A lucky New Jersey lottery player won the $150,000 Jersey Cash 5 jackpot Friday night.
The New Jersey Lottery announced Monday that a Essex County ticket matched the five numbers to win.
The winning ticket was sold at One Stop Supermarket on Main Street in Orange. The retailer will receive a $2,000 bonus for selling the ticket.
The Jersey Cash 5 numbers drawn on Friday, Jan. 3 were: 05, 18, 22, 25 and 27 with XTRA: 02 and Bulleseye: 22.
It was the second straight drawing with a jackpot winner as a Burlington County lottery player won a 657,679 Jersey Cash 5 jackpot on Thursday, Jan. 2.
2024 winners:Which county in New Jersey wins the most big lottery prizes?
The NJ Lottery estimates the next Jersey Cash 5 jackpot at $258,000 for Monday night’s drawing.
Jersey Cash 5 is a daily lottery draw game from the New Jersey Lottery. Players pick five numbers between 1 and 45 and can add the Xtra for a chance to increase non-jackpot prizes by up to five times. The Bullseye gives players another chance to win. Drawings are held seven days a week at 10:57 p.m.
Month: January 2025
New Hack Threatens New York Internet Users – WIBX AM 950
Your News Talk and Sports Leader
A newly discovered web security vulnerability is putting internet users in New York and beyond at serious risk. This dangerous hack targets popular browsers like Chrome, Edge, and Safari and allows cybercriminals to exploit your actions with just a simple double-click.
The threat, revealed by application security expert Paulos Yibelo, presents a new challenge in the world of online security. Unlike traditional clickjacking attacks, which have been largely mitigated by browser protections, double clickjacking bypasses these safeguards by manipulating the timing of mouse clicks. This allows hackers to trick users into unknowingly authorizing account actions—such as confirming logins or making financial transactions—while they believe they are clicking something else, like a CAPTCHA.
Known as "double clickjacking," here's how the attack works: When you double-click on a webpage, your browser may trigger an invisible action behind the scenes. Attackers can then exploit this by replacing legitimate prompts with malicious ones, making it appear as though you're interacting with something harmless when, in reality, you're unknowingly granting hackers access to your accounts.
The danger here is immense. As Yibelo explains, double clickjacking affects almost every website and browser, leaving countless users vulnerable to account takeovers, unauthorized transactions, and even cryptocurrency wallet compromises. This threat doesn't just target websites—it can affect apps, financial accounts, and any platform where user authorization is required. And the worst part? You don't need to do anything out of the ordinary. Just a double-click could be enough to open the door for hackers.
In response to this threat, Yibelo urges developers and cybersecurity teams to step up their defenses by tightening control over embedded windows and being vigilant about multi-click actions. But until more robust in-browser mitigations are available, the best advice for users is to avoid double-clicking whenever possible, particularly on websites where you have sensitive information stored.
Cybersecurity experts are raising alarms, warning that hackers are becoming more adaptive and creative with their tactics. While the rise of double clickjacking poses new challenges, it also highlights the growing need for vigilance in both personal and professional cybersecurity practices.
In the meantime, users should exercise caution and avoid double-clicking on any suspicious or unfamiliar links until browser updates can address this new vulnerability.
Gallery Credit: Dave Wheeler
Major winter storm slams mid-Atlantic, closing schools and canceling flights: Latest – ABC News
Minneapolis will decide on police reform deal with the US government after George Floyd's murder – ABC News
The Minneapolis City Council is expected to decide Monday whether to approve an agreement with the federal government in response to the murder of George Floyd that would require major reforms within the city’s police department under long-term court s…
MINNEAPOLIS — The Minneapolis City Council is expected to decide Monday whether to approve an agreement with the federal government in response to the murder of George Floyd that would require major reforms within the city's police department under long-term court supervision.
The agreement, known as a consent decree, has been under negotiation since the Department of Justice issued a scathing critique of the city's police in June 2023, alleging that they systematically discriminated against racial minorities, violated constitutional rights and disregarded the safety of people in custody for years before Floyd, a Black man, was killed by a white Minneapolis officer in 2020. Floyd's death prompted a national reckoning with police brutality and racism.
The Justice Department report was the result of a sweeping two-year investigation that confirmed many citizen complaints about police conduct. The investigation found that Minneapolis officers used excessive force, including “unjustified deadly force,” and violated the rights of people engaged in constitutionally protected speech.
As a result, the city and police department agreed to negotiate a deal with the federal agency to require changes overseen by an independent monitor and approved by a federal judge. Minneapolis Mayor Jacob Frey, several council members and police accountability activists all welcomed the prospect at the time as a move toward healing the city.
Frey called a special City Council meeting for Monday “for the purpose of receiving a briefing on the litigation matter of U.S. Department of Justice v. City of Minneapolis and Minneapolis Police Department, including resolution possibilities.” After a closed-door discussion that began Monday morning, the council was expected to reconvene in public in the afternoon for a vote.
During his first administration, President-elect Donald Trump was critical of consent decrees as anti-police. Finalizing the Minneapolis agreement before he returns to office Jan. 20 would make it harder for him to undercut the deal, because changes would require court approval.
A state court judge in 2023 approved a similar agreement between Minneapolis and the Minnesota Department of Human Rights after the state agency issued its own blistering report in 2022. The state investigation found that the city's police had engaged in a pattern of race discrimination for at least a decade.
The Justice Department has opened 12 similar investigations of state and local law enforcement agencies since April 2021, many in response to high-profile deaths at the hands of police.
It has reached agreements with Seattle, New Orleans, Baltimore, Chicago and Ferguson, Missouri. A consent decree with Louisville, Kentucky, after an investigation prompted by the fatal police shooting of Breonna Taylor is waiting court approval. In Memphis, Tennessee, the mayor last month pushed back against pressure for a consent decree there, saying his city has made hundreds of positive changes since the beating death of Tyre Nichols.
Consent decrees require law enforcement to meet specific goals before federal oversight is removed, a process that often takes years and millions of dollars. A major reason Minneapolis hired Brian O’Hara as police chief in 2022 was his experience implementing a consent decree in Newark, New Jersey.
If the Minneapolis federal agreement gets court approval, the city would be in the unusual position of operating under both federal and state consent decrees.
24/7 coverage of breaking news and live events
Mexico: App-Based Drivers Hail New Platform Law – The Solidarity Center
by Jan 6, 2025
App-based delivery drivers and drivers paid the minimum wage in Mexico celebrated a bill that recognizes them as workers and ensures their access to social security, accident insurance, pensions, maternity leave and company profits. Credit: UNTA
App-based delivery drivers and drivers paid the minimum wage in Mexico celebrated the holidays with new legislative reform that recognizes them as workers and ensures their access to social security, accident insurance, pensions, maternity leave, company profits and a Christmas (holiday) bonus.
The law, introduced by Mexico’s President Claudia Sheinbaum on October 15, passed with full approval by the lower house and the Senate, which voted in December. It recognizes gig workers as employees, entitled to worker benefits and protections under Mexican law
Some 658,000 workers are employed across Mexico on digital platforms, with 41 percent earning above the minimum wage. The National Union of App Workers (Unión Nacional de Trabajadores por Aplicación, UNTA) campaigned for the new law, taking a key role in urging its passage. Because of its advocacy, up to 2.5 million workers, according to Mexico’s government, will now have access to important social protections and benefits.
In a media conference with its partner, the Solidarity Center, UNTA members expressed support for the regulation and also highlighted areas for improvement, such as recognizing connection time as part of total work hours. UNTA is an affiliate of the International Transport Workers’ Federation (ITF) and part of its Latin American Platform Workers’ Network.
“This reform reaffirms what we have been saying for years: We are workers,” says the General Secretary of UNTA, Sergio Guerrero. “And after years of hard struggle, this historic achievement contributes to the dignity of digital workers in Mexico, Latin America and the world.”
With few formal economy jobs available, workers worldwide are turning to the platform-based economy to support themselves and their families. While the rapid increase in app-based jobs offers millions of workers additional avenues to earn money, it also creates new opportunities for employer exploitation through low wages, lack of health care and an absence of job safety.
According to the International Labor Organization (ILO), digital platforms have created new opportunities and blurred the labor relationship between employers and workers. As a result, the digital platform work model does not adhere to standards of decent work, or fundamental ILO treaties (“conventions”), especially those on freedom of association, collective bargaining and discrimination in employment and occupation. Digital platform workers often earn low wages and lack access to social protections, minimum wage protections, employment benefits such as paid vacation and opportunities for collective bargaining.
As in Mexico, app-based workers who drive motorbikes, bicycles and cars to deliver food and transport passengers receive no paid sick leave or vacation. They work long hours and rush between deliveries, risking their safety because if they do not, the app—via the company—punishes them by lowering pay. When drivers or deliverers are injured, they receive no compensation from their employers.
In Mexico, the law now addresses such issues, ensuring that workers have the flexibility to define their own working hours and requiring the employer—such as Didi, Rappi and Uber—to register workers in the nation’s social security program, covering occupational risks and providing access to health and housing benefits. Companies are required to register contracts with the government, which must detail working hours, income and algorithmic management rules.
Further addressing what workers describe as the company’s frequent abuse through algorithms, the law prohibits companies from charging for the use of the platform and obliges them to issue detailed payment receipts and respect digital disconnection outside working hours. It prohibits companies from manipulating workers’ income to avoid their classification as dependent on employers of digital platforms and blocks the collection of fees from workers for registration, use, separation or similar concepts related to the employment relationship.
In Mexico, digital companies now must guarantee the publication of algorithmic management policies and may not manipulate income to distort the employment relationship or carry out contractual simulations. The law also prohibits withholding of workers’ wages. The new law in Mexico is one of the most progressive in the world in regulating work through digital platforms, guaranteeing fundamental labor rights.
Vanessa Parra
Campaign and Media Communications Director
[email protected]
Solidarity Center 1130 Connecticut Ave., NW, Suite 800 I Washington, DC 20036
(+1) 202-974 -8383
Contact Us
the News from The Solidarity Center
School of Dentistry receives $1.37 million grant to establish Open Dental Education Consortium – Marquette Today
Popular Searches
Dentistry
The Marquette University School of Dentistry has received a $1.37 million grant from the U.S. Department of Education to establish the Open Dental Education Consortium to help standardize dental education and decrease the cost of tuition.
With this award, MUSOD will form a consortium with Chippewa Valley Technical College and Milwaukee Area Technical College in Wisconsin, and Brigham Young University in Utah. The target population will be students of all levels of dental programs, including predoctoral DDS/DMD, dental hygiene and dental assisting.
“A major gap exists in open education such that open educational resources as a philosophy or practice have not been incorporated at scale into dental education,” said Dr. Elisabeta Karl, associate dean of academic affairs and Marquette’s principal investigator on the award. “Faculty members at the consortium institutions will collaborate with student instructional designers to develop the curriculum, which will benefit dental students from both two-year degree granting institutions and doctoral level provider programs. We estimate ODEC to save each student $1,000 during this grant period.”
Members of ODEC will target training and faculty development opportunities to educate faculty and stakeholders about open educational resources. Faculty members interested in creating and/or adopting these resources for their courses will be paired with graduate student instructional designers to create high quality and high impact open educational resources and transition to their use in the creation of faculty courses. ODEC will host a repository for all dental education open resources that are a result of this project and others who will join over the years through opendentaled.org, an alias site of EdTech Books.
Karl is collaborating with Dr. Casey Wright, formerly of MUSOD, on the award. Wright is now an assistant professor and director of behavioral sciences and scholarly activity at Pacific Northwest University.
“Marquette School Dentistry is proud of Dr. Karl and Dr. Wright for taking the lead with consortium partners for this promising award from the U.S. Department of Education,” said Dr. Elsbeth Kalenderian, dean of MUSOD. “What ODEC aims to do is standardize high quality dental education and create tuition savings for students facing financial barriers to entering dental training. When so many communities are facing a shortage of dentists, this grant touches the heart of Marquette University’s mission of access to education.”
The long-term goal is for ODEC resources to be adopted in dental education institutions throughout the United States and, as more resources are created and adopted, throughout the world. The consortium hopes each member institution will convert at least 25% of its curriculum to an open educational model within three years. In so doing, at least 530 students will save a minimum of $1,000 each.
The consortium will collaborate with other technical colleges and dental schools to increase consortium membership throughout the grant, leading to greater savings and impact. In addition, it is anticipated that student performance and engagement and use will increase, ultimately resulting in improved student learning.
College and school news
Photo gallery: School of Dentistry marks renovation milestone with opening of Delta Dental Urgent and Special Care Clinic
Campus Life, Stories at MU
Shake it off, again: An oral history of the School of Dentistry music video that went viral
Interactive event brings awareness to special care dentistry for International Day of Persons with Disabilities
© 2025 Marquette Today. All rights reserved.
Three altcoins have reached historic highs, and another one is on the way – ITC
Home – News – Three altcoins have reached historic highs, and another one is on the way
Tetiana Nechet
Автор статей
With the start of the new year and the approach of the inauguration of the elected President of the USA, Donald Trump, the crypto market has noticeably revived. Interestingly, on January 6, three altcoins set price records.
The WhiteBIT Coin token has risen by 6.82% in the last 24 hours, reaching a new all-time high of $26.55. Such growth indicates increased investor interest and a strong trend. Maintaining above the $25.1 mark is crucial for further growth. Losing this level could return the WBT price to the previous one.
Gate rose to a new high of $18.43 after a weekly growth of 16%. The token price is staying above the $18 level. Staying above this price will allow GT to continue growing, but losing support could lead to a decline.
SPX reached a new high of $1.58 after a sharp rise of 19.72%. Key support at around $1.55 could provide a basis for further growth. However, losing this level could lead to a drop to $1.34, significantly undermining the current bullish trend.
Injective Protocol (INJ) continues to rise after transitioning to Injective 3.0, aimed at reducing inflation and increasing staking rewards. This initiative allows the token supply to be adjusted in real-time based on staking activity. The INJ token also provides one of the highest yields in the industry – 10.68% for staking. The new economic model makes INJ one of the most deflationary assets on the crypto market, significantly increasing its attractiveness to investors. This is evident from the price, which has risen to $26 over the last day (+11.02%).
However, this is still less than half of the historical high INJ set in March 2024: $52.75.
AMD Ryzen AI MAX (Strix Halo): powerful APUs with Zen 5 and RDNA 3.5 for mobile systems
Three altcoins have reached historic highs, and another one is on the way
AMD Ryzen Z2 – three different processors for portable gaming consoles
Intel announces Core Ultra 200V/HX/H/U/S processors for AI PCs
Four companies received MiCA license to operate in the EU
Server support
SEO partner
Spelling error report
The following text will be sent to our editors:
Shakti Coin is bringing simplified digital currency use to millions. – StreetInsider.com
I found a malicious Chrome extension on my system – here's how and what I did next – ZDNet
Well, that wasn't fun. Last week, Ars Technica ran a report about 33 Chrome extensions that have been found to have malware. And yeah, yesterday I found that I had one of them installed.
You can read the Ars article for a list to check yourself. One seemed familiar: Reader Mode. It was intended to clear a page of all non-text to make it more readable, like Safari's Reader Mode. I haven't run it for quite some time, but the name was familiar.
Also: Google's favorite Chrome extensions of 2024 can save you time and money
I went to my 3-dot menu in Chrome, then Extensions, then Manage Extensions. And there it was, right at the top of the page: "This extension contains malware." Fortunately, the extension was switched off, but I have no idea when it became infected or whether it did any damage to the Chrome installs on my Macs or Windows machines.
The first thing I did, of course, was hit the little trashcan and remove the extension. But that's not all I had to do. Not by a long shot. That was just the start of what would become a long day.
If you find malware in your Chrome, you might want to follow the steps I took after this lovely discovery. Even though Chrome syncs settings, I did this set of steps on each of my active computers. That's three Macs and three Windows machines. Because I have nothing better to do with my time (grumble).
Note that for this article, I'm giving you the URLs as plain text, rather than as links. If you have a compromised browser, links might be compromised. So copy and paste the plain text URLs and visit the pages that way. Regular pages like Google blog posts and ZDNET articles will be presented as traditional links.
Also: The best secure browsers for privacy
First, of course, if you see any of the other extensions listed as malware in your Chrome security dialog, remove them.
There used to be a Chrome cleanup tool, but that was discontinued with Chrome 111. Google says that Chrome is protected with its Safe Browsing protection level in Chrome. There's an Enhanced Protection level, which should help by sharing real-time data with Safe Browsing.
So that's where I went next. Point your Chrome to chrome://settings/security.
Fortunately, I already had Enhanced Protection turned on. That was a big relief.
Next, point your browser to Chrome's safety check at chrome://settings/safetyCheck. Here, you'll see some guidance about things to fix if Chrome notices any issues. Follow the directions. My Chrome seems fairly happy at the moment.
Next, I cleared all my browsing data and cookies. That will require logging back into a bunch of sites, but it's worth it to know I'm fairly safe. Point your browser to chrome://settings/clearBrowserData.
I clicked the Advanced tab, scrolled down, and checked everything. The only things I kept were my browsing and download histories. I'm not happy about killing everything else, but safety first, right? Ugh.
That process took about five minutes for me, and my Chrome now had that just-showered feeling, all day long. Because I'm worth it.
There is one more Chrome step you could take, but I didn't do it. You could run chrome://settings/reset. But beware, this basically nukes all your Chrome features. Beyond removing browsing data and cookies, it will:
And it will also do the steps we did above in clearBrowserData.
I didn't want to have to go that far back to the beginning, so I settled on just clearing my browsing data.
At this point, I quit Chrome and rebooted my machine. As one does.
I'm still not ready to move to passkeys. Passkey technology is pretty impressive, but it has implications for my entire workflow. So before I make the transition, I want to be sure I'm ready. That's next on my security to-do list, but it's not here today.
Today, however, I'm going through and changing passwords. I'm resetting all my socials and all of my primary cloud services, along with key financial institutions. There's no way I can change all my passwords (I have a few thousand of them), but I certainly can change the passwords for my most-frequently used sites.
Also: 7 essential password rules to follow in 2024, according to security experts
I did, once again, contemplate deleting all my accounts, shutting down my internet service, and moving to a yurt somewhere on the Mount Jumbo North Peak Trail in Montana. But then I remembered that it's cold in Montana, Amazon Prime and Instacart won't deliver there, there's a new Star Trek movie coming out in a few weeks, and, you know, I have a job.
So I just changed my passwords, one by one.
So, yeah. Antivirus. I know, it feels suddenly like 2003, but hear me out. Windows 11 comes with Microsoft Defender, which ZDNET's own Ed Bott says is quite excellent. So I ran that.
First, I went to Windows Security on my first Windows 11 machine (I eventually repeated this on all three) and clicked into Virus & threat protection.
Apparently, Windows had run a scan the day before and had found one threat. Not good, but fixable. I scrolled down to Full Scan and ran a full scan on the system. That took longer, but I wanted that cozy full-scan feeling.
Once it completed, it reported no threats, which was nice.
After that, even though it really wasn't necessary, I also ran an offline scan. I figured that, since I had the tool, I might as well use it.
The offline scan is funny, because it runs when Windows isn't loaded. As such, it uses some very primitive graphics resources, which really did give me that 2003 feeling.
When it completed, Windows rebooted, and all was good. I just had two more machines to take through the same process, which I subsequently did.
As for Mac antivirus, there really isn't a need to run such a thing. Yes, I know there are third-party providers who sell antivirus. But, as Ed says, "XProtect antimalware technology has been around for over a decade and is effective against mainstream threats."
At this point, I feel fairly sure my systems are safe. I updated Chrome on six machines, nuked all my settings, cleared out bad extensions, changed a ton of passwords, and ran malware scans on my Windows machines.
It wasn't exactly how I wanted to spend my Sunday, but everyone needs a hobby, I guess.
So, what about you? Are you running any bad extensions? Did you look at Chrome and see what it's reporting as issues? Have you enabled Enhanced Security? Have you considered moving to a yurt? Let us know in the comments below.
You can follow my day-to-day project updates on social media. Be sure to subscribe to my weekly update newsletter, and follow me on Twitter/X at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, on Bluesky at @DavidGewirtz.com, and on YouTube at YouTube.com/DavidGewirtzTV.
Daily Journal website experiencing technical issues on Microsoft browsers – Northeast Mississippi Daily Journal
Daily Journal website experiencing technical issues on Microsoft browsers Northeast Mississippi Daily Journal
source