Only in This Stupid World
......do drugstores make the sick walk all the way to the back of the
Store to get their prescriptions while healthy people can buy cigarettes at the front.
Only in This Stupid World
.....do people order double cheeseburgers, large fries, and a diet coke.
Only in This Stupid World
.....do banks leave vault doors open and then chain the pens to the counters..
Only in This Stupid World
......do we leave cars worth thousands of dollars in the driveway and put
Our useless junk in the garage.
Only in This Stupid World ...........do we buy hot dogs in packages of ten and buns in
Packages of eight..
Only in This Stupid World .....do they have drive-up ATM machines with Braille lettering.
EVER WONDER
...
Why the sun lightens
Our hair, but darkens our skin?
Why don't you ever see the
Headline 'Psychic Wins Lottery'?
Why is
'abbreviated' such a long word?
Why is it that
Doctors call what they do 'practice'?
Why is lemon juice made
With artificial flavor, and dish washing liquid made with real lemons?
Why is the man who
Invests all your money called a broker?
Why is the time of
Day with the slowest traffic called rush hour?
Why isn't there
Mouse-flavored cat food?Why isn’t there Cat flavoredDog food?
Why didn't Noah
Swat those two mosquitoes?
Why do they sterilize the
Needle for lethal injections?
You know that
Indestructible black box that is used on airplanes? Why don't they make the whole plane out of that stuff?!
Why don't sheep
Shrink when it rains?
Why are they called
Apartments when they are all stuck together?
If con is the opposite of
Pro, is Congress the opposite of progress?
If flying is so
Safe,why do they call the airport the terminal?
Friday, 21 November 2014
Now I wonder... why?
NOW I WONDER WHY?
Thursday, 16 October 2014
9 weird home remedies
Listen to your elders advice Not because they are always Right
But because they have more experiences of being Wrong!!
1) Listerine cures toenail fungus
Soaking your feet in Listerine mouthwash for 15-20 minutes, twice a day, will cure most cases of toenail fungus. Listerine contains antiseptic and disinfectant ingredients; it has been used for everything from curing gonorrhea to cleaning floors.
Listerine is also good for curing blisters (dab onto blister 2-3 times per day to dry it out), and dandruff.
2) Yogurt cures bad breath
Studies have shown that live bacteria in sugar free yogurt can suppress levels of bad breath-causing bacteria. If the bad bacteria can't survive, your breath smells sweeter.
3) Olive oil cures Eczema
Olive oil is rich in vitamin E, so it's a great skin moisturizer. Apply extra virgin, unrefined olive oil to your skin after showering, while your skin is still damp. The olive oil seals in moisture and helps soothe painful Eczema flair-ups.
4) Sugar stops the hiccups
Hiccups are annoying, but now you can stop them within one minute simply by swallowing a teaspoon full of dry sugar. Experts believe that the sudden sweetness on the tongue overloads the nerve endings in the mouth and stops the hiccup spasm.
5) Chewing peppermint or cinnamon gum eases commuting stress
Studies have shown that chewing peppermint or cinnamon gum increases awareness and reduces fatigue by as much as 20%. Test subjects reported 25% less frustration and 30% increased alertness. The drive also seemed 30% shorter for those who chewed the gum, versus those who did not.
6) Biting on a pencil cures headaches
Tension headaches can often arise from unconsciously clenching your jaw. Gently holding a pencil between your teeth forces your jaw muscles to relax, easing your headache.
7) Vodka cures stinky feet
Wipe your feet with a vodka-soaked rag to eliminate foot odor. Vodka contains alcohol, an antiseptic that is very drying. Alcohol destroys odor-causing fungus and bacteria and dries out the moisture that lets these organisms grow.
8) Olives and lemons cure sea sickness
Motion sickness causes excess saliva, which can make you queasy. Eating olives or sucking on a lemon at the first signs of sea sickness can help ease nausea thanks to the tannins contained in these items.
9) Tomatoes cure acne
Tomatoes have a lot of vitamins C and A, antioxidants and acidic content, so they can be used to treat a variety of minor skin ailments. This cure is especially good for oily skin. Mash one small tomato into a pulp, then spread the pulp on your face and let it sit for one hour. Wash it off with tepid water and pat dry. Repeat once a day for a week.
Labels:
bacteria,
chewing gum,
ecofren,
ecofren camelia,
ecofrennetwork888,
fatigue,
headache,
health,
lemons,
listerine,
olive oil,
pencil,
stress,
sugar,
tomatoes,
vodka,
yogurt
Thursday, 25 September 2014
VAWTRAK Plagues Users in Japan
VAWTRAK first made the rounds via attachments to fake shipping notification emails in August 2013. The attachment was actually a ZIP file that contained a malicious file, detected as BKDR_VAWTRAK.A,
which was initially known for information theft from FTP and email
clients. This 2013 variant stole credentials from several Windows email
clients, however, more recent VAWTRAK variants have expanded their
capabilities to include a wider range of theft. Among these capabilities
were banking Trojan routines such as stealing banking credentials and
credit card information.
What is the VAWTRAK malware family?
VAWTRAK is a family of online banking malware. It was originally spotted in August 2013 for its information theft routines but more recent variants are known to steal banking credentials, more prominently in Japan.
Why is VAWTRAK noteworthy?
VAWTRAK is noteworthy because its routines have vastly "improved" from simple information theft to stealing banking data from certain banking institutions in Japan. VAWTRAK is also notable because its routines make malware cleanup difficult. VAWTRAK restricts users from running files related to antivirus software by adding specific registry entries to infected systems. It checks for various security software (including Trend Micro products) and downgrades the software privileges to render the antivirus capabilities ineffective.
Despite its routines, VAWTRAK’s malware behavior is not particularly innovative. Stealing FTP credentials are similar to the FAREIT malware. VAWTRAK is also similar to ZBOT as it has a configuration file, which contains code for web injection and a list of sites it monitors. Another major reason why VAWTRAK is notable is that it managed to target four major banks and five credit card companies based in Japan. These sites then lead to the Angler Exploit Kit, which leads users to various Flash and Java exploits used to install VAWTRAK in systems.
How widespread are VAWTRAK variants in Japan?
Data from the Trend Micro™ Smart Protection Network™ in the pie chart above shows that most of the VAWTRAK infections are found in Japan. The United States and Germany trail far behind. The increase in banking malware that target banks in Japan can be attributed to the increase in information stealing malware such as TSPY_AIBATOOK that have added capabilities allowing the malware to steal banking credentials.
What are the notable VAWTRAK variants?
Some of the more notable VAWTRAK variants include BKDR_VAWTRAK.PHY, BKDR_VAWTRAK.SM, and BKDR_VAWTRAK.SMN. A common malware routine for these variants involve checking for the presence of certain security-related directories in the Program Files and Application Data folders. These security products include the following:
VAWTRAK’s main routines include backdoor commands, such as keylogging and capturing screenshots. It also steals FTP credentials and stored email credentials, as well as data from Internet browsers. VAWTRAK also tracks data that contains banking and credit card information.
How will I know if my system is infected?
Users will know that their systems are infected if there is an existing {random filename}.dat or {All Users Profile}\Application Data in the ProgramData folder. The .DAT file is actually a .DLL file present in the autorun registry.
Another symptom for VAWTRAK infection is users’ inability to run antivirus-related processes. VAWTRAK adds policy-related registries that restrict users from running files under antivirus-related folders.
How does a typical VAWTRAK infection chain look like?
Below is a sample infection chain that shows how VAWTRAK arrives on a system via a Java.exe file that originates from a malicious or compromised site. The .DAT file is actually a .DLL and the final payload, aka, the VAWTRAK malware.
Users are advised to disable or uninstall browser plugins such as Java, Adobe Flash, and Adobe Reader if they are not needed. Since the attacks illustrated in the infection chains above originated from and involved certain software, it is always best to minimize the risk of infection by applying software patches and keeping systems up-to-date. Cybercriminals may utilize vulnerabilities and system bugs should these holes be uncovered and exploited.
Lastly, users must be sure to only visit legitimate banking websites to lessen the risk of clicking fraudulent links embedded in emails or spammed messages.
Does Trend Micro protect users from this threat?
Yes. Trend Micro products detect and delete VAWTRAK variants via the Smart Protection Network’s file reputation services. Web reputation services blocks access to the domains where VAWTRAK variants connect to.
FROM THE FIELD: EXPERT INSIGHTS
"We may continue to see VAWTRAK in the wild since its newer, specialized routines may lead to complicated cleanup solutions. There are definitely clear signs of VAWTRAK further advancing and improving. Newer variants now have features such as having a configuration file that contains the banking and credit card institutions which it monitors. The older arrival vectors were just spammed messages, but now VAWTRAK is seen to arrive via Java exploits." –Jimelle Monteser, threat response engineer
"The VAWTRAK threat is ultimately a threat toward all people who utilize online banking. Since online banking has gone mainstream for a large percentage of users, ranging from home users to enterprises, VAWTRAK poses grave a threat to all." –Rhena Inocencio, threat response engineer
http://about-threats.trendmicro.com/us/webattack/3141/VAWTRAK+Plagues+Users+in+Japan
What is the VAWTRAK malware family?
VAWTRAK is a family of online banking malware. It was originally spotted in August 2013 for its information theft routines but more recent variants are known to steal banking credentials, more prominently in Japan.
Why is VAWTRAK noteworthy?
VAWTRAK is noteworthy because its routines have vastly "improved" from simple information theft to stealing banking data from certain banking institutions in Japan. VAWTRAK is also notable because its routines make malware cleanup difficult. VAWTRAK restricts users from running files related to antivirus software by adding specific registry entries to infected systems. It checks for various security software (including Trend Micro products) and downgrades the software privileges to render the antivirus capabilities ineffective.
Despite its routines, VAWTRAK’s malware behavior is not particularly innovative. Stealing FTP credentials are similar to the FAREIT malware. VAWTRAK is also similar to ZBOT as it has a configuration file, which contains code for web injection and a list of sites it monitors. Another major reason why VAWTRAK is notable is that it managed to target four major banks and five credit card companies based in Japan. These sites then lead to the Angler Exploit Kit, which leads users to various Flash and Java exploits used to install VAWTRAK in systems.
How widespread are VAWTRAK variants in Japan?
Data from the Trend Micro™ Smart Protection Network™ in the pie chart above shows that most of the VAWTRAK infections are found in Japan. The United States and Germany trail far behind. The increase in banking malware that target banks in Japan can be attributed to the increase in information stealing malware such as TSPY_AIBATOOK that have added capabilities allowing the malware to steal banking credentials.
What are the notable VAWTRAK variants?
Some of the more notable VAWTRAK variants include BKDR_VAWTRAK.PHY, BKDR_VAWTRAK.SM, and BKDR_VAWTRAK.SMN. A common malware routine for these variants involve checking for the presence of certain security-related directories in the Program Files and Application Data folders. These security products include the following:
- a-squared Anti-Malware (now Emsisoft Anti-Malware)
- a-squared HiJackFree (now Emsisoft Anti-Malware)
- Agnitum
- Alwil Software
- AnVir Task Manager
- ArcaBit
- AVAST Software
- AVG
- Avira
- BitDefender
- BlockPost
- Doctor Web
- DefenseWall
- ESET
- f-secure
- FRISK Software
- G DATA
- K7 Computing
- Kaspersky Lab
- Lavasoft
- Malwarebytes
- McAfee
- Microsoft Security Essentials
- Norton AntiVirus
- Online Solutions
- pTools
- Panda Security
- Positive Technologies
- Sandboxie
- Security Task Manager
- Spyware Terminator
- Sunbelt Software
- Trend Micro
- UAenter
- Vba32
- Xore
- Zillya Antivirus
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\
CodeIdentifiers\0\Paths\{generated GUID for the AV software}
ItemData = "{AV software path}"
CodeIdentifiers\0\Paths\{generated GUID for the AV software}
ItemData = "{AV software path}"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\
CodeIdentifiers\0\Paths\{generated GUID for the AV software}
SaferFlags = "0"
What are its main routines?
CodeIdentifiers\0\Paths\{generated GUID for the AV software}
SaferFlags = "0"
VAWTRAK’s main routines include backdoor commands, such as keylogging and capturing screenshots. It also steals FTP credentials and stored email credentials, as well as data from Internet browsers. VAWTRAK also tracks data that contains banking and credit card information.
How will I know if my system is infected?
Users will know that their systems are infected if there is an existing {random filename}.dat or {All Users Profile}\Application Data in the ProgramData folder. The .DAT file is actually a .DLL file present in the autorun registry.
Another symptom for VAWTRAK infection is users’ inability to run antivirus-related processes. VAWTRAK adds policy-related registries that restrict users from running files under antivirus-related folders.
How does a typical VAWTRAK infection chain look like?
Below is a sample infection chain that shows how VAWTRAK arrives on a system via a Java.exe file that originates from a malicious or compromised site. The .DAT file is actually a .DLL and the final payload, aka, the VAWTRAK malware.
VAWTRAK system arrival via java.exe
Here is another sample infection chain that shows how VAWTRAK arrives
on a system, this time using a Flash.ocx file that leads to the final
payload, a .DAT file that is actually a .DLL (VAWTRAK).
VAWTRAK system arrival via Flash11e.ocx
How do I protect myself from VAWTRAK?
Users are advised to disable or uninstall browser plugins such as Java, Adobe Flash, and Adobe Reader if they are not needed. Since the attacks illustrated in the infection chains above originated from and involved certain software, it is always best to minimize the risk of infection by applying software patches and keeping systems up-to-date. Cybercriminals may utilize vulnerabilities and system bugs should these holes be uncovered and exploited.
Lastly, users must be sure to only visit legitimate banking websites to lessen the risk of clicking fraudulent links embedded in emails or spammed messages.
Does Trend Micro protect users from this threat?
Yes. Trend Micro products detect and delete VAWTRAK variants via the Smart Protection Network’s file reputation services. Web reputation services blocks access to the domains where VAWTRAK variants connect to.
FROM THE FIELD: EXPERT INSIGHTS
"We may continue to see VAWTRAK in the wild since its newer, specialized routines may lead to complicated cleanup solutions. There are definitely clear signs of VAWTRAK further advancing and improving. Newer variants now have features such as having a configuration file that contains the banking and credit card institutions which it monitors. The older arrival vectors were just spammed messages, but now VAWTRAK is seen to arrive via Java exploits." –Jimelle Monteser, threat response engineer
"The VAWTRAK threat is ultimately a threat toward all people who utilize online banking. Since online banking has gone mainstream for a large percentage of users, ranging from home users to enterprises, VAWTRAK poses grave a threat to all." –Rhena Inocencio, threat response engineer
http://about-threats.trendmicro.com/us/webattack/3141/VAWTRAK+Plagues+Users+in+Japan
Labels:
Adobe Flash,
Alwil Software,
and Adobe Reader,
AnVir Task Manager,
ArcaBit,
AVAST Software,
AVG,
Avira,
BitDefender,
BKDR_VAWTRAK.SMN,
ecofren,
ecofren camelia,
ecofrennetwork888,
internet,
Java,
scams,
VAWTRAK
ZeuS and Its Continuing Drive Towards Stealing Online Data
ZeuS and Its Continuing Drive Towards Stealing Online Data
TSPY_ZBOT is the Trend Micro detection for malware related to what the industry dubs "ZeuS botnets." ZeuS botnet, in fact, is a shortened term for networks of compromised computers that use ZeuS/ZBOT Trojans in their botnet-related operations. TSPY_ZBOT variants typically arrive via spam appearing to come from legitimate sources, asking recipients to click a link. The said link leads to the download of TSPY_ZBOT, which silently sits in systems to wait for users to key in their credentials to particular sites.
TSPY_ZBOT is the Trend Micro detection for malware related to what the industry dubs "ZeuS botnets." ZeuS botnet, in fact, is a shortened term for networks of compromised computers that use ZeuS/ZBOT Trojans in their botnet-related operations. TSPY_ZBOT variants typically arrive via spam appearing to come from legitimate sources, asking recipients to click a link. The said link leads to the download of TSPY_ZBOT, which silently sits in systems to wait for users to key in their credentials to particular sites.
Since 2007, Trend Micro has been monitoring the ZBOT family.
The number of ZBOT detections has substantially grown over the years.
To date, Trend Micro has seen over 2,000 ZBOT detections and the numbers
continue to rise.
How does this threat get into users' systems?
The
threat may arrive as a spammed message or may be unknowingly downloaded
from compromised websites. The majority of ZBOT detections have been
found to target bank-related websites. However, recent spam runs have
shown an increasing diversity in targets. The list of noteworthy ZBOT
variants include TROJ_ZBOT.SVR, which was used to spam government
agencies; TSPY_ZBOT.JF, which targeted AIM users; and TSPY_ZBOT.CCB, which targeted social networking site, Facebook.
Spammed
messages typically purport to be from legitimate companies and, more
recently, from government agencies. One recent ZeuS attack targeted Bank of America Military Bank customers. ZBOT variants have likewise been found in a spam run that rides on popular events such as Michael Jackson's death.
Trend Micro also found a ZBOT variant that leveraged the Windows LNK flaw.
A new ZBOT variant was spotted that was supposedly signed by a legitimate antivirus company. In reality, the signature had been lifted from a legitimate application of the company without their knowledge or consent.
How does it trick users into clicking links?
Spammed
messages typically purport to be from legitimate companies and, more
recently, from government agencies. ZBOT variants have likewise been
found in a spam run that rides on popular events such as Michael Jackson's death.
What is the primary purpose of the ZeuS botnet?
It
is primarily designed for data theft or to steal account information
from various sites like online banking, social networking, and
e-commerce sites.
How does this threat make money for its perpetrators?
It
generates a list of bank-related websites or financial institutions
from which it attempts to steal sensitive online banking information
such as user names and passwords. It then monitors the user's Web
browsing activities (both HTTP and HTTPS) using the browser window
titles or address bar URLs as triggers for its attack.
Newer ZBOT variants use JavaScript codes, inserting these into a legitimate bank's Web page.
Other ZBOT variants display a second fake login page after the original
login page to get additional information. Cybercriminals may either
siphon money directly from victim accounts. They may either steal money
directly from the victim, or use them as conduits or "money mules" that
help transfer funds from victims to cybercriminal bank accounts.
These routines risk exposing the user's account information, which may then lead to the unauthorized use of the stolen data.
Who are at risk?
ZBOT
variants target online banking users in general. As mentioned in the
section How does this threat get into users' systems?, ZBOT spreading
via spam uses latest headlines or convincing email content, or exploit
flaws in commonly-used software. Almost anyone can fall prey to its
schemes. Users with ZBOT-infected systems who log in to any of the
targeted sites are at risk of losing personal information to
cybercriminals.
What does the malware do with the information it gathers?
It
sends the gathered information via HTTP POST to remote URLs.
Cybercriminals may then use this information for their malicious
activities. They may be sold in underground markets.
What makes this threat persistent?
In
addition to its social engineering tactics and ever-evolving spamming
techniques, ZBOT makes detection difficult because of its rootkit
capabilities. Upon installing itself on an affected system, ZBOT creates
a folder with attributes set to System and Hidden to prevent users from
discovering and removing its components. Furthermore, ZBOT is capable
of disabling Windows Firewall and of injecting itself into processes to
become memory-resident. It also terminates itself if certain known
firewall processes are found on the system. ZBOT variants also figure in
daisy-chain downloads involving other malware families such as WALEDAC and FAKEAV.
Moreover, ZBOT creators leveraged the Windows LNK flaw and have abused the PDF Launch feature
in some Adobe products. Using the aforementioned as entry points allow
ZBOT variants to get into more systems virtually undetected. Also, ZBOT
has also kept up with trends in operating systems. Newer variants
feature full and integrated support for new Windows operating systems
like Vista and Windows 7. Older versions only had support for the said
operating systems with optional modules.
What is the difference among ZeuS, ZBOT, and Kneber?
In
February 2010, Trend Micro researchers came across several malware that
were first thought of as part of a new botnet dubbed as Kneber. However
Kneber,
as it turned out, relates to the ZeuS botnet as a recently coined term
pertaining to a specific ZBOT/ZeuS compromise. On the other hand, the
term 'ZBOT' is Trend Micro's detection name for all malware involved in the massive botnet.
So what can I do to protect my computer from the threat presented by the ZeuS botnet?
It
is important that users exercise caution when opening email messages
and when clicking URLs. Since the ZBOT malware perpetrators are
constantly finding new ways to attack users, users are advised to employ
safe computing practices.
Be
wary of phishing pages that purport to be legitimate websites, as these
are primarily designed to fool unwitting users into handing over
personal information. Clicking links on emails that come from unknown
senders is one of the easiest ways to fall prey to ZBOT attacks.
TSPY_ZBOT variants are currently supported by Trend Micro GeneriClean, a feature found in most Trend Micro products. Users need to manually scan their systems to trigger this.
Solutions supported by the Trend Micro™ Smart Protection Network™
block the spam used by this botnet to infect users via the email
reputation service. It can detect and prevent the execution of malicious
files via the file reputation service. It also protects users from ZBOT
variants by blocking access to malicious sites via the Web reputation
service as well as from phone-home attempts wherein an infected computer
tries to upload stolen data or to download additional malware from
command-and-control (C&C) servers.
Non-Trend Micro product users can also check their systems using HouseCall,
a free tool that identifies and removes all kinds of viruses, Trojans,
worms, unwanted browser plug-ins, and other malware from affected
systems. They can also use Web Protection Add-On to proactively protect their computers from Web threats and bot-related activities. RUBotted can be used to find out if their machines are part of a bot network.
Some of our heuristic detections for this threat are MAL_ZBOT, MAL_ZBOT-2, MAL_ZBOT-3, MAL_ZBOT-4, MAL_ZBOT-5, MAL_ZBOT-6, and MAL_ZBOT-7.
http://about-threats.trendmicro.com/us/webattack/64/ZeuS+and+Its+Continuing+Drive+Towards+Stealing+Online+Data
Tuesday, 5 August 2014
How to Protect Your Credit Card From a Data Breach
How to Protect Your Credit Card From a Data Breach
You never know when or where hackers will strike, so follow these fraud prevention tips.
By Anisha Sekar
Monday, 14 July 2014
Why World Cup 2014 will be most high-tech tournament yet: Smart balls, frozen shirts and vanishing free-kick lines combine for the ultimate digital sporting event
Why World Cup 2014 will be most high-tech tournament yet: Smart balls, frozen shirts and vanishing free-kick lines combine for the ultimate digital sporting event
- A host of new technologies have been unveiled for Brazil World Cup 2014
- Kicking off today, the tournament will welcome a number of innovations
- These include a frozen vest that keeps players cool in the heat
- Players will also have the latest technology in their boots and kits
- Apps and fan connectivity could also make this the first 'digital World Cup'
Published: 13:25 GMT, 12 June 2014 |
Updated: 15:37 GMT, 13 June 2014
The 2014 World Cup in
Brazil is set to be the most scientific and technologically advanced football
tournament ever seen.
From smart clothing
that keeps players cool, to advanced boots that enhance speed and skill, no
stone has been left unturned in providing the best experience for audiences and
players alike.
MailOnline takes a look at some of the innovations that
will be adding to the action as the tournament kicks off.
Enlarge
World Cup 2014 in Brazil kicks off today, and it is set to
be the most high-tech football tournament ever. Players will be given access to
the latest and greatest technologies to ensure they are able to perform to the
very highest level on the pitch while fans will be more connected than ever, as
detailed in this expandable graphic
During a match
From the moment a
paraplegic walks out onto the pitch in an 'Iron Man' suit to take the first kick
of the World Cup, you'll know you're in for something different, this time
around.
THE BRAZUCA WORLD CUP BALL
Between the seams the Brazuca also has a different geometry to different balls, helping it remain more stable in the air.
Smoother balls, as seen with the previous Jabulani at World Cup 2010 in South Africa, are more unpredictable due to a process known as ‘knuckling’.
As air passes over the seams it can create a force that knocks or moves the ball.
The Brazuca, with its multiple seams and roughness, will be less prone to the ‘volatile swoops’ of the Jabulani.
And the most notable
technological advances will be taking place during matches.
For example, at this
World Cup referees will have access to a foam, water-based, vanishing spray that
will be carried in special belts.
When the first foul
is committed and a player lines up for a free-kick, referees will
be able to draw lines.
This
means that when a defending wall sets up to block a free-kick specialist such as
Italy's Andrea Pirlo from scoring, it will be clear where they should be
standing.
The referee will
first circle the ball before pacing out the ten yards (nine metres) required for
a wall, and spraying a line on the ground.
Within a minute the
line disappears, letting play continue without visible marks on the
pitch.
Although this
technology has been used before, such as at last summer's under-20 World Cup,
this is the first time it has been used at the World Cup proper.
Referee Carlos Velasco of Spain marks a line with
vanishing spray during the semi final soccer match between Raja Casablanca and
Atletico Mineiro at the Club World Cup soccer tournament in Marrakech, Morocco
in December 2013. The technology is being used at a World Cup for the first time
in Brazil
Also noticeable at
this tournament will be something familiar to followers of club football:
goal-line technology.
It is being supplied
by German company Goal Control, who use seven high-speed cameras at each goal
mouth to monitor the action.
More than 2,000 tests
were performed in the run up to the World Cup, all of which were successful,
while their managing director Dirk
Broichhausen claimed it was 'unhackable' because it doesn't require a connection
to the internet.
Used in
every stadium, the system is able to tell the referee if a goal has been scored
within a second to an accuracy of 0.2 inches (0.5 centimetres), with the word
'GOAL' transmitted to a watch on the referee's wrist if the ball has crossed the
line.
This will be
especially important for moments where it is unclear if the ball has crossed the
line - such as Frank Lampard's infamous 'goal' that wasn't given for England
against Germany in 2010.
Here the goal-line monitoring device is demonstrated
before the media at Yokohama Stadium in Yokohama, near Tokyo, in 2012. For the
first time at a World Cup, the technology will be used to determine whether a
ball crosses the goal line during matches at the tournament in
Brazil
Battle of the Boots
The most important
part of any player's attire, football boots, have undergone something of a
revolution over the last few decades.
Gone is the clunky
(and chunky) footwear of old, with footballers now preferring to sport sleek and
stylish boots packed full of technologies to aid their
game.
And this World Cup
will see no end to the numerous innovations employed by kit suppliers to give
their players the edge, with various manufacturers battling it out to prove who
is the best.
Nike, for instance,
recently unveiled their Mercurial Superfly boot that will be sported by Portugal
star Cristiano Ronaldo, among other players.
The boots use a
three-knit weave to put less material between the foot and the ball, enhancing
the players’ touch.
The Dynamic Fit
Collar around the top of the boot, meanwhile, is designed to create a better fit
and make it feel more natural.
A tendon-like support
called a Brio cable also connects the upper section of the boot and the heel
that, according to Nike, ‘acts like a slingshot that helps propel the player
forward.’
The company added: 'A
new, more-flexible full-length carbon plate helps players to more efficiently
transmit power through the ground.
Added studs at the
boot’s heel offer stability, and extra traction has been placed at the toe to
give players more grip and propulsion during the critical final 10 per cent of
their stride.'
Nike recently unveiled its Mercurial Superfly boot that
will be sported by Portugal star Cristiano Ronaldo, among other players. It uses
a three-knit weave to put less material between the foot and the ball, enhancing
the players' touch. The collar at the top, meanwhile, makes it feel more
natural
Other
players such as Belgium’s Marrouane Fellaini and Ivory Coast’s Kolo Toure,
meanwhile, will be wearing boots designed by Wilmslow-based Warrior
Global.
One of their boots is
known as the Gambler.
This has nylon stacks
positioned on the front of the boot to absorb the speed of the ball and give
additional control.
A revised, more
ergonomic plate on the instep provides more aggressive grip and control, while
the intricately designed sole gives better traction and comfort.
Warrior’s other boot
is the Skreamer, made of microfibres to give players an incredibly lightweight
experience.
Its major innovation,
however, is a ‘4D Arrowbed Insole’ that actually stimulates blood circulation in
the foot.
General Manager of
Warrior Football, Richard Wright told MailOnline, ‘Warrior’s goal is to deliver
products which support our players to amplify their mesmeric skills as well as
helping the rest of the footballing community to improve their game.’
The Skreamer boot from Warrior, (pictured here), is
designed to give players a lightweight boot on the pitch while also providing
for added speed and control. These include a 3D-printed rubber finish at the
front of the shoe that cushions the incoming football, allowing players to more
easily take it into their stride
Kits
One of the big stories to come out of the
build-up to this World Cup has been the scorching temperatures
predicted.El Niño is expected to cause heat-related problems, with estimates for England’s opening game against Italy on Saturday in the Amazonian region of Manaus suggesting match temperatures could feel like 36°C (97°F).
And elsewhere in the country, players and fans alike will be subjected to the full brunt of the Brazilian heat.
With this in mind, kit manufacturers have done their utmost to provide garments that will keep players cool.
Nike’s mantra for the tournament, for example, is ‘Cool under pressure’.
In designing their kits, such as that worn by the Brazil national team, they combined technical fabrication with thermo-regulation.
Brazil’s 2014 World Cup jersey has 56 per cent more airflow than previous versions.
It is also composed of 94 per cent polyester and just 6 per cent cotton - giving it the comfortable feel of cotton, but the heat regulation properties of polyester.
Nike's Brazil 2014 jersey (pictured) is designed to not
only keep the players cool but also give them added comfort. With this in mind,
it is made of 94 per cent polyester and just 6 per cent cotton, giving wearers
the thermoregulation of the former with the comfort of the latter
Called adiPower, they have designed a series of pre-cooling sleeves and vests that can be worn by players before and after matches, or during training.
They are designed to help leading football players prepare for games in warm climates - environmental temperatures of 24°C and over - by reducing body temperatures and delaying the onset of heat-induced fatigue.
The garments are cooled in a freezer before being worn by a player, bringing their temperature down over 15 to 20 minutes.
The high-tech pre-cooling concept includes a number of 'hyper absorbent granule zones' specifically located around the lower arms and upper back, which rigorous testing has revealed to be the body’s primary cooling areas.
The adiPower technology from adidas is designed to keep
players cool in the scorching conditions expected in Brazil. The vest, which
also has matching sleeves, is cooled in a freezer. It is then worn by a player
after matches or during training to bring their body temperature down in 15 to
20 minutes
Training
Aside from frozen
vests, Adidas has another technology to help players during training called the
Smart Ball.
Built-in sensors monitor how hard it is
struck, track flight trajectories and reveal impact points for penalties and
corners. It syncs with the firm’s micoach app via Bluetooth, and helps players learn and master various kicking and control skills.
For example, the data is used to teach users how to bend free kicks, take better penalties, generate more power, and avoid injury.
Built-in sensors in the Adidas Smart Ball (pictured)
monitor how hard it is struck, tracks flight trajectories and also reveals
impact points for penalties and corners. It syncs with the firm's miCoach app
via Bluetooth and helps players learn and master various kicking and control
skills
Elsewhere in training, some teams, such as
England, are leaving nothing to chance.
England's first day of training in Miami gave an insight into how meticulous Roy Hodgson's preparations to cope with the heat and humidity in Brazil have stretched.
Several portable Lucozade cool boxes lined the side of the training pitch, with each bearing the names of individual players and containing tailor-made recovery drinks to cater for their different requirements.
The Football Association's Dave Reddin, exercise scientist Chris Neville, Manchester United fitness coach Tony Strudwick, and Arsenal nutritionist James Collins have worked with experts from Loughborough University to customise recovery drinks with different electrolytes depending on the amount of fluid that that players lose through sweat.
Players have also been given iPads loaded with instructions on how to beat their opposite man during each match.
Strikers, for example, are shown stats and positioning by their opposite defender in order to make sure they get the better of them - or at least try to.
'The popularity of smartphones will make this year’s World Cup the most connected and interactive tournament ever.
'It serves as a high profile example of what happens every day: mobile apps now play a prominent role in people’s lives and represent a growing digital economy.
'Millions of football fans will be using apps to place bets, stream live matches or highlights, as well as share content with their friends via social networks'
'This is the first digital World Cup, and we expect to see bets placed on mobile devices overtake the traditional betting shops for the first time.'
In a study by AppDynamics, called the App Attention Span study, they found that tablets and smartphones have become the new betting terminals, with almost half of respondents (48 per cent) expecting to use a mobile app to have a flutter.
Six in ten (61 per cent) intend to use a website, but only 30 per cent will head to a betting shop, and 15 per cent will place a bet over the phone.
England's first day of training in Miami gave an insight into how meticulous Roy Hodgson's preparations to cope with the heat and humidity in Brazil have stretched.
Several portable Lucozade cool boxes lined the side of the training pitch, with each bearing the names of individual players and containing tailor-made recovery drinks to cater for their different requirements.
The Football Association's Dave Reddin, exercise scientist Chris Neville, Manchester United fitness coach Tony Strudwick, and Arsenal nutritionist James Collins have worked with experts from Loughborough University to customise recovery drinks with different electrolytes depending on the amount of fluid that that players lose through sweat.
Players have also been given iPads loaded with instructions on how to beat their opposite man during each match.
Strikers, for example, are shown stats and positioning by their opposite defender in order to make sure they get the better of them - or at least try to.
England staff (pictured) carry out cool boxes containing
personalised recovery drinks for the team. Experts have customised recovery
drinks with different electrolytes depending on the amount of fluid that players
lose through sweat. Players have also been given iPads loaded with instructions
on how to beat their opponents
Technology for the fans
It's not just players
who are being treated to the latest and greatest innovations, though.
Twitter has announced
that fans will be able to support their team by using 'hashflags', by tweeting
the three letter code for their team to show support (such as
#ENG).
This
World Cup has also seen an abundance of apps make their way to various devices
in order to keep fans better connected than ever before.
'The past few years have seen mobile
completely revolutionise the football fan experience,' said Tom Levey, Tech
Evangelist at AppDynamics, the application performance management company that
works with the likes of Nike to keep their apps running without
glitches.'The popularity of smartphones will make this year’s World Cup the most connected and interactive tournament ever.
'It serves as a high profile example of what happens every day: mobile apps now play a prominent role in people’s lives and represent a growing digital economy.
'Millions of football fans will be using apps to place bets, stream live matches or highlights, as well as share content with their friends via social networks'
'This is the first digital World Cup, and we expect to see bets placed on mobile devices overtake the traditional betting shops for the first time.'
In a study by AppDynamics, called the App Attention Span study, they found that tablets and smartphones have become the new betting terminals, with almost half of respondents (48 per cent) expecting to use a mobile app to have a flutter.
Six in ten (61 per cent) intend to use a website, but only 30 per cent will head to a betting shop, and 15 per cent will place a bet over the phone.
In a study by App Dynamics (shown), they found that people
were prone to losing interest when programmes were not working as expected. The
company expects that the widespread availability of mobile apps will make
certain services such as betting extremely popular with smartphone users during
World Cup 2014
Company PipSports, meanwhile, recently
unveiled its 'Instagram for the World Cup' app.
The PiPsports app lets sports fans create personalised photos of live sports games, enhanced with real-time data from international sports data company Opta.
Sports fans can use the app to take photos of the sporting action, and overlay the image with one of a section of ‘skins’.
Each skin includes live data from Opta, such as the current score, location, team and game statistics, match/event name and team crests and logos, to create a personalised image.
Statistics from Opta can be overlaid in real-time when taking a photo, provided the user has a data connection on Wi-Fi or 3/4G.
Once captured. the photos can be shared on a fan’s Facebook account or direct to the PiPsports stream, which allows other fans to follow the game or event through fan-generated images.
'PiPsports is like the Instagram for football, World Cup, and sports fans,' former Australian professional footballer Lucas Neill, a brand ambassador for PipSports, told MailOnline.
'Whether they’re going to be at a live game in Brazil, in the pub or watching on the sofa at home with friends, football fans can capture the most intense and exciting moments of watching their team and country play.
'The app enhances normal photos by adding skins that include stats on the match being watched. So if you take a photo of the celebration after a great goal, for example, you get the image of that moment with scoreline included - which makes for a pretty cool momento.'
Read more: http://www.dailymail.co.uk/sciencetech/article-2655296/Why-World-Cup-2014-high-tech-tournament-Smart-balls-frozen-shirts-vanishing-free-kick-lines-combine-ultimate-digital-sporting-event.html#ixzz37UurqktG
The PiPsports app lets sports fans create personalised photos of live sports games, enhanced with real-time data from international sports data company Opta.
Sports fans can use the app to take photos of the sporting action, and overlay the image with one of a section of ‘skins’.
Each skin includes live data from Opta, such as the current score, location, team and game statistics, match/event name and team crests and logos, to create a personalised image.
Statistics from Opta can be overlaid in real-time when taking a photo, provided the user has a data connection on Wi-Fi or 3/4G.
Once captured. the photos can be shared on a fan’s Facebook account or direct to the PiPsports stream, which allows other fans to follow the game or event through fan-generated images.
'PiPsports is like the Instagram for football, World Cup, and sports fans,' former Australian professional footballer Lucas Neill, a brand ambassador for PipSports, told MailOnline.
'Whether they’re going to be at a live game in Brazil, in the pub or watching on the sofa at home with friends, football fans can capture the most intense and exciting moments of watching their team and country play.
'The app enhances normal photos by adding skins that include stats on the match being watched. So if you take a photo of the celebration after a great goal, for example, you get the image of that moment with scoreline included - which makes for a pretty cool momento.'
Read more: http://www.dailymail.co.uk/sciencetech/article-2655296/Why-World-Cup-2014-high-tech-tournament-Smart-balls-frozen-shirts-vanishing-free-kick-lines-combine-ultimate-digital-sporting-event.html#ixzz37UurqktG
Labels:
#worldcup,
4G,
brazuca ball,
dailymail,
digital,
ecofren,
ecofren network community,
facebook,
goal line tech,
internet,
nike mercurial superfly booat,
smart phones,
Wi-Fi,
World Cup 2014
Saturday, 28 June 2014
Some Banks Not Following Rules to Keep You Safe at ATMs
Some Banks Not Following Rules to Keep You Safe at ATMs
By Willard Shepard
| Wednesday, Nov 20, 2013
Marcia Brooks never thought it would happen to her. An ATM deposit turned into a life-threatening experience in Pompano Beach.
“They could have easily grabbed me, taken me, shot me, raped me,” said Brooks.
A gunman forced her to take $160 from the ATM. He still hasn’t been caught.
“I'll never forget the gun being pressed against my neck,” she said.
It’s something we all take for granted – getting cash from the ATM. But an NBC 6 investigation with the Florida Center for Investigative Reporting found many banks are keeping you in the dark when it comes to your safety.
Getting cash quickly – day or night – is convenient, but it can also be dangerous.
The Team 6 investigation found at least 35 felonies committed at ATMs the last two years across the state – armed robberies, shootings, even murder.
Alex Sanchez, president of the Florida Bankers Association, told us that banks are doing all they can to prevent you from becoming a victim.
“This is an important matter for our banks that they take very, very, seriously … we want to provide a safe haven for our citizens and our customers.”
The state sets minimum lighting standards for not just the ATM and the area near it, but also the parking lot. Mirrors must be on the ATM so you can see behind you and there are limits on the size of nearby plants.
In the last five years, not one of the 250 Florida chartered banks has been cited by state inspectors for violating those standards. A spokesperson for the Florida Office of Financial Regulation told Team 6 the state's 118 inspectors didn’t find a single bank outside the rules over the last five years. As for the thousands of other banks in our state, we don’t know. Federal regulators told us the inspections are confidential.
However, the engineering experts from Scientific Expert Analysis pulled out their tape measures and lighting devices calibrated the same evening – and told us the very first South Florida bank we checked, Regent Bank in central Broward, was outside some of the regulations. The firm has 40 years’ experience evaluating structures.
Ed Brill, an engineer with Scientific Expert Analysis, said the light near the ATM was measuring between 2- and 5-foot candles but the state statute require 10-foot candles.
“When we first looked at the lighting right at the ATM face we found that it met the requirements … as we moved away we found that the readings did not meet requirements,” Brill stated.
Matthew Speath, also an engineer with Scientific Expert Analysis, said the landscaping at the bank was too high. The regulations say vegetation in the area shouldn't be more than 3 feet high and must be well lit.
Speath said vegetation on the corner of the building was about 7 to 8 feet tall.
“It’s still in direct eyesight of the ATM and directly adjacent to the parking lot … a patron that was parking in one of these spaces … is potentially subjected to an individual that could be hiding,” he said.
The engineering experts told us that generally a bank falls out of compliance with the state law unintentionally because of things that happen over time like someone changes a light bulb to the incorrect wattage or doesn’t cut the vegetation.
One Orlando family knows the pain of violence at the ATM. Off-duty Central Florida policeman Alfred Gordon Sr. was killed in an ATM robbery.
“I don’t think banks always have the consumer in mind,” said Alfred Gordon, the son of Alfred Gordon Sr.
Two men are now serving life behind bars for the killing of Gordon Sr. The family’s lawyer says there was poor lighting and the mirrors were missing – the family and Bank of America reached a settlement. Gordon’s family worries about profit trumping safety.
“They are going to see their expectations for profit and bonus margins, but I think that a lot of times the consumer is the one that loses out in the end because when it comes to safety I don’t think you can take lightly and try to skimp on in any way,” said Gordon Jr.
Richard Hodak, a former FBI agent who directed security for one bank, says 50 percent of the robberies, rapes, and murders that occur at ATMs occur between 7 p.m. and midnight.
Hodak says lawmakers, police, and banks aren’t doing enough.
Hodak says, “Banks do not seem to do a good job in policing their ATMs to evaluating the risk involved in the ATMs.”
We asked the engineers to check four banks in all. At one Wells Fargo in north Broward, according to them, there was not enough light. They found dark spots on the side of the ATM and down the wall adjacent to it.
“The lighting down the side does not meet the minimum requirement – about half or less than half the requirement,” Brill said.
The engineers found no problems at two other South Florida banks. But just how many banks aren't doing what the law requires is anyone's guess. We're also in the dark about how many customers like these exist because most law enforcement agencies don't have a category tracking ATM crimes.
Wells Fargo sent us a statement that read, in part, “... while we regularly review our locations … we will review this location again ... if we find that the lighting needs to be fixed, we will do so in a timely manner.”
Regent Bank said, “… the bank believes that the landscaping around the ATM fully meets the requirements of the Florida statutes. As regards to the lighting level, the bank thanks Channel 6 for bringing to its attention the fact that the candle foot power was not as bright as it should be …”
To read more about violent crimes at ATMs, go to the Florida Center for Investigative Reporting.
http://www.nbcmiami.com/news/local/Some-Banks-Not-Following-Rules-to-Keep-You-Safe-at-ATMs-232611431.html
Subscribe to:
Posts (Atom)