DA eyes importing ‘galunggong’ anew Golden State Warriors’ Stephen Curry, right, drives the ball against Houston Rockets’ James Harden during the second half of Game 5 of a second-round NBA basketball playoff series Wednesday, May 8, 2019, in Oakland, Calif. (AP Photo/Ben Margot)HOUSTON — In the Western Conference finals last season, the Houston Rockets had home-court advantage and took a 3-2 lead over the Golden State Warriors before Houston star Chris Paul went down with a hamstring injury that kept him out for the rest of the series.As these teams prepare for Game 6 of the conference semifinals Friday night, the Warriors find themselves in almost the same situation Houston was in last year.ADVERTISEMENT The Rockets are 5-0 at home this postseason and went 31-10 at the Toyota Center in the regular season.As the Warriors look to move on without Durant and the more than 34 points a game he’s averaged this postseason, they know no one player can make up for his absence in this series where each game has been close.“The series has been a battle,” Klay Thompson said. “Each game, such little margin for error. We know we’re going to have to be near perfect to go down to the Houston without Kevin and win a game. It’s going to be hard.”The Warriors will need Thompson to build on what he did in Game 5 after he shook off a couple of tough games to make 5 of 10 3-pointers and lead the team with 27 points.“I’m never going to waver with my confidence when it comes to shooting … but it’s the playoffs,” he said. “There are going to be plenty of ups and downs. We’ve done this so many times. We’re not going to lose confidence over a couple bad shooting nights. That’s the way the basketball gods can be. Last week just wasn’t my best games. Hopefully I can rebound with a great one on Friday.”ADVERTISEMENT UST pride: Cherry Rondina is UAAP Season 81 MVP, Eya Laure is Rookie of Year MOST READ PRESSURE IS ON: Paul. The Rockets need Paul to step up after the nine-time All-Star struggled in Game 5. Paul managed a playoff-low 11 points on 3 of 14 shooting and went 0 for 6 on 3-pointers. He said Houston can’t worry about its missed opportunity on Wednesday night and must look forward.“We just got to be better,” he said. “We got to rebound. Let this one go … it’s over and done with. We can’t get it back. We got to go back home and take care of Game 6.”Sports Related Videospowered by AdSparcRead Next Cayetano: Senate, Drilon to be blamed for SEA Games mess If the Rockets hope to force the series back to Oakland for Game 7 on Sunday night, reigning MVP James Harden will have to be more aggressive after scoring just five points in the fourth quarter of Wednesday’s loss.But Harden believes good defense will be the key to keeping this series going.“Defensively is how you win the series,” he said. “It’s plain and simple. You can’t … nitpick, overanalyze the game. You got to get stops in order to put yourself in a position to win. It’s pretty simple.”Some things to know about Game 6 on Friday night.WARRIORS AT ROCKETSGolden State leads 3-2. Game 6, 9 p.m. EDT, ESPN.PRESSURE IS ON: Curry’s Shot. Stephen Curry is still trying to find a shooting rhythm and it hasn’t been fun for the two-time MVP. Not that he’s lost any confidence in letting it fly — from anywhere. Without Durant, his scoring contributions become even more important. Curry had another rough shooting night in Game 5, going 9 for 23 and 3 of 11 on 3s to still finish with 25 points.“I thought I was aggressive the whole game. I just missed shots,” he said. “Again, that’s going to happen. Right before KD got hurt I missed a layup right at the rim, a wide-open three in transition. That was, like, the lowest point of the game for me in terms of just searching. But when he went out, got the ball in your hands, initiate the offense, shots went in. Again, it’s all about not losing confidence in yourself, just find a way to find any type of life on the offensive end.”INJURY WATCH: Durant didn’t make the trip to Houston, remaining in the Bay Area to receive treatment for his injury. The Warriors said he’ll be re-evaluated next week.KEEP AN EYE ON: Rebounds. Through the first five games, the team which has led in rebounds has won the game. Offensive rebounds have been particularly important with P.J. Tucker’s work in that area in Games 3 and 4 helping Houston close out both games. Tucker has had at least 10 rebounds in the last four games. The Warriors are just a win away from advancing to the conference finals for the fifth straight time, but will have to do it without NBA-playoffs leading scorer Kevin Durant, who will miss the rest of the series with a strained right calf.The two-time defending champions took advantage of Paul’s injury in 2018 to win two straight after falling behind 3-2 and eliminated the Rockets on their home court to advance.FEATURED STORIESSPORTSPrivate companies step in to help SEA Games hostingSPORTSPalace wants Cayetano’s PHISGOC Foundation probed over corruption chargesSPORTSSingapore latest to raise issue on SEA Games food, logisticsThe Rockets don’t want to see Golden State celebrate a series victory on their home court again and are determined to bounce back after Wednesday night’s loss to avoid being eliminated by the Warriors for the fourth time in five seasons.“I am a competitor and this team is competitive, we have to go down and win,” Houston’s Eric Gordon said. “We know the situation and we have to go back home and win and that is going to be our mentality. We’ve always done well at home and we just have to keep it that way.” View comments PH underwater hockey team aims to make waves in SEA Games PLAY LIST 02:42PH underwater hockey team aims to make waves in SEA Games01:44Philippines marks anniversary of massacre with calls for justice01:19Fire erupts in Barangay Tatalon in Quezon City01:07Trump talks impeachment while meeting NCAA athletes02:49World-class track facilities installed at NCC for SEA Games02:11Trump awards medals to Jon Voight, Alison Krauss Ethel Booba twits Mocha over 2 toilets in one cubicle at SEA Games venue Hontiveros presses for security audit of national power grid Private companies step in to help SEA Games hosting Philippine Arena Interchange inaugurated LATEST STORIES Panelo: Duterte ‘angry’ with SEA Games hosting hassles Don’t miss out on the latest news and information. SEA Games hosting troubles anger Duterte
“What are the true expectations of end users that we need to consider before launching a certain product or service? We would obviously know a certain percentage of them but not entirely. This isn’t something that we should dwell on because as we progress CameronRobertson says: Leave a Reply Cancel reply You must Register or Login to post a comment. This site uses Akismet to reduce spam. Learn how your comment data is processed. Continue Reading Previous Designing in portabilityNext The search for ultra-low cost IoT: How low can we go? February 26, 2019 at 11:12 am The most obvious IoT-security threats are illustrated by several recent IoT attacks. Each attack occurs in a well-understood context such as commissioning a gateway to a service, adding users and devices, or device operation. Each stage has well-documented mitigations against the threats. Attackers nonetheless exploit simple and well-documented flaws in poor products.Figure 1: IoT Device Lifecycle (Source: Greenwave) #1 Mirai-based IoT Botnets Recent large-scale “IoT botnet” attacks exploit well-documented problems like commissioning using a well-known password. From this poor, well-document flaw, Mirai malware infected HD video cameras and players. It used “UPnP Firewall Traversal” in home routers to get outside-in access. A botnet can easily recruit a device that runs with a well-known password and automatically opens the home firewall. Last fall, these botnets directed HD video streams from their “owned” devices against the websites of Krebs on Security, Dyn, and others, effectively denying access to them for extended periods of time in a large-scale distributed denial of service (DDoS) attack.This Mirai botnet exploited commissioning flaws in retail video devices; another exploited an operations-management flaw in 900,000 European service-provider gateways that were successfully attacked through their management service. Once again, a well-known password is the problem and “secure commissioning” is the cure that protects the device with a properly-constructed, secret password or other strong authenticator to device login. This is widely practiced by all but a few vendors that instead dump poorly-designed products onto the Internet market.#2 Adding Users and User Privileges The obvious lesson from the IoT botnet is that network products such as cameras and home routers must restrict access by outsiders. This is basic to IoT devices. But IoT services are more complex and have multiple user roles and privilege levels beyond the single “admin.” For example, all family members may be allowed to check the battery levels of devices such as door locks, but only Mom can change the door-lock code. An IoT door lock is often on a specialized battery-powered network, and users connect to it through a gateway. IoT platforms such as Samsung SmartThings have gateways to specialized networks like Z-Wave and ZigBee – each with their own device interface and privileges. Uniting multiple interfaces into one is done by a “semantic gateway,” which is embedded in an IoT hub, residential gateway or other network device. Figure 2: Semantic Interoperability between IoT Products (Source: Greenwave) In the figure above, a door lock has a single privilege level: “admin” has full access to change the door-lock code, check the battery and read a log of when the door was opened or code changed. But the IoT app on the user’s smartphone has a richer interface with more users, roles and privileges: The user interface to the “Semantic Gateway” has one privilege level to change the code (high privilege) and another to check the battery (low). Users and privileges are mapped to the IoT device interface, which is more primitive. Thus, there is a risk of “privilege escalation” if a bug allows a user with rights to read the battery to change the code. Security researchers demonstrated privilege escalation in one commercial IoT platform in a lab using a specially-crafted – but otherwise ordinary – Android app. This is a big threat: semantic gateways are big in IoT; often there’s no single fix to “privilege escalation” whether it’s a bug in the design, in a standard or single implementation. Regardless, vulnerability analysis is needed to catch the problems before they are released; training and secure development processes are needed to catch the problems before they are introduced into software or hardware. Log in to Reply #3 Adding Devices: How ZigBee Lost its Network Key One way to mitigate privilege escalation, therefore, is security testing before deployment, particularly of semantic gateways. These products commission IoT devices onto a specialized IoT network. Because many IoT devices and networks are optimized for efficiency and not functional richness, security differs on each, and some are insecure. Today, for example, a hacked device can impersonate a ZigBee ZLL device with a stolen key.Newer systems like Apple Homekit, Z-Wave S2, and Zigbee/Thread use elliptic-curve cryptography and user-based commissioning, instead of a pre-shared secrets. They are secure, but the majority of legacy IoT products on the market are not.#4 Operating a Public Baby Cam The mitigation to disclosing device secrets, therefore, is to follow published, best-practices cryptography when cryptography is needed. That applies to data encryption. The poster child for unsafe data handling is a baby-cam that sends plaintext video on unencrypted networks like open Wi-Fi. Video from a child’s bedroom should not be available to neighbors or Internet stalkers. Similar flaws exist in video doorbells. All network data needs to be encrypted.Network encryption is necessary but not sufficient for IoT privacy. IoT gateways, border routers, hubs and other “middleboxes” expose data between encrypted connections. Network-connection security (such as SSL or TLS) ends at the IoT or cloud gateway that receives data on one TLS connection, processes the unencrypted data, and sends them on a second TLS connection. More message data is exposed than need be during processing, which violates the principle of least privilege and leaks private information. Good security practice forbids it and offers end-to-end message-level encryption to enforce it. Message-level encryption is an emerging technology in IoT security.Meeting a Minimal Standard and Raising the Bar Unlike other services, IoT includes specialized edge devices that run on low-powered and lossy networks. These have their own unique security methods – or none at all. Unlike smartphones and PCs, most IoT edge devices lack screens or rich user interfaces, which makes methods like secure commissioning harder to do. Secure commissioning procedures can be challenging to design and implement, but many products have done so and how to do it is well documented for any vendor who cares to look.Several recent attacks exploit risks from substandard products that run with an well-known password or mishandle unencrypted data. These problems need not occur and should be addressed by regulation, liability laws, or industry self-policing. Whatever the solutions to today’s problems, however, we can expect that IoT attacks will become more sophisticated as defenses become more effective. Mark Baugher is the Principal Security Engineer at Greenwave Systems, a leading international IoT software provider and services integrator partnering with Verizon, TCP, NXP, IBM, E.On, and others. Mark is a highly regarded IoT security engineer having created and patented multiple technologies that played a major role in driving a smart connected future. Mark is a published thought leader and well-respected speaker at industry events (CES, IEEE Conferences, ACM International Conferences, etc.). He holds a BA degree in Economics from the University of Missouri-Kansas City and an MA degree in Computer Sciences from the University of Texas at Austin.Share this:TwitterFacebookLinkedInMoreRedditTumblrPinterestWhatsAppSkypePocketTelegram Tags: Consumer, Medical, Security UdyRegan says: “We need to know what to expect before we can commit to the usage of a certain technology. Without much info about it, there isn’t a basis that we can rely on to know what to expect or what not to. There are things to grasp and to evaluate in order to know Log in to Reply December 10, 2018 at 4:07 am 2 thoughts on “Recent IoT threats and lessons learned”
zoom NYSE-listed tanker owner and operator Overseas Shipholding Group (OSG) suffered a full-year net loss of USD 293.6 million in 2016, compared with a net income of USD 284 million seen in 2015. Following the spin-off of the company’s businesses, a net loss from continuing operations for the full year 2016 was USD 1.1 million, compared with a net income of USD 80.6 million for 2015.The decrease was mainly due to vessel impairments in the second half of 2016, and reductions in interest expense due to the company’s debt reductions in the second half of 2015 and in 2016.Furthermore, adjusted EBITDA was USD 176.2 million in 2016, an increase of USD 8.1 million compared with 2015, driven primarily by lower general and administrative expenses, partially offset by the decline in time charter equivalent (TCE) revenues.TCE revenues amounted to USD 446.2 million in 2016, a drop of USD 2.9 million compared with 2015. The decrease was attributed to lower average daily charter rates earned by OSG’s Jones Act fleet.In late-November 2016, OSG completed the process to separate the company into two independent businesses – Overseas Shipholding Group and International Seaways (INSW).OSG retained the US business while INSW took over OSG’s former international business.“We … successfully executed on our strategic goal of streamlining our operating structure and enhancing our focus by completing the spin-off of International Seaways,” Sam Norton, OSG’s President and CEO, said.“Going forward, OSG will be a diversified US Flag shipping company with a trusted operating franchise and a leading portfolio in the Jones Act market,” Norton further said, adding that the company is well-positioned for future growth opportunities.As of March 7, OSG’s fleet is comprised of a total of 24 vessels.
Camp Southern Ground announces the completion of the Peterson Dining Hall, designed by Perkins + Will, with construction by DPR and Structor Group.Peterson Dining HallCredit/Copyright: Tim HurlseyThis marks the completion of a signature component of the build-out on the growing campus.Camp Southern Ground is located on over 400 acres in Fayetteville, Georgia, and is the non-profit passion project of three time GRAMMY Award-winning artist Zac Brown of the Zac Brown Band.Inspired by his own experience as a camp counselor, Zac’s vision is to create a state-of-the-art facility that is more than the typical camp experience. Camp Southern Ground’s mission is to provide extraordinary experiences for children to recognize and magnify the unique gifts within themselves and others to profoundly impact the world. While at camp there will be activities to challenge, educate and inspire campers, with a special emphasis on children with Autism Spectrum Disorder (ASD), learning and attention issues like ADD, ADHD and Dyslexia, social or emotional challenges, and those with family members serving in the military.Located in the center of the campus, the Peterson Dining Hall was tasked with being the heart of Camp Southern Ground.“Peterson Dining Hall is the heart of Camp like the kitchen is the heart of Home. Zac told us that he wanted an iconic building unlike any other, as the centerpiece of Camp – a building that signals to the kids upon arrival that they are in a unique and special place transcending everyday experiences,” says Chris Sciarrone of Perkins + Will.As the first major build-out to the campus, Camp Southern Ground can now begin work towards completion of more projects to prepare for a Summer 2018 opening.“We are thrilled to have the Peterson Dining Hall completed. It is a major functional component of our camp programs and really sets the tone for architectural design, construction quality and sustainability. Now, having the dining hall completed, this puts us one step closer to being able to open for week long, overnight camps which is slated for summer of 2018,” said Mike Dobbs, President and CEO of Camp Southern Ground.The Peterson Dining Hall includes some very special features and is comprised of materials in which the majority was sourced locally. The ceiling is also made from sustainably harvested Mahogany wood donated by Bob Taylor of Taylor Guitars, and the focal point of the dining hall is the 26-foot-high brick fireplace.The state-of-the-art dining hall will serve up to 300 campers plus 150 counselors, staff and volunteers during the summer camping sessions, and has the capacity to serve well over 400 for special events, meetings and conventions in the off season.The structure is not only a modern work of art, but its sustainable features and architectural innovations will enhance energy efficiency as well as support the mission of the camp’s certified organic farm and nutritional education. For instance, from the geothermal system that will heat and cool the building, to the natural zinc building envelope, and the low energy, renewable building materials, this building will save more energy over time. An example of its design innovation is seen in the custom grinder and extractor which converts as much food waste as possible from the kitchen into compost for the farm, while minimizing what goes to the landfill.The Peterson Dining Hall is available to rent for special events and conventions. For more information please contact [email protected] Southern Ground is currently in its second phase of fundraising. To learn more or to donate please visit campsouthernground.org.
Facebook Twitter Google+LinkedInPinterestWhatsApp Related Items:move-athon, Nutrition in Demand Nutrition in Demand summer camp Cinderellas will dance with their Fathers again; Nutrition in Demand hosts Recommended for you Facebook Twitter Google+LinkedInPinterestWhatsAppProvidenciales, 12 Jan 2015 – Another great year and great turn out for Move A Thon 2015. “It was great, we came out as a whole family all five of us from the parents down; 18, 10 and a four year old. We did it together and it was good fun.” Move A thon featured a 5k, 10k and half marathon for all movers… proceeds are to aid the healthy eating programs in our schools by Nutrition in Demand. MOVE A THON 2015 GETTING STRONG SUPPORT; MORE WELCOMED