Feed aggregator

[EHM 2018-10-13] Bruins 2 @ Habs 7

Furiously Eclectic People - Mon, 10/15/2018 - 00:57

Bruins coming off a loss and the Habs a win for game 2 of the season.


Scratches: Byron, Hischier, Tatar

Boston couldn't bear the onslaught in the first period which ended 5-0. Despite struggling at faceoffs, the Habs dominated on shots and boardplays.

Goals and assists were spread around with only Valiev, Honka and Ritchie not registering a point.

Shipachyov was injured with a hip flexor strain - expected to be out for 3 weeks.

image_blog: tweetbutton: 
Categories: Miscellaneous Blogs

Clever Chevy

Knit and Tonic - Sun, 10/14/2018 - 20:49
Let me tell you, I started this pattern three years ago. Three! I have always had this love for Missoni. That chevron and all the colors. Like many other knitters, I thought that I could select a bunch of colors... Wendy
Categories: Knitting Feeds

[thepuck 2018-10-13 NHL] Pens 3 @ Habs 4 (SO)

Furiously Eclectic People - Sun, 10/14/2018 - 18:59

Reality is setting in and Julien is already panicking. Recently against LA, Montreal’s strategy was nullified. The run and gun “speed” game doesn’t work on a solid teamwork based strategy like LA. LA’s system makes a team capable of beating even better teams but is a playoff style not always suited for long-term season play. It is a marvellous example of good hockey.

Anyhow, Montreal has tried this mickey mouse strategy before with Therien and it failed. Will it work now?

For those who do not now, I use the old-school C-LW-RW listing of lines and in brackets is their individual rating for the game.

Scratches: Peca, Alzner, Scherbak
IRL: Deslauriers(surgery), De La Rose(cardiac), Weber(surgery), Price(flu)

1st - Habs outplay Pens, down 2-0 anyway.
2nd - more even period, with the Habs taking the lead.
3rd - slower period, Pens tie it up.

OT - 3-3 tie, Montreal gets a 5 on 3 on OT and gives the puck away on every play. Drouin lies on the ice looking around while the Pens get a 2on1 stopped only by a streaking Armia who just gets in and intercepts a pass out of the air.

SO - Byron goes in slow and picks out the open spot. Malkin tries to outwait Niemi to the side and Niemi extends to block. Drouin goes in like a snail watching and waiting, drilling home the second goal. Crosby seems to outwait and outwit Niemi to the opposite side Malkin tried but Niemi extends and raises his glove at the last moment to make the save. Habs win!

Game Notes

When Montreal was down, Gallagher seemed like he was on a mission. HeeEventually scored by working hard (after 4 solid chances). Gallagher changed the whole momentum of the game and kept at it. He is the heart of the team.

Juulsen gets hit from behind by Malkin. No call. Juulsen levels Malkin. Good to see the youngster stand up for himself.

Armia and Byron showed a little chemistry however their centreman, Kotkaniemi looks completely lost and out of his league. At least he didn’t get another hooking penalty, something he’s had trouble learning - hooking the hockey stick is now enforced as a penalty.

Drouin is slow and takes a long time to make a decision. He also turns away from the play and gives up while there’s still time. That said, he can skate well with the puck and avoid being hit but generally accomplishes nothing beneficial. The diving bothers me.

Earlier today I was at the Kings/Sens game and watching Brady Tkachuk (4th overall pick 2018) play and then later on TV watched Jesperi Kotkaniemi (3rd overall pick 2018) and I see a world of difference. Brady is a great player right now. Kotkaniemi may well have potential but he’s not ready yet. Lehkonen looked better when he started in the NHL and he needed two full seasons before he looked like a NHL calibre player in the third. Is this really all about a European adapting to the North American game?

When Julien switched Plekanec to Kotkaniemi’s place on the third line it immediately looked better as all three players gelled really well. While this line looks like the right line, Plekanec makes everyone around him look better. Peca worked well with Hudon and Shaw in previous games so the solution seems obvious.

On defense we seem to lack a stable stoic defenseman like Alzner. Sure, Weber would be awesome however Alzner is reliable and that’s more important than Julien’s preference for rushing once in awhile without any finish.

This was an exciting and very close game. You could tell Pittsburgh was not going to be stunned by an upstart hockey team again but Montreal pulled it out, outshooting the seemingly superior team.

Pros: Gallagher, Niemi, Plekanec, Tatar
Cons: Drouin, Kotkaniemi, Petry, Reilly

Tatar got some points and works hard but he still has something to prove. Petry is always hit and miss. He shows solid talent one game and falls apart the next. Inconsistent but the talent is there and he may just have too much put on his shoulders with Weber out. Reilly had a few pivotal giveaways. It happens.

A goal was called back on Montreal. As Shaw went to the net, a Pittsburgh player got his knee behind him and scooped his legs (slewfoot style) of which the outside one caught the back of the goalie’s foot as Mete beat him with a shot. Debatable call but consistent with what they’ve been calling this year, unlike the hooking and slashing or faceoffs which seem to be a mysterious random call.

Drouin, Tatar, Domi and Gallagher got the bulk of the forwards ice-time. Julien was definitely not rollrolling four lines as the range is from 8 minutes to 24 minutes.

On Defense, Reilly and Petry were favoured by Julien.

#GoHabsGo @CanadiensMTL

image_blog: tweetbutton: 
Categories: Miscellaneous Blogs

Review & Commentary Of Castles & Crusades Codex Celtarum By Brian Young For Your Old School Campaigns

Swords & Stitchery - Sun, 10/14/2018 - 17:02
"The Codex Celtarum contains a veritable host of gaming material. Built around the complete mythological cosmos of the Celts, in it you'll find new spells for your druid, cleric, and illusionist. New monsters, including mountains of fey. New magic items. For the very bold, there are new powers for your characters, allowing your characters to become fey! 190 new spells 90 gods and Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
Categories: Tabletop Gaming Blogs

Magic of the Season

3d6 Traps & Thieves - Sun, 10/14/2018 - 16:44

A spooky, macabre assortment of festive items to delight and amaze. All presented in OD&D style. These entries are from the Duckin’ & Braggin’ archives, and will doubtlessly appear in future releases. Happy holiday mayhem!

Helm, Vorpal: A classic prank – put the helm on and it cuts off your head. No save. I mean, how’s it gonna miss?! A laugh riot!
Ghoulash: This whip is fashioned from the flayed skins of ghouls and ghasts. Upon a successful hit, the target must save vs. paralyzation or be paralyzed is if by the touch of a ghoul. Even elves are affected by this item.
Evening: When read aloud, the powerful incantation of the Scroll causes night to fall within a 10 mile radius. The sun becomes as wan as the moon and the environment is treated as if under the shroud of night. The effect lasts until true nightfall. If read during the night, this scroll sends the reader to the moon.
Toadstool: This unpleasant item of spongy material renders the wearer immune to non-magical poisons and venoms. By a touch of the hand wearing the Ring, the user can bestow a poison effect to another living creature. The wearer has no discernable scent and cannot be detected or tracked by smell.
Rod of Certain Death: Upon activation, the user is immediately stricken dead – no save.
Apocalypstick: These cosmetic items come either in small, easy-to-apply tubes, or in tiny jars. Proper and full application takes one round. One application is effective for up to an hour, but physical contact (a kiss) activates the magical effect, as does “blowing a kiss.” The maximum range for a blown kiss effect is 30’.  
Color Effect Bruise Purple Inflict 3-30 blunt impact damage. If damage exceedstarget’s STR, target is knocked prone. Hellfire Red Immolate target for 3-30 fire damage. 2-20 damage next round. 1-10 damage following round – then fire goes out. Nuclear Gray Disintegrate effect that leaves target as nothing but mildly radioactive ash. Plague Green Infect target with a deadly, contagious disease of GM’s choice – or, roll randomly. Suffocation Blue Target cannot breathe. Gains a saving throw each round until success or death.
Bag of Sticky Treats: This small sack contains half-melted candies and other sweets. Simply opening the Bag will attract creatures of up to animal intelligence from up to 500’. When thrown, the Bag will burst open on impact to create an unusually colorful and sticky Web effect in a 20’ cube. The sweet aroma will attract creatures just as opening the Bag. Fire will not destroy the candy floss mess, it only serves to harden the stuff into a substance that victims of less than ogre strength cannot break from, and that will last for an entire day. The sticky contents are edible, but will not serve as a nutritious meal.
Blood Vessel: This modest paddleboat is powered by blood. One gallon of blood will grant motive force for up to 6 hours. If the blood is from a sentient creature, the duration is 12 hours. If the blood is from a sentient creature of good alignment, the duration is a full day. On average, a human body contains about 1 ½ gallons of blood.
Bottle of Boos: This hefty glassware item comes with an engraved stopper in the shape of a head with an open mouth that is obviously expressing a sound of “ooo.” There are two type of Bottle.            Displeasure: The stopper resembles an angry person. Opening the Bottle releases a loud and outraged “Boooooo…” sound. Any living creature within 50’ must save vs. spell or fall to the ground in abject despair, dropping any weapons, shields, or items. Victims do nothing but languish in misery, able to defend themselves if attacked at -2 on all die rolls.            Spook: The stopper resembles a classic “sheet ghost.” Opening the Bottle releases a spectral, spooky “Boooooo…” sound. Any living creature within 50’ must save vs. spell or turn and flee the area, dropping any held items. Those affected by the sound cannot approach within 10’ of the Bottle thereafter.
Broom, Sonic: This flying broom can reach a rate of 360’ per turn, but has no room for a passenger larger than a housecat. When used to strike as a weapon, the Broom can impact with a thunderclap that stuns and deafens the target.
Cider Jar: A single apple left inside the closed Jar for at least 4 hours turns into a gallon of cider (chilled or hot – as commanded). After a full day, the cider becomes “hard cider.”
Ghost Bustier: This fetching garment gives the wearer the ability to become a scary, intangible version of themselves. In “ghost form,” the wearer is affected as if by a Potion of Gaseous Form, but without the loss of any items or garments. The ghostly wearer cannot attack physical creatures, but may Cause Fear by touch. While intangible, the wearer can affect and attack other such creatures – like ghosts, wraiths, spectres, and out-of-phase (ethereal) monsters normally. Undead creatures treat the user of this item as one of their own, and the wearer is unaffected by energy drain attacks of all types.
Lich Pin: On a successful hit, this long stick pin will inflict 1 point of damage and Hold a lich in place until the Pin is removed. The lich may still take actions, but cannot move from the spot where the Pin was applied. The lich also cannot remove the Pin itself, but may command a minion to do so.
Maledictionary: This “tome of curses” contains a number of curse spells and harmful enchantments of all types. However, merely opening the book causes it to speak a random spell to take effect upon the holder – and anyone else that might be within range.
Categories: Tabletop Gaming Blogs

Frozen Führer [ICONS]

Sorcerer's Skull - Sun, 10/14/2018 - 14:00


Prowess: 4
Coordination: 4
Strength: 5
Intellect: 5
Awareness: 4
Willpower: 5

Determination: 1
Stamina: 10

Specialties: Military

Needs the Cold
Ruler of the Abhumans
"Revenge is a Dish Best Served Cold"

Resistance (Cold): 7
Cold Control Gloves: 6
         Affliction (freezing), Blast (Ice), Binding (ice)

Alter Ego: Arno Kaltmann
Occupation: Professional Criminal, Terrorist
Marital Status: Single
Known Relatives: Hans and Ilse (parents, deceased)
Group Affiliation: Masters of Menace
Base of Operations: The Hidden City of the Abhumans
First Appearance: DOUBLE ACTION #30
Height: 6’ Weight: 180 lbs.
Eyes: Blue Hair: White

Arno Kaltmann was born from a eugenics experiment by the German Thule Society. His parents were selected for their “pure Aryan” heredity, and in the womb, he was exposed to chemicals synthesized from instructions found in a manuscript discovered in the Antarctic in what was believed to be one of the last outposts of the Hyperborean civilization. From birth, Kaltmann exhibited an unusually low body temperature and an aversion to warmth. He was raised in  a special cold room, which suited his metabolism, but kept him isolated.

When the Thule Society disbanded, the Nazi government took over care of the young Kaltmann. Hitler viewed him as embodying a rediscovery of the pure Hyperborean ancestry of the Aryan peoples. The Nazi leadership wanted a army of genetic Hyperborean soldiers, but the Allied forces defeated them before their plans could be realized.

Kaltmann was captured by the U.S. military and moved to a secret facility in Greenland. There he was studied with the goal of replicating his resistance to the cold. A secret prisoner of war, he was kept in a containment cell and given no contact with the outside world.

When Kaltmann was in his early twenties, he took advantage of the guards’ distraction and escaped, killing a particularly callous military scientist as he went. He yearned for revenge against the Americans who had mistreated him and robbed him of the destiny he was promised as the forerunner of a master race.

He escaped into the Arctic, where he believed his enemies could not easily follow. There, he was discovered by a hidden offshoot of humanity known as the Abhumans. Some of the Abhuman community worshipped the extinct Hyperboreans, and recognizing Kaltmann’s link to them, hailed him as a messiah of sorts. Opportunists used the cult to overthrow the Abhuman royal family and install Kaltmann, with the idea that he would be their puppet. Kaltmann carried little for ruling the Abhuman city, but saw the Abhumans as allies in his plan for revenge against the United States.

To this end, Kaltmann had a cryosuit and cold projectors built by Abhuman engineers. As the Frozen Führer, he and his lackeys attempted to gain control of an ICBM silo in North Dakota. He planned to start a nuclear war to bring about “Fimbulwinter” and a new Ice Age, but his scheme was foiled by Thunderhawk and the female motorcyclist troubleshooters known as the Avenging Angels.

Though defeated, Frozen Führer was not deterred and as clashed with various heroes in his attempts to start a new, cold Reich.


First Comics News - Fri, 10/12/2018 - 21:39

PORTLAND, OR, 10/12/2018 — Image Comics is thrilled to announce that the first issue of Sam Humphries (Harley Quinn, Nightwing) and Jen Bartel’s (The Mighty Thor, America) magical mystery series BLACKBIRD is being fast-tracked for a second printing in order to keep up with customer demand.

In BLACKBIRD, there exists a secret cabal of ruthless magic users hiding just out of sight in the neon lights of L.A.—and Nina Rodriguez knows it. She’s determined to see it for herself, even if everyone else thinks she’s crazy. But can she unravel this mystery before the Great Beast catches up with her?

BLACKBIRD #1 will remain available for purchase across all digital platforms, including the Image Comics website (imagecomics.com), the official Image Comics iOS app, Comixology’s website (comixology.com), iOS, Android, and Google Play. 

BLACKBIRD #1 2nd printing (Diamond code: AUG188950) and BLACKBIRD #2, Cover A by Jen Bartel (Diamond code: SEP180143) and Cover B by Mingjue Helen Chen (Diamond code: SEP180144), will be available on Wednesday, November 7th. The final order cutoff deadline for comics retailers is Monday, October 15th.

Categories: Comic Book Blogs


First Comics News - Fri, 10/12/2018 - 21:36

Detective Pitor Wyrd is on the case!

MILWAUKIE, Ore., (October 12, 2018)—There are some cases that are simply too weird for law enforcement to solve. Enter Pitor Wyrd, an un-aging, invincible detective with a penchant for the strange who steps in to assist…for a fee. Between a botched attempt at recreating a certain US supersolider, a monster roaming the countryside, and a trail of bodies, there is no case too big, too small, or too weird.

Writer Curt Pires (The Fiction, The Forevers, Pop, The Tomorrows) joins forces with artist Antonio Fuso (G.I. Joe: Cobra, James Bond, The Girl Who Played with Fire) for Wyrd, a four-issue comics series that’s James Bond meets The X Files. The series is colored by Stefano Simeone and features variant covers by Jeff Lemire (Black Hammer), Rafael Albuquerque (Neil Gaiman’s A Study in Emerald), Gabriele Dell’Otto (X-23), and Danijel Zezelj (Starve).

Wyrd #1 (of four) goes on sale January 30, 2019, and is available for pre-order at your local comic shop.

Categories: Comic Book Blogs

Who Will Stand…

First Comics News - Fri, 10/12/2018 - 21:33

When The Last Guardian Falls




Written by DONNY CATES



On Sale 1/23/19


Categories: Comic Book Blogs

RICH REVIEWS: Submerged # 3

First Comics News - Fri, 10/12/2018 - 21:31

Title: Submerged # 3
Publisher: Vault Comics
Writer: Vita Ayala
Illustrator: Lisa Sterle
Colorist: Stelladia
Letterer: Rachel Deering
Covers by: Jen Bartel, Triona Farrell & Lisa Sterle
Price: $ 3.99 US
Rating: 4 out of 5 stars
Website: www.vaultcomics.com
Comments: The fact that Elysia is gay is brought up it is to show who she is. Her father is not shown but only mentioned he is the one the family wants to impress. She and her brother Angel do not get along yet still she looks out for him. Is it obligation or love that drives her?
Things are never as they seem here.
It is raining and there is lots of flooding going on, now you know this has something to do with the story, but what?
Elysia has been protecting her little brother all her life. He does not seem worth it though. So why does she protect him so? Her last talk with him she interpreted wrongly. So what does that mean? What trouble is he in?
Who is that kingly figure Elysia sees? From the way the story has been going you are lead to believe it is one person. Is it really though.
Where is this journey taking Elysia? As you read this story you will be so drawn into it that you must know what is next.

Categories: Comic Book Blogs

RICH REVIEWS: Submerged # 2

First Comics News - Fri, 10/12/2018 - 21:29

Title: Submerged # 2
Publisher: Vault Comics
Writer: Vita Ayala
Illustrator: Lisa Sterle
Colorist: Stelladia
Letterer: Rachel Deering
Covers by: Jen Bartel, Triona Farrell & Lisa Sterle
Price: $ 3.99 US
Rating:  out of 5 stars
Website: www.vaultcomics.com
Comments: Elysia had a very difficult relationship with her mother growing up. In the subway now though she is having trouble with a woman/ghost or something. Elysia finds a boy not her brother and the two of them are found. They must run to escape the thing after them.
Elysia has the woman/ghost after her as well. Elysia does do a lot of running. She does not seem overly scared of this woman/ghost you would think she would be.
The art is good and gives Elysia a normal ordinary everyday look to her and the boy. The creatures they encounter are given a spooky terrifying look. These things you would not want to encounter anytime but especially not at night underground in an empty subway station.
This comic does have a way of creeping up on you. Elysia is on a journey not just to find her brother but one of self-discovery.

Categories: Comic Book Blogs

[EHM 2018-10-12] Last Farm Exhibitions

Furiously Eclectic People - Fri, 10/12/2018 - 21:10
Tier 2 AHL

    Top 10s

Noah Juulsen is ranked #7 for Defensemen in the AHL; Goldobin is ranked #2 and Charles Hudon #9 for Left Wingers; Mikko Koivu #4 and Phillip Danault #6 for Centres; Zach Hyman #2 for Right Wings; Christopher Paquette is #1 and Brian Bowen #7 for prospects.

Final Exhibition Griffins 2 @ IceCaps 6


Nygren had a goal and 3 assists; Paquette had 3 assists; IceCaps has 3 powerplay goals; Hudon got heated with Smith and they dropped the gloves - Hudon started off well but Smith ended it; Juulsen played just over 29 minutes; Danault and Goldobin had more than 20 minutes; Goldobin looked tired by the end.

Tier 3 ECHL

    Top 10s

Collin Valcourt is ranked #5 for Left Wingers; Jeremiah Addison #2 for Right Wingers; Joseph Raaymakers #4 for Prospects.


Orlando scored the first two goals; half of Brampton's goals were on the powerplay; Brodeur had 4 assists; Ouellet had just over 25 minutes; Addison and Valcourt were absolutely exhausted by the end; Scherbak and Baker looking a little winded.

Cedarholm, Lindgren and Gagnon will probably join the team soon.

image_blog: tweetbutton: 
Categories: Miscellaneous Blogs

Review & OSR Commentary The Murder Knights of Corvendark From Monkey Blood Design For The Swords & Wizardry Retrolcone & Your Old School Camapigns

Swords & Stitchery - Fri, 10/12/2018 - 16:30
"No one knows from where they came. All feathers and spite. Their vile beaks spit angry screeches, and beneath their wing beats, acrid miasmas swirl. Within the subterranean caverns beneath Wychington — on the shores of Lake Grimwater — a small part of a region from long ago, or maybe a time yet to pass, has come into existence. Malign and abhorrent half-men, half-crows inhabit this Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
Categories: Tabletop Gaming Blogs

Workplace violence: the forgotten insider threat

Malwarebytes - Fri, 10/12/2018 - 16:00

Organizations are no stranger to insider threats. In fact, for those who have been around long before the Internet, workplace violence, (alongside spying) is a problem many businesses have seen before and sought to address.

However, the adoption and use of the Internet completely changed the way organizations run and grow their businesses, how customers can communicate with companies, and how employees do their jobs. And with this advancement—as we’re well aware by now—comes new, more sophisticated challenges that can compound the risks that organizations face from insiders.

When it comes to security, many enterprises are focused on beefing up their system and network defenses to keep outside hackers from getting their hands on digital assets. In addition, organizations are now more aware of the threat that malicious insiders pose—whether that’s stealing proprietary information or spying for competitors. Yet it seems that little or no attention is given to addressing workplace violence as a whole.

An overview of workplace violence

In our previous blog on insider threats, we defined workplace violence (WPV) as “violence or threat of violence against employees and/or themselves.” This can manifest in the form of physical attacks, threatening or intimidating behavior and speech (written, verbal, or electronically transmitted), harassment, property damage, or other acts that could put people at risk.

Early signs of potential for violence include threats of bodily harm (often framed as a joke, a passing comment, or a verbalization of violent thoughts), insults, passive-aggressive actions, dramatic or unreasonable demands, withdrawal (especially if they used to be sociable), and sudden undue whining or complaining. Other manifestations may not be evident at first, too.

Knowing this, one might think it is essential for organizations of any size to be able to identify and tackle workplace violence head on, on top of improving their network defenses. Sadly, this isn’t the case.

Although organizations are required by law to keep employees safe by creating a healthy, hazard-free workplace environment, almost half of executives in a corporate survey conducted by TAL Global, a security and risk management company, believe that “workplace violence is not an issue that needs to be addressed.” It’s also frustrating to note that more than half of these executives “do not believe that workplace violence will create a negative impact on their budget.”

This is a serious oversight, especially when the Department of Justice estimates that workplace violence costs US businesses about $36 billion per year in lost productivity, property, and most importantly, employee lives.

The workplace, redefined

While we’re about WPV, it’s important to remind ourselves that the definition of “workplace” has evolved over time and is no longer confined within the walls of a traditional office building. Today, the workplace can be your home, your favorite coffee shop, the local library, or even a co-working space.

Over the last decade, the number of telecommuting workers has increased by 115 percent, according to a 2017 report from Global Workplace Analytics and FlexJobs. And while working from home is beneficial for both employees and employers, it also comes with its own risks.

While organizations must be sure to protect their sensitive client and company data accessed outside of the office network by remote workers, they also have to ensure workplace security in the telecommuter’s home office.

Why? Because a home office, according to the Occupational Safety and Health Administration, is still under the employer’s jurisdiction. Therefore, they must make sure that home offices are safe and hazard-free. This could also mean that policies governing workplace violence could be adapted from the office to the home office.

Is workplace violence on the rise?

Perhaps. The TL;DR answer to that question is this: It depends on the industry (e.g., incidents of workplace violence in healthcare are far more common than in other industries) or the type of violent incident (e.g., non-fatal assaults have decreased while workplace homicides have increased).

Regardless of whether WPV has decreased or increased, it’s clear that the issue needs addressing. The promotion and adherence to the “It wouldn’t happen to us!” myth didn’t save organizations from hackers breaching their systems, so why should it keep them from WPV incidents?

Read: 5 cybersecurity questions retailers must ask to protect their businesses

Types of WPV

Talking about workplace violence may conjure up highly-publicized images of active shooters stationed on campus. Let us keep in mind, however, that not all workplace violence events happen this way. According to Steve Crimando, an expert in the field of threat assessment and threat management, there are five current types we all need to familiarize ourselves with. They are:

  • Criminal intent. This type usually involves criminals who target establishments, often, with the intent to steal. Robbers and shoplifters belong to this type.
  • Customer/Client. This type is perpetrated by customers or patients (including their relatives) against one or more workers servicing them. Verbal abuse against workers in healthcare and social services is an example.
  • Worker-to-worker. This is probably the type employees can relate to the most. These acts of violence can be perpetrated by either current or former employees toward one or more other employees of an organization. Workplace bullying is an example of this type.
  • Domestic violence. More commonly, women have been victims of domestic violence in the workplace, but that isn’t to say that this doesn’t happen to men.
  • Ideological violence. This type could either be perpetrated by radicalized employees or external actors targeting organizations, its people, and properties for reasons related to their ideology, politics, or religion. Active shootings and terrorist attacks are examples that fall under this type.

Some organizations only partially recognize stalking and cyberbullying as workplace violence, but we’d consider them to be as well.

Practical ways organizations can help address WPV

Marianne Alvarez, co-founder and director of training at the ALICE (Alert, Lockdown, Inform, Counter, Evaluate) Training Institute in California, has provided tips on how organizations can prepare themselves for potential incidents of workplace violence. Her recommendations include:


Organizations must check the overall health of the organization’s safety and physical security. This may involve hiring a certified risk assessment professional who can conduct a full onsite evaluation of security gaps or weaknesses the business may have to address. The risk assessment professional inspects infrastructure weaknesses (locks, CCTV cameras, etc.) and prevention and training programs that are in place to see if these need to be enhanced as well.


Once the risks and weaknesses are identified, the organization can then prioritize which ones to address first. During the prioritize phase, they should also set a plan and a budget.


Organizations must continue training—or in some cases, re-training—their employees on how to how to respond to incidents of workplace violence, whether it be a full-blown shouting match between two workers or an incident involving aggressive intruders.

It’s imperative that companies stress the importance of preventing the escalation of a negative encounter in the workplace to an active shooting event.

“The training should include a blended model of classroom-type learning, a test to ensure learning, and drills to practice what they learned,” said Alvarez. “Much like CPR, one must be able to apply the appropriate concepts while under the pressure of a critical event. The only way to ensure this is to repeat the practice of the concepts in live drills.”

When work life bleeds into personal life

Modern-day workers have come to perceive and accept their work lives as something inseparable from their personal lives. It’s a mindset and lifestyle prevalent to those working in tech industry hotspots like Silicon Valley, as well as financial hubs such as Wall Street. So feeling like a failure in work could make one feel like a failure in life.

“An employee can feel that they give their all to a company, making employment feel like less of a job and more a way of life,” said Leslie Garcia, CEO of Executech Security Solutions. “When not recognized for their efforts or terminated for poor work performance, this could possibly trigger a retaliatory emotional and potentially dangerous physical response.”

It’s vital to address vulnerabilities in systems that endanger valuable data. However, it is equally important to take care of the people under organizations’ watch. Ideally, an overall workplace security posture—that which covers the protection and safety of the business’s infrastructure, tangible assets, digital assets, and its people—coupled with a culture that intentionally ingrains security behaviors, awareness, and proper reporting practices—would be able to mitigate workplace violence as well.

In the face of workplace violence, these are thoughts organizations must ponder, recognize, accept, and take action on. The lives of their employees depend on it.

Recommended reading:

The post Workplace violence: the forgotten insider threat appeared first on Malwarebytes Labs.

Categories: Techie Feeds

RICH REVIEWS: Submerged # 1

First Comics News - Fri, 10/12/2018 - 15:55

Title: Submerged # 1
Publisher: Vault Comics
Writer: Vita Ayala
Illustrator: Lisa Sterle
Colorist: Stelladia
Letterer: Rachel Deering
Covers by: Jen Bartel, Triona Farrell & Lisa Sterle
Price: $ 3.99 US
Rating: 4 out of 5 stars
Website: www.vaultcomics.com
Comments: An older sister is looking out for her younger brother and has been her whole life. This leads her down a dark path to a subway that is not quite what it seems and the people there are more than you see. As Elysia finds herself in the subway on a train looking for her brother. Things though are getting strange around her and stranger as the story goes on. Something is not right here. Something is off and it will get under your skin. Her journey has just started.
Elysia is met by something. What it is is something weird. Her journey just continues to get stranger as she continues on. Ellie though will go on for her brother cause she feels it is her duty to protect him. She is facing things that will have your mind reeling. You will be wondering what is going on?
The art is fantastic illustrating this story and the characters you see within it. This journey into a strange world of wonder will have you mesmerized. You will be wondering what is coming next and still be totally surprised at what does come.

Categories: Comic Book Blogs

Fake browser update seeks to compromise more MikroTik routers

Malwarebytes - Fri, 10/12/2018 - 15:00

This blog post was authored by @hasherezade and Jérôme Segura.

MikroTik, a Latvian company that makes routers and ISP wireless systems, has been dealing with several vulnerabilities affecting its products’ operating system over the past few months. Ever since a critical flaw in RouterOS was identified in late April 2018, attacks have been going on at an alarming rate, made worse when a newly-found exploitation technique for CVE-2018-14847 was identified.

Part of the problem is that a large number of MikroTik routers remain unpatched and are prey for automated attacks, despite security fixes made available by the vendor. Criminals were quick to leverage Proof of Concept code to compromise hundreds of thousands of devices in a short time frame. Last summer, researchers at SpiderLabs discovered what was perhaps the biggest malicious Coinhive campaign via hacked MikroTik devices, which has evolved into a much wider problem now.

With this latest trick, users behind compromised routers are served a fake browser update page. When they run this malicious update, it unpacks code onto their computer that scans the Internet for other vulnerable routers and tries to exploit them.

Suspicious browser update

Security researcher @VriesHd first spotted a new campaign attempting to further compromise vulnerable routers using a typical social engineering technique. Internet providers that operate infected MikroTik routers will serve this malicious redirect about an “old version of the browser” to their end users:

According to a search via Censys, there are about 11,000 compromised MikroTik devices hosting this fake download page:

The alleged browser update is suspiciously downloaded from an FTP server, as seen below:

Interestingly, this IP address is also listed as a free and open web proxy. Proxies are often used by those who wish to bypass certain country limitations (i.e. watching the American version of Netflix if you are not in the US) or simply as a way to mask their IP address.

Payload analysis

Behavioral analysis

The payload follows the theme of pretending to be an installer named upd_browser.

When we deploy it, it pops up an error:

However, if we capture the network traffic, we can see that in the background it scans various IP addresses, trying to connect on port 8291 (a default port for managing MicroTik routers via Winbox application):


The dropped payload is a relatively big executable (7.25 MB) with a huge overlay. The sections’ headers and their visualizations are given below:

As we can recognize by looking at the sections names, it comes packed by a popular, simple packer: UPX. The size of overlay suggests that there is something more to be extracted. After further examination, we find out that it unpacks a Python DLL and other related files into the %TEMP% folder, and then loads them. At this point, it is easy to guess that this EXE is in reality a wrapped Python script. We can unpack it following the same procedure as the one described here.

The Entry Point is in the script named upd_browser. After decompiling and following the scripts, we find out that the malware’s core consists of two Python scripts: upd_browser.py and ups.py.

Inside the scripts

The main function of the module is pretty simple:

As we can see, the error pop-up is hardcoded: It does not alert about any actual error, but is used as a decoy.

After that, the malware logs the IP address of the victim by querying a hardcoded address of a tracker made using a legitimate service, IP Logger. The tracker takes the form of a one pixel–sized image:

Later, this address is queried repeatedly in a defined time interval.

The most important actions are performed in the function named “scan” that is deployed in several parallel threads (the maximum number of threads is defined as thmax = 600). The function “scan” generates pseudo-random IP addresses and tries to connect to each of them on the aforementioned port 8291. When the attempt of connecting is successful, it tries another connection, this time on a random port from a range of 56778 to 56887. When this one fails, it proceeds with the exploitation:

The function “poc” is meant to infect the router using known vulnerabilities. It starts by attempting to retrieve credentials leveraging the path traversal vulnerability (CVE-2018-14847):

The user.dat file is expected to be in M2 format, so the script comes with a built-in parser (function load_file):

If retrieving the password from user.dat file is successful, it decodes the credentials and uses them to create a backdoor: an account with a randomly-generated password. It also sets a scheduled task to be executed by the router.

The script that is set in the scheduler is generated from a hardcoded template (cleaned version available here). Its role is to manipulate the router’s settings and set up an error page loading a CoinHive miner.

The error page can be dropped in two locations: “webproxy/error.html” or “flash/webproxy/error.html” .

Such a page is displayed to users whenever they try to view a URL to which the access is denied. But the malicious script configured in the router in such a way that basically any HTTP request leads to the error. Yet, the error page is crafted to spoof the original traffic, displaying the requested page as an iframe. So, users may browse most of the web as usual, without noticing the change. Example:

The CoinHive miner is embedded, so during the time this time their machines are used for mining purposes.


MikroTik users are urged to patch their routers as soon as possible and should assume that their authentication credentials have been compromised if they are running an outdated version. MikroTik’s download page explains how to perform an upgrade to RouterOS.

Awareness that these vulnerabilities exist and are easy to exploit is important considering that patching a router is not something many people are used to doing. However, in many cases users will not be able to do so unless their Internet Service Provider does it for them upstream.

With this latest social engineering scheme, we saw how criminals are trying to infect regular users and leverage their computer to scan the Internet for vulnerable routers. This technique is clever because such an effort requires time and resources to be efficient.

Malwarebytes business customers and Premium consumer users are protected from this threat, as our anti-malware engine detects and blocks this fake browser update in real time:

Malwarebytes Endpoint Protection blocks the malicious executable disguised as a browser update.

Indicators of compromise

Sample hash


Coinhive site keys

oiKAGEslcNfjfgxTMrxKGMJvh436ypIM 5zHUikiwJT4MLzQ9PLbU11gEz8TLCcYx 5ROof564mEBQsYzCqee0M2LplLBEApCv qKoXV8jXlcUaIt0LGcMJIHw7yLJEyyVO ZsyeL0FvutbhhdLTVEYe3WOnyd3BU1fK ByMzv397Mzjcm4Tvr3dOzD6toK0LOqgf joy1MQSiGgGHos78FarfEGIuM5Ig7l8h ryZ1Dl4QYuDlQBMchMFviBXPL1E1bbGs jh0GD0ZETDOfypDbwjTNWXWIuvUlwtsF BcdFFhSoV7WkHiz9nLmIbHgil0BHI0Ma

The post Fake browser update seeks to compromise more MikroTik routers appeared first on Malwarebytes Labs.

Categories: Techie Feeds

Autumn Amore Cowl

Moogly - Fri, 10/12/2018 - 14:36

The third pattern for the Autumn Amore Crochet Along is the Autumn Amore Cowl! This pattern features yet another way to play with the moss stitch – and includes 3 sizes to fit your style! Disclaimer: Materials provided by Red Heart Yarns and Furls; this post includes affiliate links. The Autumn Amore Cowl is made [...]

The post Autumn Amore Cowl appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

Categories: Crochet Life

Autumn Amore Scarf

Moogly - Fri, 10/12/2018 - 14:33

The second pattern for the Autumn Amore Crochet Along is the Autumn Amore Scarf! This simple moss stitch scarf crochet pattern includes instructions for a kids’ size, adult size, and even an infinity scarf option – all featuring Red Heart Amore! Disclaimer: Materials provided by Red Heart Yarns and Furls; this post includes affiliate links. [...]

The post Autumn Amore Scarf appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

Categories: Crochet Life

Mysteries of Azurth Report Card

Sorcerer's Skull - Fri, 10/12/2018 - 12:05

Back in 2016, I wrote a post about mysteries that had emerged in our Land of Azurth 5e campaign in play. Let's look back and see which ones the PCs have answered in the years since and which they haven't:

1. Who is the man in the metal suit beneath Castle Machina?  The name "Lum" was thrown around, and Mirabilis Lum is said to have disappeared beneath the castle, but is the man in the metal suit him, who was he gaming with, and why does he stay down there? Updated. The party still doesn't know, but perhaps more information has come to light since, with the mention of a man named Loom living in a distant junk city.

2. What does Calico Bonny look like? The Queen of the Floating World of Rivertown tends to hide behind a folding screen if she bothers appearing at all. Is there a reason? Solved. Calico Bonny is a member of the so rare as to be believed mythical Cat Folk. The party has met her brother.

3. Who were the builders of the Cloud Castle? The scale of the castle indicates they most have been near giants, though the ancient images suggest they looked something like the Cloud People that live there now. Who were these people with a flare for Googie architecture and mid-Century design and what happened to them? Still unknown. This hasn't really come up again. Maybe someday.

4. What does the projector do? The Princess Viola says it can open a portal to another world once it is fixed, but what world? And who built it? Solved. The device turned out to be for opening portals into the Etheric Zone.  The party went there and was tricked into releasing the Super-Wizard criminal Zuren-Ar from the cosmic prison known as the Carnelian Hypercube. The repercussions of this act have yet to be experienced.

5. Where does the magic portal in Mortzengersturm's mansion lead? The frox thief Waylon saw an image of another world: people in unusual clothes in an impressive city, beyond the technology of the Land of Azurth. Where (or when) was this place and why did Mortzengersturm have a portal to it? Partially solved. The portal was actually a page from the Book of Doors. A book of magical portals that keeps popping up.

6. What was the deal with Mr. Pumpkin and his carnival? Since when can a swarm of rats manage a carnival, and what became of all those rats that got away when the carnival got destroyed? Do these events have anything to do with the giant rats seen later in the beer cellar of the Silver Dragon Tavern in town? (Probably) Partially solved by someone else. As revealed in the Public Observator, the new celebrity heroes of Rivertown, The Eccentrics, uncovered a plague of wereratism that was not explicitly, but quite likely, related. Read what is known here:

Link Love: My Favourite Things This Week

Knitted Bliss - Fri, 10/12/2018 - 11:00


My Favourite Articles and Links This Week Chronically tardy people  have these traits in common. Many of us are losing the ability to deep read, and are just skimming– and it’s changing capacity for empathy and critical thinking. Movie and tv show ideas for when you are having a bad day/week/year. This poem. I’m excited

The post Link Love: My Favourite Things This Week appeared first on %%www.knittedbliss.com%%.

Categories: Knitting Feeds


Subscribe to Furiously Eclectic People aggregator