients spot fraudsters applying for credit cards and other lending products online, the companies said on Friday. BioCatch’s software, which was integrated in Experian’s fraud prevention platform, analyzes the way users interact with devices and websites by tracking a wide range of factors including how fast they type or the way they move their mouse across a web page. The information collected can help BioCatch determine whether users who are who they say they are or impostors. The companies said behavioral biometrics is especially useful in spotting when automated programs, or bots, a... Read More
View Post

Manhunt underway for suspect in Sweden truck attack

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , ,

A manhunt is underway for the attacker in Sweden who plowed through a Stockholm shopping district in a truck. Frank Ciluffo of the Center for Cyber and Homeland Security joins CBSN to discuss the latest terror attacks around the world.Subscribe to the "CBSN" Channel HERE: http://bit.ly/1Re2MgSWatch "CBSN" live HERE: http://cbsn.ws/1PlLpZ7Follow "CBSN" on Instagram HERE: http://bit.ly... Read More
View Post

3 Ways You're Gambling Away Dealership Profits With Old Technology

In Business, Events, Gaming, Government, Security by Dealer Track HoldingsLeave a Comment

Tech News Keywords: , , , , , ,

You can probably picture it – smoky casino, bank of shiny slot machines, and, of course, the guy with a coin bucket bigger than his brain dropping quarter after quarter into the slot and pulling the lever. As the machine swallows up his money, he hopes that each pull will bring him closer to the cash prize. But the jackpot never comes. Instead, the many small disappointments combine to create a large and devastating loss.  There’s a harsh lesson for your dealership in this story. And, guess what? You’re the guy with the coin bucket.Then what’s the shiny slot machine, you ask? Your outdat... Read More
View Post

Can hack but not shoot? FBI may ease entry for cyber agents

In Business, Government, Security by Newsday Technology NewsLeave a Comment

Tech News Keywords: , , ,

FILE - In this March 29, 2017, file photo, FBI Director James Comey speaks during the Intelligence and National Security Alliance Leadership Dinner in Alexandria, Va. Aspiring federal agents who can hack a computer with ease but can't shoot their way out of a paper bag could soon find a more welcoming FBI. (AP Photo/Cliff Owen, File) (Credit: AP) (AP) -- Aspiring federal agents who can hack a computer but can't shoot straight could soon find the FBI to be more welcoming. FBI Dire... Read More
View Post

Critical Informatics Announces Series A Funding, Appoints New CEO, Adds Office in Seattle

In Business, Education, Events, Government, Healthcare, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

Security Company Re-Launches to Integrate Human Expertise into Fast-Growing Security Analytics Landscape SEATTLE–(BUSINESS WIRE)–April 5, 2017– Critical Informatics, an established and growing provider of managed cyber-security solutions with extensive expertise in financial services, healthcare and public sectors, announced today the close of its Series A funding of $3.25 million, led by Alan Frazier’s East Seattle Partners. In conjunction with the round, the company is appointing a new CEO, Garrett Silver, who will lead the company through its next phase of growth. Critical Informatics will use the funds to build on its deep roots in managed security, as well as relationships in ke... Read More
View Post

Armor Announces $89 Million Investment from ST Telemedia

In Business, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , ,

Company poised to capitalize on global cloud migration and increasing security demand DALLAS–(BUSINESS WIRE)–April 5, 2017– Armor, The First Totally Secure Cloud Company™, closed an $89 million equity financing led by ... Read More
View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1half-mast flag0.774
2alizarine red color0.875
3brick red color0.83

Federal committee considers cybersecurity corps

In Business, Education, Government, Security by The StackLeave a Comment

Tech News Keywords: , , , ,

In an effort to bridge the digital gap in federal government, a House oversight committee is considering the creation of a cybersecurity corps made up of private sector recruits. During a hearing on workforce challenges, Rep. Will Hurd (R-Texas), chairman of the technology subcommittee, asked whether a similar framework to tech groups 18F and the U.S. Digital Service (USDS) could work for cybersecurity. Formed in 2014, 18F is a federal digital services agency which aims to support groups within government transform the way they deliver digital services and technology produc... Read More
View Post

John Casaretto talks about Trump's repeal of Obama-era internet privacy protections

In Business, Government, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: , ,

For more the Trump administration's decision to allow internet service providers to sell customers' browsing habits, CGTN's Rachelle Akuffo spoke to cybersecurity expert John Casaretto.He's the Founder and President of cyber security company, BlackCert... Read More
View Post

How CheckRecipient is helping companies avoid embarrassing data leaks caused by misaddressed emails

In Business, Education, Finance, Legal, Mobile Technology, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , ,

We’ve all been there: cursor hovering over the “send” button as we carefully proofread an email for silly errors, before dispatching the message to dozens or more people. But five minutes after sending, you get an email back from someone you’ve never heard of, saying: “Are you sure I was meant to be copied into this email?” The “misaddressed email” problem can be blamed on any number of factors, including human laziness and email autocomplete gone awry, but it’s a problem nonetheless. And the severity of the issue is only compounded when the email in question contains highly sensitive information. And this is why London-based CheckRecipient is ... Read More
View Post

MANGANO DELIVERS 2017 STATE OF THE COUNTY ADDRESS FROM NASSAU VETERANS MEMORIAL COLISEUM

In Business, Education, Energy, Events, Finance, Gaming, Government, Healthcare, Legal, Science & Nature, Security by Nassau County News NetworkLeave a Comment

Tech News Keywords: , , , , , , , , ,

Nassau County Executive Edward P. Mangano delivered the 2017 State of the County Address on Monday, April 3rd at the new Nassau Veterans Memorial Coliseum presented by NYCB. The County Executive showcased the newly transformed Coliseum, laid a path for the Islanders return and highlighted the ongoing construction of a new Memorial Sloan Kettering Cancer Center. The County Executive highlighted his success in attracting 25,000 new jobs and new employers, and consistently achieving the lowest unemployment rate in the region. New industries have emerged in cyber security and television and film production. To support the growing economy, the Mangano administration transformed vacant commercial real estate into 3,500 new housing opportunitie... Read More
View Post

Behind the headlines: Real world hacking and Watch Dogs 2

In Business, Gaming, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , , , ,

Tech journalist Violet Blue and Ubisoft game developer Thomas Geffroyd will speak about the appeal and challenges of creating realistic fiction in Watch Dogs 2, a game about a “hacktivist” cyber gang set in the hacker culture of San Francisco. They’ll talk about the game and its eerie resemblance to real life at our upcoming GamesBeat Summit 2017: How games, sci-fi, and tech create real-world magic. Ga... Read More
View Post

Intel Security finally spins out as independent McAfee

In Business, Events, Security by Venture BeatLeave a Comment

Tech News Keywords: , , ,

Intel has followed through on its pledge to divest itself of its Intel Security division, which it acquired for $7.68 billion in 2010. Now the new company will go by its old name, McAfee, and it is valued at $4.2 billion. Intel will still own 49 percent of the new company, while private equity firm TPG Capital will own the rest, and McAfee will function independently as a cybersecurity company based in Santa Clara, Calif. Intel Security general manager Christopher Young has been named McAfee CEO. As a standalone business, McAfee is one of the world... Read More
View Post

County Executive Mangano Delivers State of the County Address

In Business, Education, Finance, Government, Healthcare, Legal, Science & Nature, Security by Nassau County News NetworkLeave a Comment

Tech News Keywords: , , , , , , , , ,

Delivering his State of the County Address today, Nassau County Executive Edward P. Mangano outlined 8 years of campaign pledges he’s fulfilled during his two terms in office: to freeze property taxes and eliminate the home energy tax; create jobs and new housing opportunities, reduce crime, improve infrastructure and parks, renew the county’s commitment to its veterans, and transform the Nassau Coliseum into an attractive option for the Islanders. Hundreds of supporters came to hear his 8th annual speech, given at the previously dilapidated arena – now a modern, state-of-the-art entertainment destination: the New Nassau Veterans Memorial Coliseum, presented by NYCB Live. “Friends and neighbors, tonight I report to ... Read More
View Post

MANGANO’S 8TH STATE OF THE COUNTY ADDRESS: PROMISES KEPT

In Business, Education, Finance, Government, Healthcare, Legal, Science & Nature, Security by Nassau County News NetworkLeave a Comment

Tech News Keywords: , , , , , , , , ,

By Eden Laikin Delivering his State of the County Address earlier today, Nassau County Executive Edward P. Mangano outlined 8 years of campaign pledges he’s fulfilled during his two terms in office: to freeze property taxes and eliminate the home energy tax; create jobs and new housing opportunities, reduce crime, improve infrastructure and parks, renew the county’s commitment to its veterans, and transform the Nassau Coliseum into an attractive option for the Islanders. Hundreds of supporters came to hear his 8th annual speech, given at the previously dilapidated arena – now a modern, state-of-the-art entertainment destination: the New Nassau Veterans Memorial Coliseum, presented by NYCB Live. “Fr... Read More
View Post

Research investigates link between cybercrime and autistic traits

In Education, Government, Legal, Security by The StackLeave a Comment

Tech News Keywords: , , ,

A new study is seeking to investigate the connections between cybercrime and autistic-like personality traits – a link which remains contested and unproven. The project will see the University of Bath’s Centre for Applied Autism Research, the charity Research Autism and the cybercrime unit of the National Crime Agency (NCA) examine the prevalence of autism among cybercriminals. The research will address cybercrimes committed using a computer, computer network or other forms of IT, as opposed to ‘cyber-enabled’... Read More
View Post

‘The Rain Gods’ – The Start Up Revolution Building Better Government

In Business, Education, Government, Science & Nature, Security, Start Up by Venture BeatLeave a Comment

Tech News Keywords: , , , , , , ,

“Is government good enough? We don’t think so. Today we are calling on entrepreneurs to join the revolution for better government.” LONDON–(BUSINESS WIRE)–April 3, 2017– Timothy Barnes, founder of The Rain Gods Ltd, has issued a rallying cry to entrepreneurs who want to use their skills to build better government in the UK and around the world. The company operates the Rain Cloud Victoria start-up incubator in Westminster, located just a few minutes walk from all of the main UK government departments as well as major local government institutions. The Rain Cloud programme has been in what Barnes describes as a “beta stage” since quietly accepting its first members in S... Read More
View Post

How AI can ‘change the locks’ in cybersecurity

In Government, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , ,

Some of the world’s best known brands have invested millions of dollars in information security. So have their adversaries. Malicious actors are counting on the fact that your defenses are operated mostly by humans who make changes. When you moved into your neighborhood, did you change your locks or do you have the exact same ones as all your neighbors? Think about what could happen if a thief can compromise just one of those shared locks? For some reason the world of information security has a same-lock mentality. And some of their “customers” are malicious actors working hard to do harm. Given the situation, we should not be surprised that even with the massive amount of money being spent defenses still fail. If cy... Read More
View Post
Number of Items Identified: 11
Item #Item NameScoreItem Classification
1window0.699electronic device, video display, window
2video display0.704
3electronic device0.705
4device0.864
5menu0.66food, menu
6food0.66
7coal black color0.949
8black color0.73

Smart TV hack embeds attack code into broadcast signal—no access required

In Business, Events, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: , , , , , , ,

Enlarge / A screen shot showing the exploit taking control of a Samsung TV.reader comments 6 ... Read More
View Post

Borderless Cyber USA Conference 2017

In Business, Education, Finance, Government, Security by IEEE Long IslandLeave a Comment

Tech News Keywords: , , , , , ,

IEEE Computer Society Long Island often co-organizes events with the OWASP Long Island. Here is the latest information from the OWASP LI Chapter. Hi Everyone,We are passing along a discount opportunity to everyone. The Borderless Cyber USA Conference is coming up in June 2017. Below is a special registration offer using the OWASP discount code. The chapter leaders were on hiatus for the winter; we started planning for this year and will be announcing some upcoming meetings soon. INTERESTED in helping shape the direction of the OWASP Long Island chapter this year? Join the chapter leadership and bring your knowledge and expertise to make it YOUR committee and chapter! Dear Colleagues,... Read More
View Post

'We already are in a cyber war' with Russia

In Business, Government, Security, Video by Tech InsiderLeave a Comment

Tech News Keywords: , ,

While accusations of Russian hacking have dominated the news ever since the election, we have been involved in a strategic game of cyber warfare with the country for quite a while, according to David Kennedy, a former cyber security expert with the US Marine Corps. Here's a quick explanation of what's really going on and what Russia ultimately wants to gain from all of this.Read more: http://www.businessinsider.com/saiFACEBOOK: ... Read More
View Post

Cyber experts say Russian operatives have spread fake news for years

In Business, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: ,

During a Senate Intelligence Committee hearing, experts said Russia's intricate cyber warfare tactics have been ongoing for years. CBS News justice and homeland security correspondent Jeff Pegues explains on CBSN.Subscribe to the "CBSN" Channel HERE: http://bit.ly/1Re2MgSWatch "CBSN" live HERE: ... Read More
View Post

Vault 7: ‘Marble’ tool could mask CIA hacks as work of foreign cyber-attackers – WikiLeaks

In Business, Government, Security, Video by RTLeave a Comment

Tech News Keywords: , , ,

WikiLeaks’ latest batch of documents, named ‘Marble’, details CIA hacking tactics and how they can hamper forensic investigators from attributing viruses, trojans and hacking attacks to the spy agency . The tool was in use as recently as 2016.RT LIVE http://rt.com/on-airSubscribe to RT! ... Read More
View Post

German military to introduce cyber command amid rising threats

In Business, Government, Security by The StackLeave a Comment

Tech News Keywords: , ,

The German military is to establish a new cyber command in an effort to bolster defences and tackle growing threats against its networks. A high-value target for hackers, the military registered 284,000 complex and professional attempted breaches in the first two months of 2017. While no damage was incurred, the ministry said that attacks are on the rise and becoming ever-more advanced. It was also reported that the German Federal Office for Information Security is on high alert in the lead ... Read More
View Post
Number of Items Identified: 7
Item #Item NameScoreItem Classification
1person0.734

Senate Intelligence Committee holds first hearing on Russia's meddling in U.S. election

In Business, Government, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: , ,

The Senate Intelligence Committee on Thursday held their first public hearing on Russian meddling in the 2016 presidential election, focusing on Russia's cyber capabilities. Cybersecurity experts testified that Russian agents were able to create fake social media accounts by mimicking voters' profiles in key election states -- and that interference did not stop after the election. Jeff Pegues joins CBSN to discuss the hearing's findings.Subscribe to the "CBSN" Channel HERE: ... Read More
View Post

First public Senate Intelligence hearing on Russia probe highlights influence of disinformation

In Government, Security, Video by PBS NewsHourLeave a Comment

Tech News Keywords: ,

The Senate Intelligence Committee held its first public hearing on Russia's election season meddling, where both committee leaders made clear they wanted to avoid the partisanship that's plagued their House counterparts' investigation. They focused on issues from the very real threats of fake news stories, to rules for engagement in a cyber war. Judy Woodruff speaks with Sen. Ron Wyden, D-Ore.... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1digital clock0.736device, timepiece, digital clock
2clock0.736
3timepiece0.737
4device0.922
5LED display (computer/TV)0.723device, LED display (computer, TV)
6bottle green color0.906
7blue color0.877

U.S. college endures 54-hour Mirai variant attack

In Education, Government, Security by The StackLeave a Comment

Tech News Keywords: , , ,

An unnamed college in the United States was the target of a distributed denial of service (DDoS) attack, launched using a variant of the Mirai botnet. The attack lasted over 54 hours straight, from February 28 through March 3. This makes the attack notable for duration alone, in a world where the average DDoS attack lasts approximately 8 hours. Researchers from Imperva Incapsula, the security company employed by the school, immediately identified the attack as originat... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1billboard0.665
2person0.646
3black color0.782
4maroon color0.622

Pornhub now turns on encryption by default

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: ,

Pornhub now turns on encryption by default - The Verge... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1person0.725
2coal black color0.883

Possible Russian election-meddling a focus of Senate hearing

In Business, Education, Government, Legal, Security by ABC 7 NYLeave a Comment

Tech News Keywords: , , , , , , , , ,

WASHINGTON -- Lawmakers heading the Senate intelligence committee focused squarely on Russia as they opened a hearing Thursday on attempts at undermining the 2016 U.S. presidential election."Russian President Vladimir Putin ordered a deliberate campaign carefully constructed to undermine our election," Virginia Democratic Sen. Mark Warner said. Earlier Thursday, Putin again dismissed what he called "endless and groundless" accusations of Russian meddling in the U.S. election, describing them as part of the U.S. domestic political struggle. He also said he is ready to meet with President Donald Trump at an upcoming arctic summit.The hearing Thursday is to address how the Kremlin allegedly uses technology to... Read More
View Post

Top Democrats: Senate probe of Russian interference to steer clear of politics

In Business, Education, Government, Legal, Security by ABC 7 NYLeave a Comment

Tech News Keywords: , , , , , ,

WASHINGTON -- Some tactics Russia used to meddle in last year's presidential election would give shivers to anyone who believes in American democracy, the Senate intelligence committee's top Democrat says.Sen. Mark Warner of Virginia spoke ahead of a committee session Thursday that will address how the Kremlin allegedly uses technology to spread disinformation in the U.S. and Europe. Warner and the panel's chairman, Sen. Richard Burr, R-N.C., provided an update the committee's investigation into activities Russia might have taken to alter or influence the 2016 elections and whether there were any campaign contacts with Russian government officials that might have interfered with the election process.... Read More
View Post

Senate Intelligence Committee updates on Russia investigation

In Business, Education, Mobile Technology, Security, Video by CBS NewsLeave a Comment

Tech News Keywords: ,

The Senate Intelligence Committee is moving full speed ahead in their investigation into Russia ahead of their first hearings. Seven staff members are dedicated to going through multiple documents, and 20 interview requests have gone out, but they say it's more important that they get it right rather than proceed quickly. Frank Cilluffo, associate vice president and director at the Center for Cyber & Homeland Security at George Washington University, joins CBSN to discuss.Subscribe to the "CBSN" Channel HERE: ... Read More
View Post
Number of Items Identified: 4
Item #Item NameScoreItem Classification
1people0.669person, people
2coal black color0.967
Number of Faces Detected: 1
Face #Max AgeMin AgeAge CertaintyGenderGender CertaintyIdent NameIdent ClassificationIdent Score
154450.371276MALE0.99593Clint Howardpeople0.731059

Christopher Bray talks about QR code scams

In Business, Security, Video by CCTV AmericaLeave a Comment

Tech News Keywords: ,

For more on QR code scams, CGTN's Mike Walter spoke to cyber security expert Christopher Bray.Watch CGTN LIVE on your computer, tablet or mobilehttp://america.cgtn.com/livenewsSubscribe to CGTN America on YouTubeFollow CGTN America:Twitter: @cgtnamericaFacebook: @cgtnamericaGoogle+: CctvamericaTvnews»» Watch CGTN ««Washington, DC (and greater area)• MHz - Channel 3• COMCAST ... Read More
View Post
Number of Items Identified: 9
Item #Item NameScoreItem Classification
1maillot tights0.644footwear, hosiery, maillot tights
2hosiery0.644
3footwear0.644
4sun deck0.615porch, sun deck
5porch0.615
6azure color0.812
7steel blue color0.777

Former journalist accused in JCC threats appears in court

In Legal, Security by ABC 7 NYLeave a Comment

Tech News Keywords: , ,

NEW YORK (WABC) -- A former journalist arrested for making bomb threats at Jewish centers across the country answered to the charges in Manhattan federal court Wednesday.31-year-old Juan Thompson is a copycat according to federal prosecutors, accused of jumping on the bandwagon, and making threats to eight Jewish organizations. It was all allegedly just to get back at his ex-girlfriend.Thompson was in federal court in Lower Manhattan Wednesday afternoon, indicted on one count of cyber stalking which carries a penalty of up to five years in prison and a fine up to $250,000.Thompson lives in St. Louis, but prosecutors say he made threats to JCCs in New York, Texas, California and Michig... Read More
View Post

Activists Fight Online Trolling by Hate Groups

In Business, Government, Security, Video by Associated PressLeave a Comment

Tech News Keywords: , ,

Activists are combating a surge in online trolling targeting Jews, minorities, women and immigrants. The cyber harassment campaigns are orchestrated by right-wing extremists who flood their victims' social media accounts with hateful messages. (March 29)Subscribe for more Breaking News: http://smarturl.it/AssociatedPressGet updates and more Breaking News here: http://smarturl.it/APBreakingNewsThe Associated Press is the essential global news network, deliver... Read More
View Post

Hacker Kevin Mitnick on password managers and online safety

In Business, Security, Video by Tech InsiderLeave a Comment

Tech News Keywords: , ,

It's very difficult to come up with and remember unique passwords for every single login. Cyber security expert Kevin Mitnick — author of the book "The Art of Invisibility" — explains why you shouldn't even try to come up with your own passwords, and what you should do instead. Read more: http://www.techinsider.io/FACEBOOK: ... Read More
View Post
Number of Items Identified: 10
Item #Item NameScoreItem Classification
1heart0.733figure, heart
2figure0.733
3light bulb0.714device, electric lamp, light bulb
4electric lamp0.748
5lamp0.775
6device0.775
7alabaster color0.991

Hackers promised an iCloud apocalypse — but probably can't deliver

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , ,

Hackers promised an iCloud apocalypse — but probably can't deliver - The Verge... Read More
View Post
Number of Items Identified: 15
Item #Item NameScoreItem Classification
1memory device0.674
2device0.675
3food0.756
4beverage0.666food, beverage
5bottle green color0.758
6purple color0.748

It’s a dumb idea for the UK government to try and break encryption, but it’ll still try

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

It’s a dumb idea for the UK government to try and break encryption, but it’ll still try - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus... Read More
View Post

Security and Scale: How game developers can avoid freak-outs

In Business, Government, Security by Venture BeatLeave a Comment

Tech News Keywords:

Presented by Akamai There are three key questions to ask yourself before your next Day 1: Do I have the right infrastructure to support my game? How well am I protecting my product and players? Do I have the capacity to expand and adapt? Most companies ask themselves these questions…but only after their game server has gone offline or while they’re fending off a DDoS attack. Hardly the right time. The truth is, infrastructure and security must be critical elements at the start of your development cycle, not at the end. You need to consider scalability and adaptive infrastructure from the get-go. ... Read More
View Post
Number of Items Identified: 6
Item #Item NameScoreItem Classification
1pick (for string instrument)0.868device, pick (for string instrument)
2device0.91
3jade green color0.747

UK government renews calls for WhatsApp backdoor after London attack

In Business, Government, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , ,

UK government renews calls for WhatsApp backdoor after London attack - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoade... Read More
View Post

CVE-2014-8731

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9832 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9834 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9836 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9838 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9839 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9840 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2014-9915 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2015-2263

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2015-4078

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2015-8624

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2015-8628

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2015-8687

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

CVE-2016-10046 (imagemagick)

In Government, Security by NIST NVDLeave a Comment

Tech News Keywords: , , , , , , ,

NVD - Detail Mission and Overview NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA). Resource Status NVD contains: Last updated: 3/26/2017 12:56:28 AM CVE Publication rate: 32.63 Email List NVD provides four mailing lists to the public. For information and subscription instructions please visit ... Read More
View Post

Bethesda partners with Alamo Drafthouse to show ‘The Matrix’ and other films that inspired Prey

In Business, Gaming, Science & Nature, Security by Venture BeatLeave a Comment

Tech News Keywords: , , , ,

Bethesda’s next major release is a science-fiction thriller, and the publisher is using film to reach an appreciative audience. The Alamo Drafthouse chain of movie theaters is kicking off a Bethesda Softworks Presents film series dedicated to the upcoming Prey reboot from developer Arkane Studios. Prey, which debuts May 5 for PlayStation 4, Xbox One, and PC, tells the story of Morgan, a lone human left on a space station called Talos I. As the subject of experiments, your character awakens to find that they (you can play as a man or a woman) must fight off an alie... Read More
View Post

Hackers demand ransom from Apple for allegedly stolen iCloud data

In Business, Government, Healthcare, Legal, Security by Newsday Technology NewsLeave a Comment

Tech News Keywords: , , ,

A group of hackers claims to have breached Apple's iCloud platform and gained access to hundreds of millions of user accounts. If Apple doesn't pay a ransom, the hackers say they will remotely wipe the accounts. The hackers, who call themselves the "Turkish Crime Family," are asking for $75,000 worth of bitcoin or Ethereum, or $100,000 in iTunes gift cards, Motherboard reported on Wednesday. To encourage Apple to pay, the hackers are seeking publicity by sending screenshots of alleged emails between them and Apple's security team to media outlets. The hackers are threatening to reset some of the stolen iCloud accounts and remotely wipe victims' devices if Apple doesn't pay by April 7, according to Motherboard, which repo... Read More
View Post
Number of Items Identified: 12
Item #Item NameScoreItem Classification
1tabi (socks)0.623footwear, hosiery, tabi (socks)
2sock0.629
3hosiery0.631
4footwear0.637
5necktie0.615garment, neckwear, necktie
6neckwear0.634
7garment0.635
8claw0.609device, claw
9device0.661
10charcoal color0.938

What’s Wrong with Me?

In Business, Events, Government, Healthcare, Legal, Science & Nature, Security by New YorkerLeave a Comment

Tech News Keywords: , , , , , , , , ,

Online, I found a welcoming sick ward of fellow-sufferers, and I started to live there.CreditIllustration by Anna and Elena Balbusso ... Read More
View Post
Number of Items Identified: 5
Item #Item NameScoreItem Classification
1woodshed1building, woodshed
2shed1
3building1
4chestnut color0.827
5brick red color0.749

Google takes Symantec to the woodshed for mis-issuing 30,000 HTTPS certs

In Business, Education, Government, Legal, Security by Ars TechnicaLeave a Comment

Tech News Keywords: ,

EnlargeNyttend reader co... Read More
View Post
Number of Items Identified: 8
Item #Item NameScoreItem Classification
1box0.642
2gray color0.706

Israeli-American Arrested for Wave of JCC Threats

In Business, Education, Government, Legal, Security by Long Island PressLeave a Comment

Tech News Keywords: , , , , , , , ,

An Israeli-American teenager was arrested in Israel on Thursday as the main suspect behind scores of threats to Jewish Community Centers across the United States, according to reports. A spokesman for the Israeli police confirmed the arrest in a Tweet Thursday morning but did not identify the suspect. He said the suspect is 19 years old and had allegedly made threats to “Jewish organizations, communities & JCC bomb threats in US.” The suspect reportedly holds dual American and Israeli citizenship. Authorities have not yet released a motive. Authorities in Israel collaborated with the FBI during the investigation, the spokesman said. American law enforcement agencies had been looking into the threats for months.... Read More
View Post

Surging Bitcoin prices inspire a wave of scams

In Business, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , ,

Surging Bitcoin prices inspire a wave of scams - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus||{};Chorus.windowLoaded=!1,Chorus.AddScript=... Read More
View Post

Prosecutors think they can extract data from phones seized during Inauguration Day protests

In Business, Legal, Mobile Technology, Security by The VergeLeave a Comment

Tech News Keywords: , , , , ,

Prosecutors think they can extract data from phones seized during Inauguration Day protests - The Vergeclockmenumore-arrow (function(d) { try { if (localStorage.getItem('chorus-fonts-0b50f0674bed2b66b24a77410eb3f99c') === 'yes') { d.documentElement.className += ' fonts-loaded'; } } catch (e) {} var fontUrls = ["https://fonts.voxmedia.com/unison/stylesheets/verge.1d37918fdeeb1febc4d68217382a1e72.css"]; var ss = d.styleSheets; for (var i=0; i -1) { ss[i].ownerNode.media = 'all'; fontUrls.splice(idx, 1); } } if (fontUrls.length > 0) { setTimeout(onload, 0); } } onload(); })(document); var chorusInitQueue=[],volume_embed_host="https://volume.vox-cdn.com";var Chorus=Chorus... Read More