Feed aggregator


Looking For Group - Mon, 08/06/2018 - 04:00

The post 1215 appeared first on Looking For Group.

Categories: Web Comics

Comic Book Implosion

Sorcerer's Skull - Sun, 08/05/2018 - 14:00

In 1978, DC Comics enacted a plan to compensate for problems in the newsstand market and hopefully regain market dominance from Marvel called "The DC Explosion." The plan failed in short order, leading to cancellation of a number of titles and staff layoffs and has been derisively referred to as the "DC Implosion." A new book from TwoMorrows, Comic Book Implosion, written by Keith Dallas and John Wells describes itself as an oral history of DC Comics in the era.

Comic Book Implosion chronicles the basic facts: the state of the comics industry before the Explosion and the discussions that led to it. The surprise success of Star Wars and its associated comic, interesting, is one things given a bit of discussion. We also get full coverage about what was planned for the Explosion that never happened, including what never saw print and what characters wound up at other publishers.

What might be surprising (and more interesting) are some of the conclusions. Major blizzards in the Northeast in 1977-1978 may have strangled the Explosion in its crib. No one was in a position to benefit from DC's failure; Marvel was forced to cancel about sixteen titles in the same period. Dallas and Wells argue ultimately that it was the economics of the newsstand that was killing the comics industry as it had been known. Kahn's thinking behind the Explosion was correct in many ways, but came at the wrong time and in too small a measure.

All in all, Comic Book Implosion makes for a really interesting read.

Gygax's D&D Revision Plans 1977

Zenopus Archives - Sat, 08/04/2018 - 14:15

Here's a very early description by Gygax of the plans for Basic and AD&D that I've never come across before. It's from Alarums & Excursion #21, April 1977, but is copied from an earlier source. The A&E contributor is Martin Easterbrook of Surrey, UK, who writes that the above is "a short extract I've 'pirated'" from "Walter Luc Haas' gameszine EUROPA". Martin doesn't mention the issue or date of the EUROPA zine, and I haven't been able to locate a copy of the original to confirm. The only issue of EUROPA that is widely available is #6-8 from 1975, which contains the now well-known Gygax article "How To Set Up Your Dungeons & Dragons Campaign". Edit: See update below.

-Gygax indicates that the revision is to include all of the material from the D&D booklets as well as magazine articles, which at that point included the seven issues of the Strategic Review and the first few issues of Dragon. Elsewhere Martin mentions that he has not yet obtained Dragon #5.

-"[A] beginner's guide" --- Gygax credited Holmes with this idea, so presumably he was already working on "D&D for Beginners", as he titled the manuscript for what became the Basic rulebook. And we actually know that Holmes had finished his manuscript by February of '77, which is before this issue of A&E. But as I noted above, we don't know when exactly Gygax's statements appeared in EUROPA. Note also that there is not yet any mention of the specific terms Basic or Advanced.

-They were considering putting not only the Basic rulebook and dice in a boxed set, but also all of the revised D&D books: "[t]he entire package will be available boxed, with dice included". The planned size was already that of the eventual Basic Set, 8.5 x 11. This is given an exclamation point because all previous D&D booklets were digest-sized. No mention of hardcovers, so the idea of having all of the rulebooks in one box (as in OD&D) seems reasonable.

-No mention of the Monster Manual, presumably at this point it was going to be included in the "large referee's manual". The revised and expanded GD&H eventually became Deities & Demigods.

-The reference to "only one combat system" indicates that the Chainmail combat system would no longer be referenced, as is the case with AD&D.

-"There will be no additional formal material" --- it's not clear if Gygax means that the books will be limited mainly to a revision & clarification of existing material, without adding new material, or if he means that there will be no additional supplements once these books are published (imagine that).

-Overly optimistic timeline. The Basic Set came out in July of 1977, so not too far off from "near spring", and while the Monster Manual came out in very late December, the other books were delayed by years --- PHB - 1978, DMG - 1979, and D&DG - 1980.

I've also added a transcription of Gygax's statements to the "Gygax on Holmes" page.

Update: Thanks to Allan Grohe (grodog) for tracking down the original publication in Europa issue #15-17, January 1977. The text is same as given in A&E. That places this plan prior to Holmes finishing the Basic manuscript.
Categories: Tabletop Gaming Blogs

Explained: What is big data?

Malwarebytes - Fri, 08/03/2018 - 15:00

If the pile of manure is big enough, you will find a gold coin in it eventually. This saying is used often to explain why anyone would use big data. Needless to say, in this day and age, the piles of data are so big, you might end up finding a pirate’s treasure.

How big is the pile?

But when is the pile big enough to consider it big data? Per Wikipedia:

“Big data is data sets that are so big and complex that traditional data-processing application software are inadequate to deal with them.”

As a consequence, we can say that it’s not just the size that matters, but the complexity of a dataset. The draw of big data to researchers and scientists, however, is not in its size or complexity, but in how it may be computationally analyzed to reveal patterns, trends, and associations.

When it comes to big data, no mountain is high enough or too difficult to climb. The more data we have to analyze, the more relevant conclusions we may be able to derive. If a dataset is large enough, we can start making predictions about how certain relationships will develop in the future and even find relationships we never suspected to exist.

The treasure

We mentioned predicting the future or finding advantageous correlations as possible reasons for using big data analysis. Just to name a few examples, big data could be used to set up profiles and processes for the following:

  • Stop terrorist attacks by creating profiles of likely attackers and their methods.
  • More accurately target customers for marketing initiatives using individual personas.
  • Calculate insurance rates by building risk profiles.
  • Optimize website user experiences by creating and monitoring visitor behavior profiles.
  • Analyze workflow charts and processes to improve business efficiency.
  • Improve city planning by analyzing and understanding traffic patterns.
Beware of apophenia

Apophenia is the tendency to perceive connections and meaning between unrelated things. What statistical analysis might show to be a correlation between two facts or data streams could simply be a coincidence. There could be a third factor at play that was missed, or the data set might be skewed. This can lead to false conclusions and to actions being undertaken for the wrong reasons.

For example, analysis of data collected about medical patients could lead to the conclusion that those with arthritis also tend to have high blood pressure. When in reality, the most popular medication to treat arthritis lists high blood pressure as a side effect. Remember the old research edict: correlation does not equal causation.

In statistics, we call this a type I error, and it’s the feeding ground for many myths, superstitions, and fallacies.

The researchers

As more and more data becomes digitized and stored, the need for big data analysts grows. A recent study showed that 53 percent of the companies interviewed were using big data in one way or another. Some examples of use cases for big data include:

  • Data warehouse optimization (considered the top use case for big data)
  • Analyzing patterns in employee satisfaction; for example, in multinational companies, a 0.1 percent increase in turnover is considered too high
  • Sports statistics and analysis; sometimes the difference between being the champion or coming in second comes down to the tiniest detail
  • Prognosis statistics or success rates of particular medications can influence a doctor’s recommended course of treatment; an accurate assessment of which could be the difference between life and death
  • Selecting stocks for purchase and trade; quick decision-making based on analytical algorithms gives traders the edge

At Malwarebytes, we use big data in the form of anonymous telemetry gathered from our users (those that allow it) to monitor active threats. Viewing these data sets allows us to see trends in malware development, from the types of malware that are being used in the wild to the geographic locations of attacks.

From these data, we’re able to draw conclusions and share valuable information on the blog, in reports, such as our quarterly Cybercrime Tactics and Techniques report, and even in heat maps like the one we created for WannaCry. (As our product detected WannaCry even before we added definitions, this gave us some valuable information about where it might have originated.)

The tools

Technologically, the tools you will need to analyze big data depend on a few variables:

  • How is the data organized?
  • How big is big?
  • How complex is the data?

When we are looking at the organization of data, we are not just focusing on the structure and uniformity of the data, but the location of the data as well. Are they spread over several servers, completely or partially in the cloud, or are they all in one place?

Obviously, uniformity makes data easier to compare and manipulate, but we don’t always have that luxury. And it takes powerful and smart statistical tools to make sense out of polymorphous or differently-structured datasets.

As we have seen before, the complexity of the data can be another reason why we need special big data tools, even if the sheer number is not that large.

As big data tools are made available, they are still in the early stages of development and not all of them are ready for intuitive use. It requires knowledge and familiarity to use them most effectively. That is where personal preference comes in. Using a tool you have experience with is always easier, at least at first.

Our personal data

When we go online, we leave a trail of data behind that can be used by marketers (and criminals) to profile us and our environment. This makes us predictable to a certain extent. Marketeers love this type of predictability, as it enables them to figure out what they can sell us, how much of it, and at which price. If you’ve ever wondered how you saw an ad for vintage sunglasses on Facebook when you were only searching on Google, the answer is big data.

Imagine a virtual assistant that retrieves travel arrangement information at your first whim of considering a vacation. Hotels, flights, activities, food and drink—all could be listed to your liking, in your favorite locations, and in your price range at the blink of an eye. Some may find this scary, others would consider it convenient. However you feel, the virtual assistant is able to do this because of the big data it collects on you and your behavior online.

The data-driven society

One of the major contributions of big data to our society will be through the Internet of Things (IoT). IoT represents the most direct link between the physical world and the cyber world we’ve experienced yet. These cyber-physical systems will of course be shaped by the objects and software we create for them, but their biggest influence will be the result of algorithms applied to the data they collect.

With the evolution of these systems, we can expect to evolve into a data-driven society, where big data plays a major role in adjusting the production to meet our expected needs. This is an area where we will need safeguards in the future to prevent big data from turning into Big Brother.

Big data, big breaches

The obvious warning here is that gathering and manipulating big data require extra attention paid to security and privacy, especially when the data are worth stealing. While raw datasets may seem like a low-risk asset, those who know how to find the gold (cyber)coin in the pile of manure will see otherwise. With the advent of GDPR in May, any form of personally identifiable information (PII) will be sought after with great urgency, as the safeguards put in place to protect PII place endanger the lively black market trade set up around it.

The lesson, then, is to take seriously big data’s impact, both for good and for evil. Perhaps the whole pile should be considered the treasure.

The post Explained: What is big data? appeared first on Malwarebytes Labs.

Categories: Techie Feeds

Hanging Gift Card Holder and Luggage Tag

Moogly - Fri, 08/03/2018 - 14:05

The Hanging Gift Card Holder and Luggage Tag is a super fast, super easy, and super fun project to make for holiday gift giving – and a great crochet pattern to knock out for all those craft fairs! With the right colors, this project is perfect for gift giving year round! Disclaimer: This post includes [...]

The post Hanging Gift Card Holder and Luggage Tag appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

Categories: Crochet Life

Jungian-Gygaxian Alignment

Sorcerer's Skull - Fri, 08/03/2018 - 12:26

I still have to do some thinking on all the implications, but mull this chart over as I do. It shows Jungian Archetypes super-imposed with the AD&D alignment axis.

Cryptkins Convention Exclusive Trading Card Packs

Cryptozoic - Fri, 08/03/2018 - 01:06

CryptkinsTM Trading Cards — Convention-Exclusive Pack are six-card packs featuring Crytozoic original IP inspired by creatures that have been the subject of folklore and tabloid headlines for decades. After a popular launch of Cryptkins vinyl figures and the Cryptkins Channel on the Quidd app, these packs bring them to the world of trading cards. Each pack includes two Promo Cards, two "Which Cryptkin?" cards, one original hand-drawn Sketch Card, and one Download Card for an Irradiated Cthulhu digital figure on the Cryptkins Channel in the Quidd app. 

Categories: Tabletop Gaming Blogs

Read CLOAK AND DAGGER (2018) #1…for FREE!

First Comics News - Thu, 08/02/2018 - 23:35

With the Purchase of a Print Issue, Unlock a Bonus Digital Comic from Our Latest Line of Digital-Exclusive Series!

New York, NY—August 1, 2018— Celebrate New Comic Book Day with the gift of FREE digital comics! By purchasing any of the print issues below, you’ll have the chance to redeem not only the digital version of the comic you just bought, but also the first chapter in CLOAK AND DAGGER’s all-new crime series by Dennis Hopeless and David Messina! Just enter any of your print codes at MARVEL.COM/REDEEM and follow the on-screen instructions! Pick up your code in any of the following books, on-sale today!



















CLOAK AND DAGGER CHAPTER ONE marks the first part in the “Shades of Gray” arc, whose first two chapters are available in CLOAK AND DAGGER – MARVEL DIGITAL ORIGINAL #1, on-sale now!


CLOAK AND DAGGER’s digital series is the latest inclusion in the Marvel Digital Originals, an all-new lineup of DOUBLE-SIZED, digital-exclusive series starring your favorite characters from the small screen! Each MDO is jam-packed at 40 pages, delivering an entire binge worthy arc in the span of three months! Perfect for new readers and old-school fans, these never-before-told stories are in continuity with the larger Marvel Universe and feature top comic talent! All can be purchased and read on the Marvel Comics App, Comixology and Kindle!


Try the critically praised JESSICA JONES – MARVEL DIGITAL ORIGINAL #1 by Kelly Thompson and Mattia de Iulis today, with sensational covers by Martin Simmonds! You can also preorder the rest of the Digital Original lineup, featuring street-level favorites LUKE CAGE, IRON FIST and the DAUGHTERS OF THE DRAGON (a Colleen Wing/Misty Knight team-up), all surprise-announced at this year’s San Diego Comic Con!


In the meantime, want to continue the mystery planted in CLOAK AND DAGGER CHAPTER ONE? Be sure to pick up CHAPTER TWO and CHAPTER THREE, on-sale tomorrow on the Marvel Comics App, Comixology and Kindle! Or, continue Cloak and Dagger’s story in its DIGITAL ORIGINAL format, where all six chapters will be combined into three double-sized issues!

Categories: Comic Book Blogs

UDON to release new hardcover editions of the publisher’s MEGA MAN and MEGA MAN X art books

First Comics News - Thu, 08/02/2018 - 23:26

TORONTO, ONTARIO – August. 1, 2018 – The iconic Mega Man video game franchise continues to celebrate its 30th anniversary throughout 2018 with the recently released Mega Man X: Legacy Collection, a new animated series – Mega Man: Fully Charged – premiering in August, and all-new game – Mega Man 11 – hitting consoles in October. UDON is likewise giving the blue bomber some special birthday treatment with prestigious new hardcover editions of two previously sold-out Mega Man art books.

MEGA MAN: OFFICIAL COMPLETE WORKS Hardcover Edition is the ultimate collection of classic Mega Man game covers, character art, enemy & boss designs, rough concepts, tribute pieces, and much more. The book covers all 10 games in the classic Mega Man series, plus spin-offs, remakes, re-releases, and crossovers, all supported by a heaping amount of exclusive creator commentary. Likewise, the MEGA MAN X: OFFICIAL COMPLETE WORKS Hardcover Edition gives the same treatment to Mega Man’s even more futuristic successor, and covers all 8 core games and spinoffs from the Mega Man X series.

MEGA MAN: OFFICIAL COMPLETE WORKS HC arrives in stores everywhere October 2018, while MEGA MAN X: OFFICIAL COMPLETE WORKS HC hits shelves November 2018.

DETAILS: 296 pg, 8.25 x 11.75”, Full Color, Hardcover
MSRP: $39.99 USD
RELEASE DATE: October 2018
ISBN: 978-1772940749

DETAILS: 152 pg, 8.25 x 11.75”, Full Color, Hardcover
MSRP: $39.99 USD
RELEASE DATE: November 2018
ISBN: 978-1772940756

Categories: Comic Book Blogs

RICH INTERVIEWS: Sun Khanunaki Cover Artist Lady Death 

First Comics News - Thu, 08/02/2018 - 23:11

First Comics News: How did you join the Lady Death Universe?

Sun Khanunaki: I’ve been a Lady Death fan since the first time I walked into a comic book store. I have tunnel vision when it comes to goals and doing a Lady Death cover was one of them. I wanted to see what she would look like if Rembrandt had been born in the 80s and painted her for a heavy metal cover. I sent the painting to Brian Pulido, and the rest is history!

1st: When you illustrate Lady Death what about her personality do you most try to bring out?

Sun: I like keeping her regal, but show her man-eating badassness.

1st: What physical characteristics of Lady Death do you include in your art?

Sun: I love focusing on bringing out her pale white skin and giving her an ethereal glow. I wanted to keep as much of the signature aspects of the character as possible. I love Hughes’ original art and wanted to pay homage to him as well. Things like the high curved bangs.

1st: Why are people attracted to Lady Death?

Sun: I think Lady Death represents an uncompromised strength of will. She helps us imagine fighting our own demons. The fact that she’s doing all that in a black latex bikini helps too. Haha

1st: Do you see any personality traits of Lady Death in you?

Sun: I wish. I think I look up to her more than anything. Maybe her determination. Once she decides something it’s done.

1st: Why did you enjoy working on “Zack the Zombie Exterminator” and “La Muerta” and why?

Sun: I love working on anything Brian Pulido is doing. Zack was super fun but La Muerta felt like a vacation. She’s such a deep character and I love adding a lot of emotion to my pieces.

1st: Do you prefer the bad girls in comics if so for what reason?

Sun: This could be an interview all in its self. Women have been oppressed and thought of as objects for too long. I feel that we should be free to express our sensuality without it having a negative connotation. I guess it really depends on what you mean by ‘’bad girl’’. If by that you mean the anti-hero or darker character, then yes. I love Characters that have a strong sense of self and aren’t afraid to give the rules the finger. There’s still a lot of stigma attached to being a woman, particularly one that speaks her mind and refuses to put down. I guess essentially I like to bring homage to the women in comics who fight our oppression.

1st: How did you achieve your awesome level of artistic talent?

Sun: Blood, sweat, and tears. I’m self-taught so everything I know is from observation, trials, and error. I put everything I have Into my art, so they take me quite a while and several versions before it’s complete. I’m always learning and feel that I’m nowhere near the artist I want to be.

1st: What character would you like to do a cover for that you have not?

Sun: Red Sonja, Purgatori, Lady Demon, Zombie Tramp, and Vampirella are on the top of my list!

1st: How do you find going to comic conventions?

Sun: Conventions are always a blast! I love meeting fans, mingling with other artists and seeing the amazing cosplay. It’s an absolute pleasure to be surrounded by talent, celebrities, and fans passionate about keeping fantasy and entertainment alive.

1st: Why do you have a Patreon account?

Sun: I set up a Patreon account on a whim for future tutorials but totally forgot about it. I pity my 1 follower. Lol

1st: What music do you listen to?

Sun: When I’m painting I listen to movie soundtracks, basically anything really intense and epic. Right now I’m big on game of thrones’ and John wick soundtracks. Some techno And new wave retro. Some metal like Gwar, Black Sabbath, Judas Priest. I like All kinds of music. I was Lucky enough to do a cover for a London May album!

1st: What would you like to say to all the fans of your work?

Sun: Sharing art and having people enjoy it is a surreal feeling. I’m so grateful that someone can find happiness in looking at my art. I enjoy making it, so we’re sharing joy and that’s a beautiful thing.

Categories: Comic Book Blogs

HARBINGER WARS 2 #4 preview

First Comics News - Thu, 08/02/2018 - 23:00

HARBINGER WARS 2 #4 (of 4)
Written by MATT KINDT
Letters by DAVE SHARPE
Cover A by J.G. JONES (JUN182070)
Cover B by MICO SUAYAN (JUN182071)
Interlocking Variant by JUAN JOSÉ RYP (JUN182072)
HW2 Icon Variant by FELIPE MASSAFERA (JUN182073)
$3.99 | 32 pgs. | T+ | On Sale AUGUST 29 (FOC – 8/6/18)

Categories: Comic Book Blogs

Diana Gabaldon, Dan Brereton, Gene Ha, Tom Cook Headline Creators At Wizard World Comic Con Chicago, August 23-26

First Comics News - Thu, 08/02/2018 - 22:34

Artist Alley Headliners Also Include Bob Camp, Andrew Pepoy, Kurt Lehner, Dan Dougherty, Jose Delbo, Jonathan Glapion, Arthur Suydam At 20th Anniversary Event At Donald E. Stephens Convention Center


ROSEMONT, Ill., August 2, 2018 – Diana Gabaldon (Outlander novels), Dan Brereton (“Nocturnals,” “Batman: Thrillkiller”), Gene Ha (“Mae,” “Justice League”), Tom Cook (“Masters of the Universe,” “Smurfs”), Bob Camp (“Ren & Stimpy”), Andrew Pepoy (“The Simpsons,” “Archie”), Kurt Lehner (“Gargoyles,” “Marvel Action Hour”), Jose Delbo (“Raggedy Ann,” “The Beatles”), Dan Dougherty (“Beardo,” “Touching Evil”), Jonathan Glapion (“Batgirl,” “Wonder Woman”) and Arthur Suydam (“Deadpool,” “Marvel Zombies”) are among the dozens of professional writers and artists scheduled to attend Wizard World Comic Con Chicago, August 23-26 at the Donald E. Stephens Convention Center.


This marks the 20th anniversary of the first Wizard World Comic Con Chicago, with a weekend that will feature many demonstrations and discussions at the Creative Stage.


Artist Alley in Chicago will also feature top creators such as Greg Horn (“Phoenix,” “Venom”), Arvell Jones (“Black Panther,” “Luke Cage”), Ryan North (“Adventure Time,” “Squirrel Girl”), Tony “KO!” Kordos (“Cyborg”), Mostafa Moussa (“Superman,” “Fantastic Four”), Phil Ortiz (“The Simpsons”), Shawn Coss (“Cyanide & Happiness”), Rebecca Rothschild (“Warshiner,” “Mortal Combat X”) and more.


Wizard World Comic Con Chicago will also feature non-stop live entertainment, gaming, and autographs, photo ops and exclusive Q&A sessions with top celebrities such as Tom Welling (“Smallville,” “Lucifer”), Ian Somerhalder (“The Vampire Diaries”), “The X-Files” headliners Gillian Anderson and David Duchovny, six stars of the cast of “Outlander” (Sam Heughan, Catriona Balfe, Graham McTavish, Lotte Verbeek, Richard Rankin, Sophie Skelton), Guardians of the Galaxy standout Pom Klementieff and many others, a dedicated kids zone and more, along with Wizard World’s Master of Ceremonies, Kato Kaelin.


Wizard World Comic Con events bring together thousands of fans of all ages to celebrate the best in pop culture: movies, television, gaming, live entertainment, comics, sci-fi, graphic novels, toys, original art, collectibles, contests and more. The 10th event scheduled on the 2018 Wizard World calendar, Chicago show hours are Thursday, August 23, 4-9 p.m.; Friday, August 24, noon-7 p.m.; Saturday, August 25, 10 a.m.-7 p.m.; Sunday, August 26, 10 a.m.-4 p.m. Kids 10 and under are admitted free with paid adult.


Wizard World Comic Con Chicago is also the place for cosplay, with fans young and old showing off their best costumes throughout the event. Fans dressed as every imaginable character – and some never before dreamed – will roam the convention floor and participate in the famed Wizard World Costume Contest on Saturday evening.

Categories: Comic Book Blogs

HELM, the Eisner-Nominated Fantasy Series, Gets Collected into a TPB for the First Time!

First Comics News - Thu, 08/02/2018 - 22:31

Writer(s): Jehanzeb Hasan
Artist Name(s): Mauricio Caballero
Cover Artist(s): Mauricio Caballero
160 pgs./ T / FC

Enter the world of HELM, an Eisner-nominated epic fantasy adventure in the tradition of Star WarsLord of the Rings, and Game of Thrones.

Set in a vast and ancient land plagued by racism, riots, and rebellion, HELM is the sweeping saga of Eldrick Spellsong Jr., a college dropout who unknowingly holds the key to unlocking an age-old secret. Readers will journey along with the mysterious Luna Lumere, as she flees the clutches of the evil Legion, in search of Eldrick. Together, with an unforgettable cast of adventurers, villains, and scoundrels at their side, they will traverse the dark and dangerous world of HELM in search of the legendary Bastard King.

“I think there’s something for everyone in this story,” comments creator/writer Jehanzeb Hasan. “It’s made for contemporary readers but kids, teens, adults… they might all find something to latch onto here. There’s light-hearted comedy, drama, action, romance… If you’re a child of the 80’s, or even late-70’s, I think you may especially appreciate HELM because you’ll recognize many of the threads that link this story with some of the classic adventures we grew up on.”

Originally a web series, HELM was nominated for an Eisner in the category of Best Digital Comic in 2017. HELM BOOK 1: HARBINGER will be available in a comic book store near you on September 26th, 2018. Preorder the book using Diamond item code JUL181434.

Categories: Comic Book Blogs


First Comics News - Thu, 08/02/2018 - 22:26

Graphic Novel Adaptation By Teresa Radice and Stefano Turconi Coming in October 2018

MILWAUKIE, Ore., (August 2, 2018)—Today, Dark Horse is excited to reveal Disney Treasure Island, starring Mickey Mouse! The classic Robert Louis Stevenson’s tale comes to life in this graphic novel adaptation that stars Mickey, Goofy, and Pegleg Pete. From writer Teresa Radice and artist Stefano Turconi comes this swashbuckling adventure that is filled with the magic of Disney!

For as long as he can remember, Jim Mousekins has dreamed of a life of adventure. In Disney Treasure Island, starring Mickey Mouse, Jim’s dream is suddenly realized when a mysterious man known only as “The Captain” takes up residence at Jim’s family’s inn, has the boy on the lookout for “the cat with one hind paw,” and tells frightening stories of wild places, disappearances, and the wicked sea-faring pirate, Blot! After finding a treasure map in the captain’s wooden chest, Jim, friends, and a hired crew set out on an ocean voyage looking for the island that hides the fortune. But trouble strikes as they reach land: a gang of scheming pirates, hidden among the crew, forces Jim and his friends to flee for their lives! The race is on, as they rush to find the location of the treasure, make it back to the ship, and out to sea—before the pirates capture them and force them all to walk the plank!

Disney Treasure Island, starring Mickey Mouse goes on sale October 31, 2018, just in time for the 90th anniversary of Mickey Mouse! This book is available for preorder on Amazon, Barnes & Noble, and at your local comic shop. This 104-page graphic novel retails for $10.99.

Categories: Comic Book Blogs


First Comics News - Thu, 08/02/2018 - 22:21

Guests: Bruce Prichard, Conrad Thompson, Bob Holly, Davey Boy Smith Jr, Rory Fox, Brennon Martin, Kyle Klingman. Colt heads to Waterloo, IA to participate in the festivities of the Wrestling Hall Of Fame.


Image Photo:

Image Design:
Jimmy Lee

Categories: Comic Book Blogs


First Comics News - Thu, 08/02/2018 - 22:14

Digital Subscription library continues to grow with latest updates


New York, NY—August 2nd, 2018—Marvel Unlimited, Marvel’s digital comics subscription service, offers members unlimited access to over 20,000 issues of Marvel’s classic and newer titles, delivered digitally through your desktop web browser and the Marvel Unlimited mobile app. With classic and newer issues added every week, here are some of the amazing Marvel titles coming to Marvel Unlimited this month:



Week of 8/6






















When STAR WARS: THE LAST JEDI takes theaters in FORCE (get it?) this December, Star Wars fans will get a peek into some new dark corners of the Galaxy Far Away…and out of one of those corners scuttles DJ, the mysterious character played by Benecio Del Toro! Who is this mystery man, and what put him in the path of our Resistance heroes? Join Ben Acker & Ben Blacker (Star Wars Join the Resistance, Star Wars: The Last Jedi – The Storms of Crait) and Kev Walker (Star Wars: Doctor Aphra, Darkhawk) as they reveal a day in DJ’s life just before his appearance in the film!



Week of 8/13






The fantastic technology of Wakanda comes to Dubai! But when the villainous KLAW launches a plot to extort billions from the citizens of the city, T’CHALLA’s diplomatic mission becomes a search and rescue for the BLACK PANTHER! Written and illustrated by industry legends Ralph Macchio and Andrea Di Vito, THE SOUND AND THE FURY puts the Black Panther on a mission that will test his prowess against his long-standing nemesis, as well as three new villains – BLOKK, GARROTTE, and SHEN-YU! Featuring a special presentation of FANTASTIC FOUR #53, featuring the earliest conflict between T’Challa and Klaw, and the introduction of VIBRANIUM!





ADAM WARLOCK IS BACK! Reborn from the realm of the dead, Adam has come seeking the Soul Stone…and the truth about what it did to him! His guide through this Infinity Quest is none other than…Kang the Conqueror?!? Be there as Adam begins down the dark trail sure to lead him into the heart of the mystery of the Infinity Stones…










VENOM #161



THE FIRST SENSATIONAL ARC OF AN ALL-NEW TEAM OF X-MEN STARTS HERE! JEAN GREY is back! Returned to a world she doesn’t recognize, the First Lady of the X-MEN gathers an unlikely team — NIGHTCRAWLER, NAMOR and LAURA KINNEY (A.K.A. ALL-NEW WOLVERINE) — to face an evil that threatens to tear down XAVIER’s dream by any means necessary!


Week of 8/20







CABLE #154







  1. MARVEL #27





One of the most cunning and ruthless minds in all of the Star Wars, Grand Admiral Thrawn is back with his own six-issue miniseries! Written by Jody Houser (ROGUE ONE ADAPTATION) and drawn by Luke Ross (STAR WARS: DARTH MAUL, STAR WARS: THE FORCE AWAKENS ADAPTATION), follow the comic adaptation of Timothy Zahn’s New York Times best-selling novel about Thrawn’s rise in the Imperial ranks, on his way to becoming one of the most feared military tacticians in the galaxy far, far away!






Week of 8/27






Three legendary BLACK PANTHER writers return to Wakanda! Don McGregor’s famous storyline “The Panther’s Rage” has become one of the most well-respected runs in comic book history. Now, the author who redefined Wakanda for a generation is back to expand the mythos! Bearing the heart-shaped herb that defines the Panther legacy, King T’Challa leaves his beloved country for a heart-wrenching mission in the streets of New York. Then: For half a decade, comics legend Christopher Priest made his mark on the Panther. The acclaimed writer returns with an all-new story – and with it, of course, U.S. State Department employee Everett K. Ross! And finally, no Panther history would be complete without Reggie Hudlin, author of more than 50 Black Panther stories, including the famed “Who Is The Black Panther?” Don’t miss the sequel to his “Black to the Future” story, featuring original artist Ken Lashley!





The city of sin gets its biggest sinner yet. When Doctor Strange raises Las Vegas up from its destruction during SECRET EMPIRE, he inadvertently opens a big door for the embodiment of evil, MEPHISTO! The devilish villain takes the city for himself and sets his sights on the rest of the world. It’s going to take heroes from all over the Marvel Universe to defeat him, but there’s nothing simple about fighting the lord of Hell.




The Infinity Stones. Individually, they grant their wielder great power. Together, they grant the power of a god. Newly reformed and scattered throughout the universe, these artifacts allow the ones who claim them their heart’s desire. Now, as their locations are discovered, forces converge for a battle that will begin the universe down a dark path to the END. Jump onto this exciting ride that will lead to the biggest Infinity yet!






VENOM #162




Not a Marvel Unlimited member? Join today!


Marvel Unlimited members have access to some of the greatest Marvel Comics featuring The Avengers, Spider-Man, Ant-Man, Thor, Black Panther, and more! With August’s update, Marvel Unlimited will also be expanding its back catalog with the following issues:  DAREDEVIL (1964) #113-119, #333-344, NEW WARRIORS (1990) #18-36, VENOM: THE HUNTED (1996) #1-3, VENOM: THE HUNGER (1996) #1-4, and much, MUCH more! This amazing service is accessible through Marvel Unlimited on the web and through the Marvel Unlimited app on iPhone®, iPad® and on select Android™ devices.


New to comics, and don’t know where to start? Don’t worry! Visit Marvel Unlimited’s READING LIST section and uncover new pathways into the Marvel Universe by searching for events, themed lists, and stories featuring your favorite characters and creators!


An added bonus? New Marvel Unlimited subscribers get 3,000 Marvel Insider points when they join this service, and more points when they renew their subscription! Not a Marvel Insider? Sign up today and earn exclusive prizes just by being a Marvel fan! See what rewards are available here! *


With classic and newer issues being added to Marvel Unlimited on a weekly basis as early as six months after they’re in stores, you’ll definitely want to join Marvel Unlimited and enjoy the experience of the Marvel Universe!


Follow Marvel on Facebook at www.facebook.com/marvel, join in the conversation on Twitter with #Marvel, and for all things Marvel, please visit marvel.com.

Categories: Comic Book Blogs

RICH REVIEWS: Scifies # 2

First Comics News - Thu, 08/02/2018 - 22:11

Title: Scifies # 2
Publisher: Ramon Gil
Written by: Ramon Gil
Artists: various
Cover Art: Len Peralta
Inside Colors by: Macarena Cortes
Price: $ 2.99 US
Rating: 3 out of 5 stars
Website: www.scifies.com
Comments: “Senturies” Story by Ramin Gil, Illustrated by Ian Waryanto.
This story is a short one that leads into “Senturies #1”. It is done in the blue and white color style. The Captain it seems is just starting out on an adventure one that is going somewhere unexpected with someone unexpected.
“The Men from D.A.R.P.A.” Words by Ramin Gil, Pictures by Cee Raymond.
One of man works for the government. Now the story has this man being part of a group of friends which are infiltrated by a woman. Which leads to a shootout and high-speed car chase. This is a brief preview of “The Men from Darpa # 1”.
“Race Encounters of the Third Kind” Written by Ramon Gil, Illustrated by Len Peralta and colors by Calis Chokoreto.
This is a weird little story about racial prejudice among chickens. The art style is cute.
“The Hard Code” Written by Ramon Gil, Illustrated by Trevor Von Eeden and Colors by Macarena Cortes.
A human and an android cop are partners. Now they get a case which may change the way the world looks at androids. The coloring is used to let you know who the androids are it works. The faces could use more detail and the art at times is to darkly colored. This is a preview of “The Hard Code # 1”.
“Truer Than Trousdale” Written by & Illustrated by Ramon Gil.
The art is simple here and done in a two-tone style using one color and white per page. These stories are posted online at http://www.scifies.com 

Categories: Comic Book Blogs

An OSR Commentary - Monster Matters From B/X Dungeons & Dragons In Old School Campaigns

Swords & Stitchery - Thu, 08/02/2018 - 15:57
So on the phone yesterday I had a friend whose a Gamma World dungeon master exclusively. Yes there are folks still running Gamma World first & second edition games forty plus years on. So the big deal here is that & I quote there are no creditable threats left on Gamma Terrestria. The answer of course is B/X Dungeons & Dragons with a good helping of AD&D supplements! Because the Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
Categories: Tabletop Gaming Blogs

Moogly CAL 2018 – Afghan Block #15

Moogly - Thu, 08/02/2018 - 15:00

Moogly CAL 2018 Block 15 is going to explode off your hook – or maybe bloom? It’s all in your color choices with this gorgeous free crochet afghan block by Briana K Designs! Disclaimer: This post includes affiliate links; materials provided by Red Heart Yarns, Furls Crochet, and Chetnanigans. Just getting started with the Crochet [...]

The post Moogly CAL 2018 – Afghan Block #15 appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

Categories: Crochet Life

Social engineering attacks: What makes you susceptible?

Malwarebytes - Thu, 08/02/2018 - 15:00

We now live in a world where holding the door open for someone balancing a tray of steaming hot coffee—she can’t seem to get her access card out to place it near the reader—is something we need to think twice about. Courtesy isn’t dead, mind you, but in this case, you’d almost wish it were. Because the door opens to a restricted facility. Do you let her in? If she really can’t reach her card, the answer is clearly yes. But what if there’s something else going on?

Holding the door open for people in need of assistance is considered common courtesy. But when someone assumes the role of a distressed woman to count on your desire to help, your thoughtful gesture suddenly becomes a dangerous one. Now, you’ve just made it easier for someone to get into a restricted facility they otherwise had no access or right to. So what does that make you? A victim of social engineering.

Social engineering is a term you often hear IT pros and cybersecurity experts use when talking about Internet threats like phishing, scams, and even certain kinds of malware, such as ransomware. But its definition is even more broad. Social engineering is the manipulation or the taking advantage of human qualities to serve an attacker’s purpose.

It is imperative, then, that we protect ourselves from such social engineering tactics the same way we protect our devices from malware. With due diligence, we can make it difficult for social engineers to get what they want.

Know thy vulnerable self

Before we go into the “how” of things, we’d like to lay out other human emotional and psychological aspects that a social engineer can use to their advantage (and the potential target’s disadvantage). These include emotions such as sympathy, which we already touched on above. Other traits open for vulnerability are as follows:


The majority of us have accidentally clicked a link or two, or opened a suspicious email attachment. And depending on how quickly we were able to mitigate such an act, the damage done could range from minor to severe and life-changing.

Examples of social engineering attacks that take advantage of our carelessness include:


You seem to have received an email supposedly for someone else by accident, and it’s sitting in your inbox right now. Judging from the subject line, it’s a personal email containing photos from the sender’s recent trip to the Bahamas. The photos are in a ZIP-compressed file.

If at this point you start to debate with yourself on whether you should open the attachment or not, even if it wasn’t meant for you, then you may be susceptible to a curiosity-based social engineering attack. And we’ve seen a lot of users get duped by this approach.

Examples of curiosity-based attacks include:


According to Charles E. Lively, Jr. in the paper “Psychological-Based Social Engineering,” attacks that play on fear are usually the most aggressive form of social engineering because it pressures the target to the point of making them feel anxious, stressed, and frightened.

Such attacks make participants willing do anything they’re asked to do, such as send money, intellectual property, or other information to the threat actor, who might be posing as a member of senior management or holding files hostage. Campaigns of this nature typically exaggerate on the importance of the request and use a fictitious deadline. Attackers do this in the hopes that they get what they ask for before the deception is uncovered.

Examples of fear-based attacks include

Read: Fake Spectre and Meltdown patch pushes Smoke Loader malware


Whether for convenience, recognition, or reward, desire is a powerful psychological motivation that can affect one’s decision making, regardless of whether you’re seen as an intellectual or not. Blaise Pascal said it best: “The heart has its reasons which the mind knows nothing of.” People looking for the love of their lives, more money, or free iPhones are potentially susceptible to this type of attack.

Examples of desire-based attacks include:

  • Catfishing/romance fraud (members of the LGBTQ community aren’t exempt)
  • Catphishing
  • Certain phishing campaigns
  • Scams that bait you with money or gadgets (e.g. 419 or Nigerian Prince scams, survey scams)
  • Lottery and gambling-related scams
  • Quid pro quo

This is often coupled with uncertainty. And while doubt can sometimes stop us from doing something we would have regretted, it can also be used by social engineers to blindside us with information that potentially casts something, someone, or an idea in a bad light. In turn, we may end up suspecting who or what we think we know is legit and trusting the social engineer more.

One Internet user shared her experience with two fake AT&T associates who contacted her on the phone after she received an SMS report of changes to her account. She said that the first purported associate was clearly fake, getting defensive and hanging up on her when she questioned if this was a scam. But the second associate gave her pause, as the caller was calm and kind, making her think twice if he was indeed a phony associate or not. Had she given in, she would have been successfully scammed.

Examples of doubt-based attacks include:

  • Apple iTunes scams
  • Payment-based scams
  • Payment diversion fraud
  • Some forms of social hacking, especially in social media
Empathy and sympathy

When calamities and natural disasters strike, one cannot help but feel the need to extend aid or relief. As most of us cannot possibly hop on a plane or chopper and race to affected areas to volunteer, it’s significantly easier to go online, enter your card details to a website receiving donations, and hit “Enter.” Of course, not all of those sites are real. Social engineers exploit the related emotions of empathy and sympathy to grossly funnel funds away from those who are actually in need into their own pockets.

Examples of sympathy-based scams include:

Read: Crowdsourced fraud and kickstarted scams

Ignorance or naiveté

This is probably the human trait most taken advantage of and, no doubt, one of the reasons why we say that cybersecurity education and awareness are not only useful but essential. Suffice to say, all of the social engineering examples we mention in this post rely in part on these two characteristics.

While ignorance is often used to describe someone who is rude or prejudice, in this context it means someone who lacks knowledge or awareness—specifically of the fact that these forms of crime exist on the Internet. Naiveté also highlights users’ lack of understanding of how a certain technology or service works.

On the flip side, social engineers can also use ignorance to their advantage by playing dumb in order to get what they want, which is usually information or favors. This is highly effective, especially when used with flattery and the like.

Other examples of attacks that prey on ignorance include:

  • Venmo scams
  • Amazon gift card scams
  • Cryptocurrency scams
Inattentiveness or complacency

If we’re attentive enough to ALT+TAB away from what we’re looking at when someone walks in the room, theoretically we should be attentive enough to “go by-the-book” and check that person’s proof of identity. Sounds simple enough, and it surely is, yet many of us yield to giving people a pass if we think that getting confirmation gets in the way. Social engineers know this, of course, and use it to their advantage.

Examples of complacency-based attacks include:

  • Physical social engineering attempts, such as gaining physical access to restricted locations and dumpster diving
  • Pretexting
  • Diversion theft

Sophisticated threat actors behind noteworthy social engineering campaigns such as BEC and phishing use a combination of attacks, targeting two or more emotional and psychological traits and one or more people.

Whether the person you’re dealing with is online, on the phone, or face-to-face, it’s important to be on alert, especially when our level of skepticism hasn’t yet been tuned to detect social engineering attempts.

Brain gyming: combating social engineering

Thinking of ways to counter social engineering attempts can be a challenge. But many may not realize that using basic cybersecurity hygiene can also be enough to deter social engineering tactics. We’ve touched on some of them in previous posts, but here, we’re adding more to your mental arsenal of prevention tips. Our only request is you use them liberally when they apply to your circumstance.

  • If bearing a dubious link or attachment, reach out and verify with the sender (in person or via other means of communication) if they have indeed sent you such an email. You can also do this to banks and other services you use when you receive an email reporting that something happened with your account.
  • Received a request from your boss to wire money to him ASAP? Don’t feel pressured. Instead, give him a call to verify if he sent that request. It would also be nice to confirm that you are indeed talking with your boss and not someone impersonating him/her.
Phone (landline or smartphone)
  • When you receive a potentially scammy SMS from your service provider, call them directly instead of replying via text and ask if something’s up.
  • Refrain from answering calls not in your contact list and other numbers you don’t recognize, especially if they appear closely related to your own phone number. (Scammers like to spoof area codes and the first three digits of your phone to trick you into believing it’s from someone you know.)
  • Avoid giving out information to anyone directly or indirectly. Remind yourself that volunteering what you know is what the social engineers are heavily counting on.
  • Apply the DTA (Don’t Trust Anyone) or the Zero Trust rule. This means you treat every unsolicited call as a scam and ask tough questions. Throw the caller off by providing false information.
  • If something doesn’t feel right, hang up, and look for information online about the nature of the call you just received. Someone somewhere may have already experienced it and posted about it.
In person
  • Be wary when someone you just met touches you. In the US, touch is common with friends and family members, not with people you don’t or barely know.
  • If you notice someone matching your quirks or tendencies, be suspicious of their motives.
  • Never give or blurt out information like names, department names, and other information known only within your company when in the common area of your office building. Remind yourself that in your current location, it is easy to eavesdrop and to be eavesdropped on. Mingle with other employees from different companies if you like, but be picky and be as vague as possible with what you share. It also pays to apply the same cautious principle when out in public with friends in a bar, club, or restaurant.
  • Always check for identification and/or other relevant papers to identify persons and verify their purpose for being there.
Social media
  • Refrain from filling in surveys or playing games that require you to log in using a social media account. Many phishing attempts come in these forms, too.
  • If you frequent hashtagged conversations (on Twitter, for example), consider not clicking links from those who are sharing, as you have no idea whether the links take you to destinations you want. More importantly, we’re not even sure if those sharing the link are actual people and not bots created to go after the low hanging fruit.
  • If you receive a private message on your social network inbox—say on LinkedIn—with a link to a job offer, it’s best to visit the company’s official website and look up open positions there. If you have clicked the link and the site asks you to fill in your details, close the tab.
A happy smart ending

When it comes to social engineering, no incident is too small to be neglected. There is no harm in erring on the side of safety.

So, what should you do if someone is behind you carrying a tray of hot coffee and can’t get to her access card? Don’t open the door for her. Instead, you can offer to hold her tray while she takes out and uses her access card. If you still think this is a bad idea, then tell her to wait while you go inside and get security to help her out. Of course, this is assuming that security, HR, and the front desk have already been trained to respond forcefully against someone trying to social engineer their way in.

Good luck!

The post Social engineering attacks: What makes you susceptible? appeared first on Malwarebytes Labs.

Categories: Techie Feeds


Subscribe to Furiously Eclectic People aggregator