Feed aggregator

#MeTooAikido Website & Facebook Page Launch

Aikido News - Wed, 04/28/2021 - 07:57
#MeTooAikido Website & Facebook Page Launch
From: Jun Akiyama posted on 28. Apr 2021, 06:57am
URL: https://www.metooaikido.com

C/w: Sexual harassment and assault. I wanted to highlight the website www.MeTooAikido.com and the Facebook page MeTooAikido, both of which “bring awareness to all aikido practitioners about sexual harassment and assault. Find resources for survivors as well as dojo instructors, owners and organizations. Abuse in dojos affects all of us.” The website also contains an Aikido practitioner's sexual assault survivor’s story and a place to pledge your and your dojo/organizations support for the movement, as well as resources for survivors and support for Aikido dojo to create safer spaces. Please take a look, support, and sign the pledge. Thank you.

  • Submit an Aikido News Item

  • Categories: Aikido

    Aikizen: Spiritual Aikido

    Aikido News - Wed, 04/28/2021 - 07:56
    Aikizen: Spiritual Aikido
    From: Ralph Pettman posted on 28. Apr 2021, 06:56am
    URL: https://www.amazon.com/Aikizen-Spiritual-Aikido-Ralph-Pettman-ebook/dp/B09176XPPS

    I recently published a booklet entitled "Aikizen: Spiritual Aikido". In it I detail the erosion of the spiritual foundation to Aikido, and I posit its reconstruction using the moving version of a meditative modality called Aikizen. --Ralph Pettman

  • Submit an Aikido News Item

  • Categories: Aikido

    British Aikido History

    Aikido News - Wed, 04/28/2021 - 07:56
    British Aikido History
    From: Henry Ellis posted on 28. Apr 2021, 06:56am
    URL: https://www.amazon.co.uk/British-Aikido-History-pioneers-Kenshiro/dp/B08Y49S8TR

    The book `British Aikido History` The story of two pioneers from the Kenshiro Abbe Era 1950s - The book, published by Amazon on the 7th March 2021 - Many old photos - stories - anecdotes to give the reader a taste of those early days. The B/W version is £6-35p also available a colour version at £27-00. please visit Amazon Aikido Books, see top of books image [Look inside ] see a free preview. Regards Henry Ellis Co-author " British Aikido History".

  • Submit an Aikido News Item

  • Categories: Aikido

    Spectral Samurai Warrior For Sword of Cepheus, Barbaric!, & Cepheus Atom

    Swords & Stitchery - Wed, 04/28/2021 - 06:59
     An ancient clan of nameless samurai warriors have been cursed by the elder Oni to forevermore be at the beckoned call of black wizards from across space & time. This clan's name has been struck from history but the summoning ritual has been passed from black wizard to cult for eons. The spectral samurai are incredibly dangerous husks of their former selves with absolutely no souls left within Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
    Categories: Tabletop Gaming Blogs

    Video of the Day – Circle, 2014

    Blogtor Who - Wed, 04/28/2021 - 03:00

    The post Video of the Day – Circle, 2014 appeared first on Blogtor Who.

    Categories: Doctor Who Feeds

    How to Use the Red Heart Pom and Tassel Maker – Moogly Live April 27, 2021

    Moogly - Tue, 04/27/2021 - 15:35

    Poms and tassels add so much life and texture to our craft projects – and the Red Heart Pom and Tassel Maker makes it easy! Today, get the latest Moogly news on Facebook and see where you can sign up for my next few lives and classes. Then, join me on YouTube to learn how...

    Read More

    The post How to Use the Red Heart Pom and Tassel Maker – Moogly Live April 27, 2021 appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

    0
    Categories: Crochet Life

    The Twisting Tale of Skills in D&D

    DM David - Tue, 04/27/2021 - 11:28

    Modern Dungeons & Dragons includes both skills and character classes, but in the early days of the roleplaying hobby, gamers often saw skills and classes as incompatible. Some gamers touted skills as the innovation that freed roleplaying games from character classes. Three years after D&D reached hobby shops, new games like Traveller and RuneQuest eliminated classes in favor of skill systems. Advertisements for RuneQuest in The Dragon trumpeted, “No Artificial Character Classes!!” Such games eliminated the unrealistic class restrictions that prevented, say, a fighter from learning to climb walls or from mastering a spell. “Mages can wear armor and use blades.” The ad credits RuneQuest to designer “Steve Perrin and friends.” Remember that name, because Perrin returns to this tale later.

    1978 Chaosium ad featuring RuneQuest

    D&D co-creator Gary Gygax favored classes because they resonated with the fantasy archetypes everyone knew. He warned, “If characters are not kept distinct, they will soon merge into one super-character.” He had a point. Skill-based games gave every character the ability to improve the same common adventuring skills, leading to a certain sameness among adventurers.

    Classes let characters make distinct contributions to a group’s success. In a 1984 interview in DRACHE magazine, Gygax said, “The D&D game is based on the theory that there is so much to know and to do that nobody can do everything on his own. The team aspect is important. Each player has to use his strengths at the right place. Otherwise, the group won´t be able to survive.”

    As long as Gygax controlled D&D’s development, he kept skills out of the game. His Unearthed Arcana (1985) added weapon proficiencies as a sort of weapon skill, but their narrow scope kept the sharp lines between classes.

    Still, TSR designer Dave “Zeb” Cook saw a need for character development beyond class. “One of the things dreadfully lacking from Advanced Dungeons & Dragons was any sense that your character had a real life beyond class skills.” When Cook wrote Oriental Adventures (1985), he brought a taste of skills to D&D in non-weapon proficiencies—skills without the name. These new proficiencies never overlapped with class abilities. Characters gained skills such as calligraphy, etiquette, animal handling, and bowyer. Non-weapon proficiencies “gave players a way to create a more culturally-informed background for their character.”

    Checks finally reached AD&D in the Dungeoneer’s Survival Guide (1986). Although this book’s title suggests a focus on player strategy, this guide brought key rules innovations to AD&D. Here, the non-weapon proficiencies from Oriental Adventures became options in the primary game. When players used non-weapon proficiencies, they made proficiency checks to determine the outcome. These checks filled the place of ability checks. The new system of featured all the ingredients of a modern skill system, although class features still covered most of the actions characters attempted during an adventure, so thieves still rolled on their private tables to climb walls and move silently.

    In a convention appearance, Dave “Zeb” Cook and fellow designer Steve Winter talked about how these first-edition books led to a second edition. “Oriental Adventures was the big tipping point because Zeb Cook put a lot of really cool stuff in OA,” Winter said. “We felt like, wow it would be great if this was actually part of the core game, but it’s not.”

    “Because of the way we had to treat those books, you couldn’t actually consider them canon when you were writing product or doing modules,” Cook explained. “You always had to assume that players only had the Dungeon Master’s Guide and the Player’s Handbook.”

    Even after Gygax left TSR in 1985, designers like Cook and Winter lacked the clout to make sweeping changes to the company’s flagship game. TSR management insisted that second edition AD&D remain broadly compatible with the original. The Player’s Handbook (1989) included non-weapon proficiencies as an optional rule. Ability checks entered the core game, but languished in the glossary. Nonetheless, these additions inched AD&D closer to matching the ability checks and skills in other role-playing games.

    But TSR sold two D&D games, an advanced version that got more scrutiny from management, and a basic version that offered more freedom to designers. By 1988, RuneQuest designer and freelancer Steve Perrin was gaining assignments writing D&D supplements. His GAZ5 The Elves of Alfheim (1988) for the D&D campaign setting of the Known World introduced skills by name to the game. “Due to their background, elves have a variety of skills that are neither shown in the rule books, nor related directly to combat, thieving, or magic. These are optional additions to your D&D campaign.” RuneQuest’s designer put more cracks in the wall between skills and D&D’s classes.

    A year later, GAZ11 The Republic of Darokin (1989) by Scott Haring expanded this skill system beyond elves.

    “Each skill is based on one of the character’s Abilities (Strength, Intelligence, Wisdom, Dexterity, Constitution, and Charisma). When a circumstance arises in which the DM feels the use of a character’s skill is needed, he asks the player to roll a d20 against his current score with the Ability. If the result of the d20 roll is less than or equal to the Ability, the skill use succeeds. A roll of 20 always fails, no matter how high the chance for success.”

    The gazetteer listed skills from advocacy and animal training to woodworking, but the options still kept away from the class specialties of combat, thieving, and magic.

    In 1991, the Dungeon & Dragons Rules Cyclopedia gathered all the rules from the basic line into a single hardcover that included the skill system. Meanwhile, AD&D would spend another decade forcing players to say “non-weapon proficiency” in place of “skill.”

    For D&D’s third edition in 2000, the designers finally gained permission to correct old drawbacks. “We knew we wanted to make a more robust set of skills,” designer Monte Cook said in an interview. “You had thieves‘ skills, which were different and they worked completely differently, because they were percentage based. So we wanted to marry all of that together.” Like RuneQuest and virtually every other contemporary roleplaying game, the new edition would adopt a single, core mechanic to resolve actions. Players made checks by rolling a d20, adding modifiers, and comparing the result against a difficulty class number. Skills now offered bonuses to these checks.

    The older D&D skill system and AD&D proficiency checks had created in impression that the third-edition designers worked to avoid. In both systems, skills seemed like a requirement to attempt many tasks, so characters needed gemcutting skill to even attempt a radiant cut. That adds up. On the other hand, surely anyone could attempt bargaining and gambling, yet D&D’s original skill checks only applied to characters with a skill.

    D&D’s new d20 core mechanic meant that skills expanded to include actions characters actually did in the game. For instance, rogues got skills rather than a private table listing their chance of hiding and picking pockets. “D&D was still a class based game, but the idea that you were not a thief, so you can’t climb and you can never climb, didn’t really hold a lot of water.” The system allowed any character to attempt to hide and climb. Unskilled characters just suffered worse odds of success. Good luck with the gemcutting.

    By fourth edition the games designers worked hard to reach Gary Gygax’s ideal of teamwork—but only during combat. On the battlefield, each character class served a distinct role like striker and defender. For tasks outside combat, the designers contrived a skill challenge system aimed at ensuring that every character gained an equal chance to contribute.

    During fifth edition’s design, the D&D designers planned to sideline skills in favor of simple ability checks. “We’re making skills completely optional,” lead designer Mike Mearls wrote. “They are a rules module that combines the 3E and 4E systems that DMs can integrate into their game if they so desire.”

    But playtesters liked the depth that skills gave characters. Also finessing the game’s math so it played equally well with or without skill bonuses doubtless proved troublesome. So skills stayed part of the D&D core. The designers still chose to rename skill checks as ability checks. This further avoids from the implication that characters need a skill to attempt certain tasks. Without formal skill challenges, fifth edition allows characters with particular skills to shine more as individuals who bring special talents to contribute to the team.

    And in the end, no one had to say or type “non-weapon proficiency” ever again (unless they tell this story).

    Categories: Tabletop Gaming Blogs

    Password manager hijacked to deliver malware in supply chain attack

    Malwarebytes - Tue, 04/27/2021 - 09:36

    In the latest example of a supply chain attack, cybercriminals delivered malware to customers of the business password manager Passwordstate by breaching its developer’s networks and then deploying a fraudulent update last week, said Passwordstate’s maker, Click Studios.

    Though the number of infected computers is currently unknown, Click Studios said in an April 24 advisory that the victim count “appears to be very low.” That estimate may increase though, said Click Studios, as it continues to investigate. According to the company, its password manager is used by more than 29,000 customers across the industries of banking, retail, manufacturing, education, healthcare, government, aerospace, and more.

    The attack lasted just 28 hours, Click Studios said, from April 20, 8:33 PM UTC to April 22, 0:30 AM UTC. Only the customers who initiated an update between those hours are at risk.

    As to how the cybercriminals breached the company, Click Studios only said that “a bad actor using sophisticated techniques compromised the In-Place Upgrade functionality.” Click Studios said the “initial compromise was made to the upgrade director located on Click Studios website www.clickstudios.com.au,” which regularly points Passwordstate’s in-place upgrade function to approved software versions loaded onto Click Studios’ Content Distribution Network, or CDN. By compromising the in-place upgrade functionality, the cybercriminals were able to point users to their own CDN, which carried the malware.

    The malware—currently referred to as Moserpass—stole system information and Passwordstate data and then delivered it back to the servers that were controlled by the cybercriminals responsible for the attack.  

    That data included computer name, username, domain name, current process name, current process ID, and several fields from a customer’s Passwordstate account, including title, username, description, notes, URL, and password. Data for certain “generic field” entries was also delivered, but Click Studios said that users who chose to encrypt that data averted the malware’s data harvesting and delivery capabilities.

    Click Studios also clarified in its April 24 advisory that, “although the encryption key and database connection string are used to process data via hooking into the Passwordstate Service process, there is no evidence of encryption keys or database connection strings being posted to the bad actor CDN.”

    According to Bleeping Computer, the CDN servers used in the attack are no longer active.

    The Passwordstate attack is the latest example of a re-emerging cyberthreat that saw great attention back in 2013 when the US retailer Target suffered an enormous data breach that compromised the payment information of 41 million customers. That attack, which resulted in an $18.5 million settlement, began with an attack on the company’s HVAC vendor. Four years later, cybercriminals again relied on a supply chain attack to breach Equifax, and just two years after that, the SolarWinds supply chain attack rattled the entire cybersecurity industry.

    These attacks are difficult to catch, and for an attack like the one that targeted Passwordstate, they pose a significant threat to cybersecurity overall, as users and businesses could begin to question the legitimacy of regular software updates.

    For Passwordstate’s customers who did install the fraudulent update, Click Studios advised to contact the company’s customer support, and, following specific instructions, to begin resetting all passwords saved in Passwordstate.

    The post Password manager hijacked to deliver malware in supply chain attack appeared first on Malwarebytes Labs.

    Categories: Techie Feeds

    The Order of the Alligator Knights For Sword of Cepheus, Barbaric! & Cepheus Atom

    Swords & Stitchery - Tue, 04/27/2021 - 03:04
     The Order of the Alligator was founded on a backwater swamp plane that had come into contact with an Arthurian order of knights who were slain saving a group of young Alligator lizardmen mothers &  hatchlings. A survivor of the maccacre of the knights stayed behind to educate the younglings in the precepts,beliefs, & traditions of his knightly order.  The order continued to train even when the Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
    Categories: Tabletop Gaming Blogs

    Zoom deepfaker fools politicians…twice

    Malwarebytes - Mon, 04/26/2021 - 17:21

    We recently said deepfakes “remain the weapon of choice for malign interference campaigns, troll farms, revenge porn, and occasionally humorous celebrity face-swaps”. Skepticism that these techniques would work on a grand scale such as an election, remains in place. In the realm of malign interference and smaller scale antics, however, deepfakes continue to forge new ground.

    It’s one thing to pretend to be anonymous law enforcement operatives at the other end of a web call, with no deepfake involvement. It’s quite another to deepfake the aide of a jailed Russian opposition leader.

    Zooming into deepfake territory

    Multiple groups of MPs were recently tricked into thinking they were talking to Leonid Volkov, a Russian politician and chief of staff to Alexei Navalny’s 2018 presidential election campaign. Instead, Dutch and Estonian MPs at different meetings were presented with an entirely fictitious entity forged in the deepfake fires. From looking at the various reports on these incidents, we’re not entirely sure if fake Leonid responded to questions or stuck to a pre-written script. We also don’t know if the culprits faked his voice, or spliced real snippets to form sentences. Based on this report, it appears the Zoom call was conversational, but details are sparse. The aim of the game was most likely to have MPs say they want to support Russian opposition with lots of money. 

    How did this happen?

    It appears basic security practices were not followed. Nobody verified it was him beforehand. His email wasn’t pinged, nobody said “Hey there…” on social media. This is rather incredible, considering people doing an Ask Me Anything on Reddit will hold up a “Hi Reddit, it’s me” note as a bare minimum. With such a non-existent security procedure in place, disaster is sure to follow.

    One wonders, given the absence of contact with the real Leonid, how fake Leonid had the Zoom sessions arranged in the first place. Can anyone arrange a call with a room of MPs if they claim to be somebody else? Do online meetings regularly take place with no effort to ensure everyone involved is legitimate? This all seems a little bit peculiar and faintly worrying.

    Locking down deepfakes: in it for the long haul

    Outside the realm of verification-free Zoom calls with parliamentarians, more moves are afoot to detect deepfakes. SONY has stepped into a battleground already populated by DIY tools and researchers trying to fight fakery online. Elsewhere, we have AI generated maps. While this sounds scary, it’s not something we should be panicking over just yet.

    Deepfakes continue to become more embedded in public consciousness which can only help raise awareness of the subject. You want some Young Adult fiction about deepfakes? Sure you do! Actors helping to popularise the concept of fake video as something to be expected? Absolutely. Wherever you turn…there it is.

    Low-level noise and quiet misdirection

    For now, malign interference campaigns and small-scale shenanigans are the continued order of the day. It’s never been more important to take some steps to verify your web-based conversationalists. Whether an AI-generated deepfake or someone with a really convincing wig and fake voice, politicians need to enact some basic verification routines.

    The real worry here is that if they fell for this, who knows what else slipped by them via email, social media, or even plain old phonecalls. We have to hope that whatever verification systems are in place for alternate methods of communication among politicians are significantly better than the above.

    The post Zoom deepfaker fools politicians…twice appeared first on Malwarebytes Labs.

    Categories: Techie Feeds

    Frozen Blood & Focused Ambitions - Leigh Brackett's Black Amazon of Mars 's 'Shining ones' & Michael Moorcock's Stormbringer mythologies

    Swords & Stitchery - Mon, 04/26/2021 - 15:02
     This blog entry picks right up where yesterday's left off & we dive into another Martian ecology with an OSR twist or two. Leigh Brackett's Black Amazon of Mars wraps up the Stark triliogy of stories. Black Amazon of Mars by Leigh Brackett originally appeared in the March 1951 issue of Planet Stories. It can be read online here at Archive.org. And yes it has some incredibly interesting Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
    Categories: Tabletop Gaming Blogs

    Patons Kroy Socks Giveaway

    Moogly - Mon, 04/26/2021 - 15:00

    Patons Kroy Socks is a lightweight wool blend yarn that’s perfect for fine garments and accessories – lots more than just socks! Take a look at this versatile yarn and enter to win 5 skeins of Patons Kroy Socks on Moogly! Disclaimer: This post was sponsored by Yarnspirations and includes affiliate links; all opinions are...

    Read More

    The post Patons Kroy Socks Giveaway appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

    90
    Categories: Crochet Life

    Breaking free from the VirusTotal silo: Lock and Code S02E07

    Malwarebytes - Mon, 04/26/2021 - 14:51

    This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in using VirusTotal as the one source of truth when evaluating whether or not a cybersecurity tool actually works. It’s a practice that is surprisingly common.

    Weeks ago, Malwarebytes Labs released the SMB Cybersecurity Trust & Confidence Report, which revealed that the majority of small- to medium-sized businesses that we surveyed were taking proactive measures to test whether their endpoint protection was catching all the right—or wrong—stuff. We found that of those who did evaluate their endpoint protection tools, a hefty 58 percent did so strictly by using VirusTotal.

    Now, VirusTotal is a massive online resource that countless cybersecurity researchers likely rely on every day. But it shouldn’t be the only tool that security teams rely on, because VirusTotal has some gaps. In fact, all the evaluation methods that respondents told us about in our survey are far from perfect, and they might lead to uninformed conclusions.

    If endpoint detection tools are supposed to stop an attack before it happens, what good is evaluating it with an incomplete tool? It puts too much at risk. And that isn’t even mentioning the potential privacy threats involved.

    “If you get a file that says ‘This looks like there’s a virus in it,’ be careful with what you’re uploading,” Donovan said. “If you take something that is a confidential memo that flagged your antivirus, you may want to figure out how to look at that somewhere differently rather than putting that up in VirusTotal”

    Tune in to learn about the smartest ways to test and implement endpoint protection into your small- to medium-sized business, and how to finally break free from the VirusTotal silo, on the latest episode of Lock and Code, with host David Ruiz.

    This video cannot be displayed because your Functional Cookies are currently disabled.

    To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

    You can also find us on Apple PodcastsSpotify, and Google Podcasts, plus whatever preferred podcast platform you use.

    The post Breaking free from the VirusTotal silo: Lock and Code S02E07 appeared first on Malwarebytes Labs.

    Categories: Techie Feeds

    BIG FINISH: Doctor Who monthly adventures range awarded a Guinness World Record

    Blogtor Who - Mon, 04/26/2021 - 14:00

    Big Finish Productions is proud to announce that its long-running series Doctor Who – The Monthly Adventures has received a GUINNESS WORLD RECORDS™ title for Longest running science fiction audio play series. Doctor Who – The Monthly Adventures released a brand-new adventure for 275 consecutive months from July 1999 to March 2021, featuring the Fifth, Sixth, Seventh and Eighth Doctors […]

    The post BIG FINISH: Doctor Who monthly adventures range awarded a Guinness World Record appeared first on Blogtor Who.

    Categories: Doctor Who Feeds

    11-13 year old girls most likely to be targeted by online predators

    Malwarebytes - Mon, 04/26/2021 - 11:35

    The Internet Watch Foundation (IWF), a not-for-profit organization in England whose mission is “to eliminate child sexual abuse imagery online”, has recently released its analysis of online predator victimology and the nature of sexual abuse media that is currently prevalent online. The scope of the report covered the whole of 2020.

    IWF annual report: what the numbers reveal

    The IWF assessed nearly 300,000 reports in 2020, wherein a little more than half of these—153,383—were confirmed pages containing material depicting child sexual abuse. Compared to their 2019 numbers, there was a 16 percent increase of pages hosting such imagery or being used to share.

    From these confirmed reports, the IWF were able to establish the following trends:

    The majority of child victims are female. There has been an increase in the number of female child victims since 2019. In 2020, the IWF has noted that 93 percent of the child sexual abuse material (CSAM) they assessed involved at least one (1) female child. That’s a 15 percent increase compared to numbers in 2019.

    Females dominate the victimization type in online child abuse imagery. On the other hand, imagery involving males has significantly decreased since 2019, from 17 percent to 3 percent. (Source: IWF Annual Report 2020)

    Online predators are after children ages 11-13. The IWF counted a total of 245,280 hashes—unique codes representing different pictures, videos or other CSAM—the majority of which involve females, where a child victim is 11-13 years of age. This is followed by children aged 7 to 10 years of age.

    These hash statistics show a clear trend: a great majority of predators are after imagery of children aged 7 to 13. (Source: IWF Annual Report 2020)

    To learn more about the IWF Hash List, watch this YouTube video.

    Tink Palmer, CEO of the Marie Collins Foundation, a charity group that helps child victims and their families to recover from sexual abuse involving technology, told the IWF why online predators gravitate within these age groups.

    “In many cases it is pre-pubescent children who are being targeted. They are less accomplished in their social, emotional and psychological development. They listen to grown-ups without questioning them, whereas teenagers are more likely to push back against what an adult tells them.”

    Age breakdown of child sexual abuse graph, which further supports this trend against 11 – 13 year old girls. (Source: IWF Annual Report 2020)

    Self-generated child sexual abuse content are on an uptick. 44 percent of images and videos analyzed by IWF in 2020 are classed as “self-generated” child sexual abuse content. This is a 77 percent increase from 2019 (wherein they received 38,400 reports) to 2020 (wherein they received 68,000 reports).

    “Self-generated” content means that the child victims themselves created the media that online predators propagate within and beyond certain internet platforms. Such content is created with the use of either smartphones or webcams, predominantly by 11 to 13 year old girls within their home (usually, their bedroom) and created during periods of COVID-19 lockdowns.

    Content concerning the use of webcams are often produced using an online service with a live streaming feature, such as Omegle.

    Statistics on self-generated abuse vs contact sexual abuse among female children who are aged 11 to 13 years old (Source: IWF Annual Report 2020)

    Europe is found hosting almost all child sexual abuse URLs. The IWF has identified that 90% of the URLs it analyzed and confirmed to house CSAM were hosted in Europe, in which they also included Russia and Turkey. Among all countries in Europe, the Netherlands is the prime location for hosting CSAM, a constant that the IWF has seen through the years.

    Due to lower cost of web hosting, 77% of CSAM are physically hosted on servers in the Netherlands. (Source: IWF Annual Report 2020) Shutting the door on child sexual abusers

    The IWF report highlights a worrying trend on child victimology and gives us an idea that online predators not only groom their targets but also coerce and bully them to do their bidding. And child predators usually frequent platforms that a lot of teenage girls use.

    Sadly, there is no single measure or piece of technology that can solve the problem of child exploitation. The best protection for children is effective parenting, and the IWF urges parents and guardians to T.A.L.K. to their children. T.A.L.K. is a list of comprehensive and actionable steps parents and/or carers can take to help guide their children through a safer online journey as they grow up.

    T.A.L.K. stands for:

    * Talk to your child about online sexual abuse. Start the conversation – and listen to their concerns.

    * Agree ground rules about the way you use technology as a family.

    * Learn about the platforms and apps your child loves. Take an interest in their online life.

    * Know how to use tools, apps and settings that can help to keep your child safe online.

    If images or videos of your child have been shared online, it’s important for parents not to blame the child. Instead, reassure them and offer support. Lastly, make a report to the police about these images or videos, IWF, Childline, or your local equivalent.

    “Don’t be shy. You look so pretty in your picture, Evie. Just wanna see what you’ve got under there. Just for me.”

    The post 11-13 year old girls most likely to be targeted by online predators appeared first on Malwarebytes Labs.

    Categories: Techie Feeds

    Mary Magdalene: A Post-Easter Reflection

    Just Call Me Pastor - Mon, 04/26/2021 - 11:00

    During my recent careful reading of the Gospel accounts of Jesus’ death and resurrection I was surprised by the large place Mary Magdalene holds in the story. Remember that she was possessed by seven demons when she first encountered Jesus. He delivered her. This is recorded in two Gospel accounts, Luke 8:2 and Mark 16:9.  

    All four Gospel writers place her at the tomb on the Sunday morning of Jesus’ resurrection (Matthew 28:1; Mark 16:1; Luke 24:10; John 20:1). In fact, the Gospel of John places her there twice, first when she discovered that the tomb was empty and ran to notify Peter and John, and again, presumably having followed them back, after these two had seen for themselves and then had left (John 20:1-2,10-11).

    She is the only one the two angels at the tomb addressed directly: “Woman, why are you crying?” (John 20:13). Even more significantly, she was the first to see and speak to the resurrected Christ (20:14-16).

    And then, she was the one who carried the good news to the apostles — that Jesus had indeed risen from the dead. (20:18).

    Consider the story in more detail.

    On the first Sunday after Our Lord’s crucifixion, Jesus’ followers were in utter confusion. The Jewish sabbath was over. The feast of unleavened bread was still in progress. But Jesus, in whom they had lodged such hope, was dead and buried –- permanently, they thought. 

    For a small group of women who had supported Jesus’ ministries out of their own resources, all that was left was an emotional visit to Jesus’ tomb. There, they could finish the work of embalming and grieve together.  

    Based on her history of deliverance from demon possession, Mary Magdalene had reason to love Jesus profoundly, and also to grieve deeply his brutal and shameful death.

    John says that on that Sunday morning, she was first to notice the stone covering the opening to the tomb had been rolled to one side, and first to peer into the tomb, likely still by moonlight, and to see that the ledge where his body had been laid was bare. (See John 20:1.) 

    What could this mean? She drew a mistaken conclusion and, likely distraught, hurried back into the city to report to two of the apostles: “They have taken the Lord out of the tomb, and we don’t know where they have put him!” (John 20:2).

    In the darkness and in her grief, the possibility of a resurrection from death would be the last thing to occur to her.

    As the passage of John 20:11-17 tells us, after her return to the tomb a short time later, after reporting to Peter and John, a stranger materialized behind her and repeated the question the two angels had just put to her: “Woman, why are you crying?” and adding, “Who are you looking for?” Mary thought he was the gardener, and addressed him, perhaps with an edge in her voice: “Sir, if you have carried him away, tell me where you have put him, and I will get him.”

    At that moment, the risen Lord spoke her name, Mary … and she recognized the voice and responded with great surprise, “Rabboni!”

    Before she hurried off for this second time, this time to carry exciting news, Jesus gave her notice of his coming ascension to the Father.

    Why would Jesus give her such attention? Women in Palestine in the first century were on the bottom rung of the social ladder. A shocking rabbinic saying went: “Blessed is he whose children are male, but woe to him whose children are female.” Another rabbinic saying goes: “Let the words of law be burned rather than delivered to women.”

    The Gospel was ahead of its time. It elevated womanhood. Here is a woman whom Jesus had delivered from demon possession. Then to top all else, the Master had trusted her first with the Good News of his resurrection and coming ascension.

    And she became the first human to bear this good news to others (John 20:18).

    Image credit: John Taylor (via flickr.com)

    Categories: Churchie Feeds

    A week in security (April 19 – 25)

    Malwarebytes - Mon, 04/26/2021 - 10:31

    Last week on Malwarebytes Labs, we interviewed Youssef Sammouda, a 21-year-old bug bounty hunter who is focused on finding vulnerabilities on Facebook.

    We looked into the CodeCov supply-chain attack, the vulnerabilities in Pulse Secure VPN that are being actively exploited by attackers, and the discovery of SUPERNOVA malware found on a SolarWinds Orion server.

    We also featured technology, particularly facial recognition, used by the FBI to identify one of the Capitol rioters several months after it happened; we covered news about a FIN7 sysadmin being indicted for 10 years for “billions in damage”; and the calling out of EU’s proposed ban on the use of artificial intelligence, because it doesn’t deal with its potential for high abuse. Lastly, we have provided a comprehensive guide on how to pick the best VPN for you, whether you stream, play video games, or torrent.

    Other cybersecurity news

    Stay safe!

    The post A week in security (April 19 – 25) appeared first on Malwarebytes Labs.

    Categories: Techie Feeds

    Doctor Who: Dalek Universe 2 – Story Titles and Details Revealed

    Blogtor Who - Mon, 04/26/2021 - 08:30

    Get ready to further explore Doctor Who: Dalek Universe, the three-volume epic of full cast audio dramas from Big Finish Big Finish have released the trailer and story details are for Dalek Universe 2, set for release in July 2021. This trio of tales take the Tenth Doctor (David Tennant), Anya Kingdom (Jane Slavin) and […]

    The post Doctor Who: Dalek Universe 2 – Story Titles and Details Revealed appeared first on Blogtor Who.

    Categories: Doctor Who Feeds

    Pages

    Subscribe to Furiously Eclectic People aggregator