Publié le Laisser un commentaire

Urban Meyer shares how CFP blowouts will change selection process – On3

Following the opening round of the College Football Playoff, which featured nothing but blowouts, many are wondering if the CFP could change its process going forward. Urban Meyer included.
In fact, the long-time college football head coach suggested there might be two changes coming in the future. One from the committee as a result of the outcomes, and one by teams as a result of the selections.
Get your team’s official College Football Playoff watch from AXIA by CLICKING HERE: “Watches that tell so much more than time”
“I think the reality is that there’s two things that I witnessed,” Meyer said on The Triple Option podcast. “No. 1 is the College Football Playoff, I think, is forever changed now. And that means if you don’t play anyone you’re not going to get in. I think that’s been — if you don’t beat a ranked team or… I think the public spoke. I kind of paid attention the best I could, and I think that you’ll take a team that plays a rugged schedule over a team that just doesn’t play anyone. That was the feedback I got.”
Of course, that was a big question mark going in. Teams like Indiana and SMU were selected for the field despite playing a less rigorous schedule than programs like, say, Alabama or Ole Miss.
CLICK HERE to go to PrizePicks and use code ON3 to receive a guaranteed $50 once you play $5 in lineups!
Meyer leaned into his point about teams with tougher schedules getting in in the future based on the way things played out, then seemed to think twice of it mid-sentence.
“I think a three-loss team… the minute I say that, though, I mean Tennessee gets their ass kicked in,” Meyer said. “I don’t know. It’s tough.”
One thing that is clear? The College Football Playoff is not a perfect system.
“You know what’s amazing, the BCS was a flawed system,” Meyer said. “The College Football Playoff four-team was a flawed system. And here we are with a 12-team, it’s a flawed system somehow. But it’s great to the fans to a point.”
Finalizing deal to be college HC
Miami HC set to step down
Urban Meyer predicts changes
Updated odds are in
South Carolina QB signs NIL deal to return
By clicking "Subscribe to Newsletter", I agree to On3's Privacy Notice, Terms, and use of my personal information described therein.
The new College Football Playoff format certainly keeps the regular season interesting for longer for a broader swath of teams. That’s just the nature of the operation with more teams getting in.
Of course, it doesn’t necessarily instantly produce compelling playoff games.
“Some of the games were awful,” Meyer noted.
So how does the conundrum get solved going forward? Well, there’s a tug of war going on between anticipating what the committee might do versus reacting to what it already has done.
That’s where Meyer’s second point comes in. The teams themselves may adjust to bolster their College Football Playoff odds.
“I think if you don’t play someone and you’re a lesser team you won’t get in,” Meyer said, reiterating his first point before moving on. “The second is, and I think we’ve discussed this before, why would you ever play a tough team in the opening game? Why would you do that? You look at Tennessee. Tennessee had one of those ridiculous preseason schedules. They did play NC State, but they played UTEP, Chattanooga and Kent State. So college football fans, get ready for some 50-7 games in the preseason.”
Finalizing deal to be college HC
Miami HC set to step down
Urban Meyer predicts changes
Updated odds are in
South Carolina QB signs NIL deal to return
© 2024 On3 Media, Inc. All rights reserved. On3 is a registered trademark of On3 Media, Inc.

source

Publié le Laisser un commentaire

WATCH: Jennifer Lopez and Her Security Asks Paparazzi to Give it a Rest for Christmas – The Source Magazine

The Magazine of Hip Hop Music, Culture and Politics
Paparazzi knows no days off. Jennifer Lopez and her security had enough.
While strolling the streets, security approached a paparazzi member and asked them to get one good picture and go. It’s Christmas, after all.
Walking with her children, Lopez also said goodbye and wished a Merry Christmas. You can see it below.
Jennifer Lopez’s security begs the paparazzi to leave her and her kids alone on Christmas

🎥: thedailystardust/Youtube pic.twitter.com/F6YqIDFSgr

source

Publié le Laisser un commentaire

Chega accuses the government of hiding the nationality and religion of criminals – Madeira Island News Blog

Chega today accused the Government of the Republic of hiding information that it considers crucial in relation to criminals, namely their nationality, religion, ethnicity and document status. This accusation arises from the “lack of will demonstrated by the current government to revoke a statement from the Council of Ministers of the previous government, which determined that the security forces – PSP, GNR and Polícia Judiciária – as well as the media, should not identify these individuals in public records and communications”.
For Francisco Gomes, a member of parliament elected by CH-Madeira, this constitutes an “unacceptable cover-up maneuver, which compromises transparency and reinforces the climate of insecurity” in the country. The parliamentarian also considered the strategy an attack on the integrity of information and the right of citizens to know the reality that surrounds them.
“This deliberate concealment of the nationality and religion of criminals aims to perpetuate a state of ignorance in the population, which is robbed, raped and attacked daily, while the government, complicit in its omission, limits itself to camouflaging the truth so as not to be confronted with the disaster that has been uncontrolled immigration”, considers the deputy to the Assembly of the Republic.
Furthermore, criticism is also directed at the “open door policy”, something that, in his view, undermines national sovereignty and exposes the country to risks. In this sense, he accused the government of flagrant negligence in its responsibilities to guarantee the security and stability of communities. 

The CH believes that the Government is abandoning the Portuguese people to their own fate, “in an environment of growing insecurity”. “The government should be ashamed of itself for allowing the country to sink into this scenario of chaos, in which citizens’ rights are ignored in the name of an irresponsible ideological agenda, which treats criminals as poor souls. It is imperative to reverse this madness and adopt a policy that values ​​borders, national identity and security”, concludes the Madeiran MP.
From Diário Notícias

This site uses Akismet to reduce spam. Learn how your comment data is processed.
Enter your email address to subscribe to this blog and receive notifications of new posts by email. Don’t worry, I also hate spam.


A password will be e-mailed to you.


source

Publié le Laisser un commentaire

Internet Archive Breached Again—Third Cyberattack In October 2024 – Forbes

Encryption your data. Binary code and digital Lock. Hacker attack and data breach. Big data with … [+] encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration
At the end of this article, you will find explanations of the key technical terms used, such as DDoS attacks, access tokens, and phishing to help clarify the details of the breaches.
The Internet Archive has confirmed a third security breach on Oct. 20 in what has become a series of escalating cyberattacks. Hackers were able to exploit unrotated Zendesk API tokens to gain access to the platform that manages the archive’s support tickets.
Despite previous warnings and multiple breaches earlier this month, the organization had not adequately secured the system, leaving the tokens vulnerable to continued exploitation. The attackers were still able to access and potentially download sensitive support data, including personal identification documents submitted by users.
This breach follows two major attacks earlier in October, which have compounded the damage to the organization’s infrastructure.
The Internet Archive is a nonprofit digital library that was established in 1996 by Brewster Kahle with the goal of providing “universal access to all knowledge.” It is widely known for its Wayback Machine, which archives websites and allows users to view them as they appeared in the past, making it a valuable resource for historians, researchers and the general public.
Beyond websites, the Internet Archive hosts millions of digital items, including books, music, audio files, videos and software. This vast collection preserves cultural and historical materials that might otherwise be lost. The organization operates primarily on donations and has played an essential role in maintaining digital history.
The first breach occurred on October 9 involving a dual attack — a data breach and a Distributed Denial of Service (DDoS) attack. Hackers took advantage of a previously exposed GitLab token, which had been vulnerable since late 2022, to access the Internet Archive’s source code and steal user data. This breach affected 31 million users, exposing Bcrypt-hashed passwords, email addresses, and other sensitive information.
Simultaneously, a pro-Palestinian group called SN_BlackMeta launched a DDoS attack that overwhelmed the Archive’s servers with traffic, temporarily taking the site offline. Although these attacks happened at the same time, the data breach and the DDoS attack were conducted by different groups​.
In mid-October 2024, the second breach occurred when hackers once again exploited unrotated access tokens, this time gaining unauthorized access to the Internet Archive’s Zendesk support platform. These tokens, which act as digital keys, were supposed to have been secured after earlier warnings but remained exposed.
The attackers accessed thousands of support tickets dating back to 2018, which may have included personal identification documents. This breach exposed a critical flaw in the Archive’s security practices, particularly its failure to rotate API tokens regularly.
This most recent breach occurred when hackers continued to exploit unrotated Zendesk API tokens. These tokens, essentially digital keys, had been exposed in previous attacks, but the Internet Archive failed to rotate or replace them.
This allowed attackers to maintain access to the Archive’s Zendesk support platform, where sensitive user support tickets were stored. Some of these tickets contained personal identification documents submitted by users requesting the removal of content from the Archive’s services​.
This third breach can be traced directly back to vulnerabilities exploited during the first two breaches:
The first major breach saw hackers taking advantage of a GitLab token that had been left exposed since late 2022. This token allowed the attackers to access the Internet Archive’s source code and steal sensitive data, affecting 31 million users. Simultaneously, a DDoS attack by a separate group, SN_BlackMeta, disrupted the site. While this attack primarily targeted the organization’s user data and source code, it highlighted significant weaknesses in the Internet Archive’s security practices, including token management​.
In the second breach, hackers shifted their focus to the Internet Archive’s Zendesk support platform, where they exploited unrotated access tokens. These tokens, which should have been updated following the initial breach, granted unauthorized access to support tickets containing sensitive personal data from users.
The third breach is a direct consequence of the same root problem that led to the first and second attacks: the failure to properly manage and rotate access tokens. This allowed the attackers to repeatedly exploit the same vulnerabilities and maintain access to sensitive areas of the Internet Archive’s systems. Each subsequent attack built upon the gaps left unresolved by the previous breach, compounding the damage.
The motivation behind these breaches appears to be reputational rather than financial. In underground hacker communities, attackers often seek “cyber street cred” by breaching well-known organizations and leaking large amounts of data.
The Internet Archive, being a significant well-known repository of digital information, was a prime target for hackers looking to build their reputations. Although no ransom demands were made, the stolen data poses risks for phishing attempts and identity theft​.
At the time of publishing, I have been unable to contact the Internet Archive for comment, but the official X account posted the following on October 19:
The phrase “I stand with @internetarchive” has been circulating on X (formerly known as Twitter) as a show of support for the Internet Archive in light of its recent cyberattacks.
By tweeting “I stand with @internetarchive,” individuals are expressing solidarity with the organization’s mission to provide free access to knowledge and preserve the digital record of the internet. The phrase has become a sort of rallying cry for users, researchers and digital rights advocates who believe in the importance of the Internet Archive’s work for future generations.
According to its website, “The Internet Archive (archive.org) is a 501(c)(3) non-profit that was founded to build an Internet library, with the purpose of offering permanent access for researchers, historians, and scholars to historical collections that exist in digital format. Founded in 1996, the Internet Archive has an historical web collection (the Wayback Machine) of over 150 billion web pages, about 240,000 movies, over 500,000 audio items (including over 70,000 live concerts), over 1,800,000 texts, 1600 education items, and over 30,000 software items. And we’re growing bigger every day!”
For information on how to donate to the Internet Archive, it has a page explaining exactly how to do that.

One Community. Many Voices. Create a free account to share your thoughts. 
Our community is about connecting people through open and thoughtful conversations. We want our readers to share their views and exchange ideas and facts in a safe space.
In order to do so, please follow the posting rules in our site’s Terms of Service.  We’ve summarized some of those key rules below. Simply put, keep it civil.
Your post will be rejected if we notice that it seems to contain:
User accounts will be blocked if we notice or believe that users are engaged in:
So, how can you be a power user?
Thanks for reading our community guidelines. Please read the full list of posting rules found in our site’s Terms of Service.

source