New Delhi: The Dr Rajendra Prasad Centre for Ophthalmic Sciences at AIIMS in collaboration with IIT Delhi is exploring the feasibility of using drones for transporting corneal tissue from areas in Delhi-NCR lacking eye-transplant facilities to places where such surgeries are available.Head of Cornea Services at RP Centre and Chairman of the National Eye Bank, Jeewan S Titiyal said that similarly, drones can be used for transporting processed corneal tissues to various centres here where patients are awaiting surgeries. Also Read – After eight years, businessman arrested for kidnap & murder”We are considering the proposal which is at a nascent stage. We will soon write to IIT Delhi in this regard. As a pilot project, these drones would serve Delhi-NCR,” he said on Tuesday. On the occasion of the 34th National Eye Donation Fortnight celebrations (from August 25-September 8), he said the National Eye Bank (NEB) at AIIMS collected a record number of corneal tissues last year with 2,234 donor corneas being retrieved, the highest in the past 50 years. Also Read – Two brothers held for snatchings”Out of them, 1,426 were transplanted, a utilisation rate of 65 per cent which is above the national average,” Titiyal said. Highlighting that not all donated corneas are suitable for transplant, Tushar Agarwal, Professor of Opthalmology at the RP Centre, AIIMS stressed on the importance of timely retrieval of eyes for transplantation. “In an ideal situation, the eyes should be donated within six hours of death to ensure best possible surgical outcome in patients receiving the donated corneas,” Agarwal said. Once the corneas are retrieved, they undergo a rigorous processing procedure whereby they are screened for various infections, including HIV, hepatitis and STDs, he elaborated. “Only when one we are assured that they are safe for transplant, we use them on the recipient patients. If it is found to be unhealthy or carrying infection, then we don’t use it,” Agarwal added. Titiyal said in the first six months of 2019, 1,247 corneas were collected, out of which 942 were utilised. “We are looking at achieving 3,000 donor tissue collections and getting more than 2,000 transplants in a year,” he stated. Namrata Sharma, Secretary Eye Bank Association of India and Professor of Opthalmology at RP Centre, said that nationally 57,996 corneas were collected in 2018 and there have been 26,682 transplants (29 per cent growth from 2012), which amounts to an average 46 per cent utilisation.
Live video can be seen here: www.facebook.com/APTNNationalNews/More to come … APTN National NewsDramatic images emerged from a state highway in North Dakota as riot-gear clad police and national guard soldiers, backed up by armoured personnel carriers, helicopters and sound cannons moved on a Native American led protest against the construction of a pipeline.APTN reporter Dennis Ward, who is at the scene, reported police began to arrest demonstrators in the late afternoon.Livestreamed video showed police lines moving into one of the demonstrator’s camp which was used as a launching point for rolling highway blockades. The camp was set up to stop the construction of the pipeline through the territory. The video also captured police firing beanbags at demonstrators and spraying others with pepper spray.Police officers, from what appeared to be several states, moved against the demonstrators who had been rolling blockades on Hwy 1806 in an attempt to stop construction of the North Dakota Access Pipeline.At one point demonstrators set bales of hay and tires on fire as a line of police moved toward the blockade positions. A voice from the police lines could be heard over livestreamed video telling demonstrators to move back.Close-up images of the police line showed officers wearing shield masks, carrying batons, pepper spray canisters and duct tape.Demonstrators facing the police line could be heard whooping and cheering.“This is our land!” said one demonstrator, on one of the livestreams of the situation. “The world is watching.”At one point, a demonstrator started signing the Star Spangled Banner, the U.S. national anthem.Another demonstrator shouted, “Genocide.”Dennis Ward reported the women elders involved in the demonstration were urging the front line of the protest to fall back and protect their camp.The Morton County Sheriff’s Department issued a warning Wednesday it had the equipment and numbers to end the ongoing demonstrations.-More to come
The locations of Ontario’s first four provincially run cannabis stores have been announced.The Liquor Control Board of Ontario and the Ontario Cannabis Store say the shops will be in Guelph, Kingston, Toronto and Thunder Bay.The agencies say the locations comply with local zoning rules, minimize proximity to schools and factor in where illegal dispensaries are currently operating.Forty stores are expected to open this year and another 40 by July of next year. In total, the province plans to set up roughly 150 standalone cannabis stores by 2020.Ontario was the first province to announce a detailed plan to sell and distribute recreational marijuana and will set the legal age to purchase it at 19.The federal government introduced legislation last April with a goal of legalizing and regulating the use of recreational pot by this summer, but left it up to individual provinces to design their own distribution system and usage regulations.
Rabat – Japan granted Morocco, on Monday in Rabat, a donation of 31 million dirhams to carry out the project of improving security equipment.Inked by interior minister Mohammed Hassad, Japan’s extraordinary and plenipotentiary ambassador to Morocco Tsuneo Kurokaxa, and JICA resident representative in the Kingdom, this agreement is meant to reinforce the material capacities of the interior ministry through providing high-performance security and control equipment.This funding, which is part of Japan’s non-refundable financial cooperation, is aimed at strengthening the surveillance system in the Casablanca’s Mohammed V airport. Spanning 21 months, this project seeks to supply security and control material to equip Moroccan airports and promote security.Since its setting up in Morocco, JICA contributed to funding 34 projects in Morocco for an amount of over 2.6 billion dollars and a non-refundable financial support of 345 million dollars.
The acclaimed actress Mia Farrow leaves for Guinea tomorrow in her real-life role as United Nations Children’s Fund (UNICEF) Goodwill Ambassador to boost funding for maternal and child health in a country where youngsters are among those most seriously hurt by recent political and economic turmoil. “The resurgence of deadly childhood diseases and the rise in the number of school drop-outs are storm warnings,” UNICEF country representative Julien Harneis said ahead of Ms. Farrow’s five-day visit. “The future for children in this country will be even worse if there is not more investment, and bigger efforts to respond to their needs.”Repeated shocks since 2006 have weakened basic social services, making children even more vulnerable. Presidential elections are now scheduled for 27 June as part of an effort to restore stability after the most recent unrest when military forces, which seized power in a 2008 coup after the death of long-time president Lansana Conté, opened fire on unarmed protesters at a rally last year, killing at least 150 people.During her mission, which will take her to Conakry, the capital, and Nzerekore, Kissidougou and Koyoma in the Forest Guinea region, Ms. Farrow will visit a number of health facilities to highlight the need for sustained investment in maternal and child health. She will also deliver new medicine kits to the health ministry to help efforts to ensure that essential drugs are available at primary health-care centres. Ms. Farrow, who focuses on children impacted by conflict, will also meet with youth groups and launch a UN Peacebuilding Fund project that seeks to encourage young people to find peaceful ways to resolve conflicts and lessen their risk of being caught up in violence.“Too many people in Guinea have experienced violence at first hand, and it is intended that the visit will also include meetings with women who have experienced sexual and domestic violence,” UNICEF said in a news release on the trip which will also focus on education. Ms. Farrow will see how a lack of investment in past years has led to overcrowding in classrooms. She will also see some of the solutions available to ensure active learning. 4 May 2010The acclaimed actress Mia Farrow leaves for Guinea tomorrow in her real-life role as United Nations Children’s Fund (UNICEF) Goodwill Ambassador to boost funding for maternal and child health in a country where youngsters are among those most seriously hurt by recent political and economic turmoil.
The United Nations Subcommittee on Prevention of Torture is set to carry out its first visit to Sri Lanka from 2 to 12 April to examine the treatment of people deprived of their liberty and the safeguards in place for their protection against torture and ill-treatment.The four-member delegation will meet Government officials and hold discussions with relevant ministries, as well as meeting with the Human Rights Commission and civil society organisations. The Subcommittee will be visiting places of deprivation of liberty and will hold discussions on Sri Lanka establishing an independent National Preventive Mechanism. Their talks in Colombo will focus on advising and assisting the Sri Lankan authorities regarding the measures they must take to be in compliance with the obligations contained in the Optional Protocol to the UN Convention against Torture. The Optional Protocol, which Sri Lanka ratified in 2017, requires such a mechanism to be established with the authority and capacity to undertake preventive visits to any place where persons may be deprived of their liberty.“During our visit we will be exploring the steps Sri Lanka needs to take to effectively prevent torture and ill-treatment of people deprived of their liberty,” said Victor Zaharia, who will head the delegation. “We will also advise the authorities on the full implementation of their treaty obligations, including how they can best establish a national independent body to visit places of detention.” The delegation will be composed of Victor Zaharia, Head of Delegation (Republic of Moldova), Satyabhooshun Gupt Domah (Mauritius), Petros Michaelides (Cyprus), and June Lopez (Philippines). (Colombo Gazette)
All EU members are required to have implemented the “qualification directive,” which establishes minimum standards for qualifying for refugee status or other forms of protection, by tomorrow. Pirrko Kourula, Director of the UN High Commissioner for Refugees’ (UNHCR) Europe Bureau, said the new directive should serve as the foundation for an emerging continent-wide system of granting asylum. “This is very much needed, for although every asylum application must be examined on its merits, the chance of finding protection in the EU ranges from zero to over 80 per cent for certain nationalities, depending on where they apply,” she said. Ms. Kourula described the directive as “not a perfect instrument. It only sets minimum standards which EU member states are free to surpass. We encourage them to offer the highest standards of refugee protection.” UNHCR remains dissatisfied with some of the directive’s provisions, regarding them as too narrow or restrictive. One example is the definition of subsidiary protection, which applies to people who do not fall under the 1951 UN Refugee Convention but nevertheless are considered to be facing “serious harm” in their countries of origin. Yet Ms. Kourula noted the directive confirms that acts of a gender-specific nature can constitute persecution, and that individuals may need protection regardless of whether they face persecution by States, warlords, militias or other private actors.
Modern society is overwhelmingly dependent on power consumption, and a lot of that power is being consumed on-the-go. Rechargeable batteries based on lithium-ion technology have been a big part of the mobile revolution, and they’re increasingly showing up in cars and even airplanes. So that means they must be completely safe, right? Actually the Boeing 787 proves that Li-ion batteries still blow up on occasion, as did an incident this week when a Samsung Galaxy Note battery caught fire in a man’s pocket. Why haven’t we solved the problem?Battery technology has been pushed over the years, but no incredible breakthroughs have come along. Instead, we see the same rechargeable cells packaged differently, shrunken down, and packed in more tightly. This makes more energy-dense batteries, but when something goes wrong it’s a much bigger deal.A defective or improperly-handled battery can overheat, causing the cells to break open and result in a chain reaction of other cells rupturing. This is called thermal runaway, and it’s the cause of most battery explosions and, less dramatically, battery swelling. The defect can be a simple short circuit, or a design defect that improperly insulates individual cells from the heat of neighbors. That’s what causes cell phones and laptops to catch fire on rare occasions.Any Li-ion battery has the potential to go up in flames, and that’s a product of its chemistry. Lithium is used in batteries as an anode because it has extremely high electrochemical potential. That is, lithium-ion moving to the electrode produces a lot of energy. Lithium’s low atomic weight is also useful in reducing the mass of batteries.While lithium is great for making high-capacity batteries, these same properties make it highly reactive and more prone to thermal runaway. Lithium is an Alkali Metal along with sodium, potassium, and the rest of the first group of the periodic table. Not only are these elements highly flammable, but they are so reactive that tossing a few grams into water will cause an explosion. So when a Li-ion battery does heat up, the lithium in it can accelerate the breakdown of other cells.There is always the possibility that the occasional battery is going to have a manufacturing defect, or that it will be damaged, leading to a failure. However, some folks are starting to chime in on the situation with the Boeing 787. The plane has been grounded after two battery fires in recent weeks. Boeing says the design is sound, but maybe there is something more serious going on.Elon Musk, the man behind SpaceX and Tesla Motors, is talking about the differences between his Li-ion car batteries and the ones used in the 787. Whereas the Tesla battery has thousands of small cells insulated from each other to prevent thermal runaway, the 787 has batteries with eight large cells. Because these cells get warmer, they are more likely to rupture and release a lot of energy when they do. Now that Musk has broken the ice, others have agreed, including an engineering professor at MIT.So what can we take away from all this? Batteries are still very hard to engineer. Even Boeing might have made some mistakes, and it has more engineers than you can shake a slide rule at. The thing you’re carrying in your pocket could potentially catch fire, but it isn’t likely. There has to be damage or a serious manufacturing defect to turn your phone into a bomb. Just relax, and maybe check back on this 787 situation before your next flight.
15 Comments By Gráinne Ní Aodha Short URL 8,442 Views LAST MONTH, MORE than 2,000 surgeries were cancelled at hospitals across the country, according to figures released by the HSE.Of the 2,876 surgeries, 467 were cancelled at Galway University Hospital alone, representing the highest number of cancellations anywhere else in the country.This compares with 157 cancellations at Tallaght Hospital in January, and 112 cancellations at St James’s Hospital.Throughout 2016, Galway University Hospital, St James’s Hospital, Mayo General Hospital, and Mercy University Hospital Cork were the hospitals with the highest rates of cancellations – three of these are located on the west coast.In their figures, the most common reasons for cancelled surgeries were because a patient or guardian cancelled the appointment, or the consultant or team cancelled.At Tallaght Hospital for example, 766 patients/guardians cancelled their appointments, and 598 patients did not attend (out of 2,307 cancellations during 2016).During 2016, guardians/patients cancelled 2,646 appointments at Galway University Hospital, while 665 were cancelled because there was no bed available (out of a total of 5,727 cancellations during 2016).A large number of surgeries were cancelled because of a reason classed as ‘other’: at Mercy University Hospital, 887 surgeries were cancelled because of this reason. Source: Louise O’ReillyLouise O’Reilly, a Sinn Féin TD who requested the figures, said that these were “real patients who need to be seen”.“They are languishing in often tremendous pain – they simply wouldn’t be on these waiting lists if they did not require treatment.”Senator Trevor Ó Clochartaigh asked the Minister for Health to explain why far more surgeries are being cancelled in hospitals in the west than any of our other hospitals across the country.“The total of 12,454 cancellations in the hospitals in the west is appalling,” the Senator said.“Particularly as these hospitals are all working together under the umbrella of the SAOLTA hospital group, which the government trumpeted as a new model of best practice to be rolled out nationwide. These figures certainly question the prudence of going down that route.”The HSE was contacted for comment.Read: Ireland has one of the worst hospital waiting times in EuropeRead: ‘It’s too blunt’: Concerns around adding home care to Fair Deal scheme Feb 3rd 2017, 6:01 AM Image: Shutterstock/Gergely Zsolnai Share109 Tweet Email http://jrnl.ie/3219964 Image: Shutterstock/Gergely Zsolnai Tweet thisShare on FacebookEmail this article An ‘appalling’ 2,876 surgeries were cancelled last month In January, 467 surgeries were cancelled at Galway University Hospital alone – most were cancelled by patients. Friday 3 Feb 2017, 6:01 AM
Facebook Twitter: @NeosKosmos Instagram The Hellenic Studies Council has met with key South Australian politicians as part of the campaign to have Modern Greek included in the national curriculum being developed by the Federal Government.On Monday 7 June the Council met with the South Australian Education Minister, Jay Wetherill, and the Liberal Shadow Minister for Education, David Pisoni.Both sides emphasised the importance of the Greek language and culture for Australia, the need for it to be taught across the whole education system.Both Jay Wetherill and David Pisoni undertook to make representations for the inclusion of Modern Greek as one of the languages which is incorporated into the national curriculum.Present at the meetings were the Coordinator of the World Council of Hellenes (SAE) of Oceania and the Far East, George Angelopoulos, Theo Maras on behalf of the Federation of Greek Orthodox Communities, the President of the Greek Orthodox Community of South Australia, Vasilis Elovaris, the President of the Cypriot Community of South Australia, Christos Ioannou, the head of Modern Greek at Flinders University, Michalis Tsianikas, and President of AGUA, Neoklis Alexandridis.
SYRIZA’s declaration that it will attempt to force national elections in February over the successor to President Karolos Papoulias has forced Prime Minister Antonis Samaras and his aides to begin discussing when to carry out a cabinet reshuffle and whether the government should pre-empt the opposition’s move by calling snap elections itself later this year.Sources have told Kathimerini that Samaras is receiving two different sets of advice regarding the reshuffle. One school of thought is that the changes to his cabinet should happen around April, before the European Parliament and local elections in May. By that point, Greece would have got through the most challenging part of its EU presidency and the prime minister could send a signal of commitment to reforms by replacing ministers who are underperforming.However, the competing view is that a reshuffle before the elections would weaken the government’s hand as Samaras would be forced to explain why he was changing his ministers for the second time in less than a year. Also, some of Samaras’s advisers believe that the reshuffle would be useful to leave until after the May elections in case the government achieves a disappointing result.On Saturday, SYRIZA issued a statement in which it said that Samaras would not avoid a “crushing defeat” at the ballot box in May. The leftists also accused New Democracy of toying with the idea of bringing Papoulias’s second term, which is due to end in February, to an end prematurely so general elections could be called before then.On Friday night, after SYRIZA indicated it would attempt to trigger a national vote in February, Samaras said he did not want elections before 2016, when the government’s four-year term will expire.“We do not have a problem with elections happening in 2015 but Greece needs them to take place in 2016,” he said. “That is when the Greek people want them.”However, Kathimerini understands that Samaras is discussing with his advisers the possibility of calling snap polls in October. By then, any negotiations regarding debt relief for Greece and the future of its program would have been concluded. It would also be after what is expected to be another busy summer season for the Greek tourism sector. By that point, the primary surplus is also expected to have grown and the first signs of growth to have emerged.In such an event, Samaras could ask Papoulias to step down early and make the presidential succession part of the election campaign, thereby avoiding the issue from re-emerging a few months later. Source: Kathimerini Facebook Twitter: @NeosKosmos Instagram
Just before Christmas, JB HiFi’s General Manager of Musical Instruments, Nick Kanaris, decided to stock Greece’s national instrument the bouzouki in stores around Melbourne. As a bouzouki aficionado – he’s been playing from the age of ten – and a parent of children in the local Greek school, he was often the first port of call for parents and friends looking to buy this instrument. What followed exceeded his expectations – nearly all stores sold out of the Greek instrument. “I was constantly getting asked by parents – because they knew I play the instrument – ‘where could I buy a bouzouki’,” Mr Kanaris tells Neos Kosmos. He says there are only a few stores nationally where you can buy them and sourcing the instrument in Australia – a good quality bouzouki – has been difficult for anyone trying to buy one. He himself travelled to Greece early last year to purchase the instrument. Whilst there, he passionately researched bouzouki makers (luthiers) around Athens to find the right place where he could import the instrument through distributors in Australia. “There was a lot of work I did over in Greece, speaking to different luthiers and speaking to different makers, to ensure we found a product that is good quality,” he explains, “ “Because bouzoukia are 100 per cent hand-made – there are no robotics in the process so no fancy technology you get with a lot of modern guitars – so trying to get a consistent product is not easy.” Yet he is confident with the luthier they found in Athens to stock the bouzoukia in Australia, where every single bouzouki is hand checked for quality and consistency by the distributor. Having children attend the local Greek school, Nestoras College, and watching their music program expand – and that of other Greek schools wanting their children to connect with their Greek culture through music – his quest began from there. And having a passion for the instrument himself, it was just a matter of time before he stocked the instrument in stores around Australia. And so far, it’s been a smart choice for the company. “We almost sold out in a couple of stores, but it’s still at its very early stages,” he says. “We haven’t even done any advertising or haven’t been in any catalogues – it’s just been putting them in the stores.” He said prior to the bouzoukia being stocked, many people were on a waiting list to purchase the instrument – demand was that high. “Parents like myself want to maintain as much of the Greek culture as possible through our kids, but because they are hand made it’s not something that is produced very quickly.” As it stands, the Greek instruments are stocked in the Northland and Doncaster stores in Victoria, and Bankstown in New South Wales, with a view to expanding to the Northern Territory but also more stores across Australia in the future. He says the plan is to continue to have the Greek instrument in stock that will also work closely with the education department at JB HiFi. “We have a team nationally that looks after and services primary, secondary and tertiary schools all over Australia,” Mr Kanaris says. So even though the company is known for their retail stores, they are also working closely with music education for students all over Australia. Facebook Twitter: @NeosKosmos Instagram
Grippe : la vaccination recommandée pour les femmes enceintes et personnes obèsesLa direction générale de la santé (DSG) indique que les femmes enceintes et les personnes obèses font désormais officiellement partie des catégories pour lesquelles la vaccination contre la grippe est recommandée. Au vu des dernières données épidémiologiques (voir notre article), le ministère de la Santé recommande aux femmes enceintes et personnes obèses (dont l’IMC est supérieur ou égal à 30) de se faire vacciner rapidement pour éviter de contracter la grippe, dans un communiqué.Ces personnes sont donc invitées à se rendre chez leur médecin traitant. Celui-ci leur remettra un imprimé à leur nom, qui leur permettra de retirer gratuitement le vaccin en pharmacie. Cet imprimé est aussi disponible dans les caisses primaires d’assurances maladie. Pour la DSG, c’est “le meilleur moyen” pour se protéger contre la grippe.En métropole, “vingt cinq cas graves ayant nécessité une hospitalisation en réanimation ont été rapportés, 17 liés au virus A(H1N1)2009 et parmi eux deux femmes enceintes et quatre obèses. Six décès ont été observés, un confirmé A(H3N2), un confirmé B et quatre confirmés A(H1N1)2009”, selon le Haut Conseil de la santé publique cité par l’AFP. A La Réunion, l’épidémie est terminée. Au total, 13 cas de syndrome de détresse respiratoire aiguë ont été recensés, touchant cinq obèses et deux femmes enceintes. Six patients sont morts.La DGS rappelle que certaines mesures d’hygiène sont primordiales, notamment le lavage des mains. Le 30 décembre 2010 à 17:08 • Emmanuel Perrin
KUSI Newsroom KUSI Newsroom, April 3, 2019 Hit-and-run crash kills Escondido woman on Route 78 00:00 00:00 spaceplay / pause qunload | stop ffullscreenshift + ←→slower / faster ↑↓volume mmute ←→seek . seek to previous 12… 6 seek to 10%, 20% … 60% XColor SettingsAaAaAaAaTextBackgroundOpacity SettingsTextOpaqueSemi-TransparentBackgroundSemi-TransparentOpaqueTransparentFont SettingsSize||TypeSerif MonospaceSerifSans Serif MonospaceSans SerifCasualCursiveSmallCapsResetSave SettingsESCONDIDO (KUSI) – A hit-and-run crash killed a woman on a North County freeway early today.A 911 caller reported spotting the victim on the right-hand shoulder of westbound state Route 78 near Rock Springs Road in Escondido shortly before 6:30 a.m., according to the California Highway Patrol.Medics pronounced the victim dead at the scene. The 26-year-old Escondido resident’s name was withheld pending family notification.“The circumstances regarding how and why she was on the freeway are still under investigation,” CHP public-affairs Officer Mark Latulippe said this afternoon.Based on automotive debris at the site of the fatal impact, investigators determined that the involved vehicle was a green 2017 or 2018 Mercedes-Benz E-Class sedan, Latulippe said.Anyone with information about the crash was asked to call the CHP at (858) 637-3800. Posted: April 3, 2019 Categories: Local San Diego News, Traffic & Accidents FacebookTwitter
WILMINGTON, MA — On Tuesday, April 9, 2019, Wilmington High School will hold its annual 10th Grade U.S. History Fair. All students taking U.S. History have been working on a three-part differentiation instruction project since January.In the first step of the project, students learned about the reliability of using Internet sources for historical research. They completed historical research reflection and narrowed down a list of valid sources to create an annotated bibliography.After completing their research, students demonstrated their newfound knowledge in a final project (i.e. constructed project, short film, piece of literature, or a student suggested product approved by the teacher). Each 9th grade U.S. History class chose two projects to be showcased at the history fair.Prizes will be awarded in the following categories: 1st place (overall), 2nd place (overall), 3rd place (overall), Best Use of Primary Sources, Most Original, Most Knowledgeable Presenter, and Student Favorite.There are two portions of the fair. Judging and student viewing will take place in the library during W2 (10:30am to 12:30pm). At 6:30pm, there will also be an evening reception for parents and the community in our library at which time awards will be presented.Like Wilmington Apple on Facebook. Follow Wilmington Apple on Twitter. Follow Wilmington Apple on Instagram. Subscribe to Wilmington Apple’s daily email newsletter HERE. Got a comment, question, photo, press release, or news tip? Email email@example.com.Share this:TwitterFacebookLike this:Like Loading… RelatedSCHOOL COMMITTEE NEWS: Wilmington High’s New 4-Week Senior Internship Program Is A SuccessIn “Education”Wilmington Public Schools Receives $13,000 Grant To Combat Vaping At High School & Middle SchoolIn “Community”WHS Holds Powerful 9/11 Memorial Dedication CeremonyIn “Community”
With the growing trend of online dating services and apps, three in five Indian online daters are now facing security issues as these platforms have become hotbeds for cybercriminals, a new study revealed.“In India, about 38 per cent of consumers admitted to have used online dating apps at some point in their lives. In fact, currently, eight per cent of women and 13 per cent of men in India have dating apps on their mobile devices,” said the results of a study by global security software firm Norton by Symantec. Also Read – Add new books to your shelfConducted among 1,005 Indian smartphone and tablet users aged 16 years and above, the “Norton Mobile Survey” said that of those who admitted to have used online dating, nearly 64 per cent women had experienced security problems as opposed to 57 per cent of men. “While there are many legitimate daters on these apps, considering the anonymity, online daters can run the risk of becoming a victim of stalking, harassment, catfishing, identity theft, and even phishing scams,” said Ritesh Chopra, Country Manager, India, Norton by Symantec. Also Read – Over 2 hours screen time daily will make your kids impulsiveThe most concerning security issues reported include virus/malware, nuisance advertisements, cyberstalking, being tricked into using premium services, identity theft and revenge porn. The report said Delhi has the most users of online dating platforms. “Online dating apps were most likely to have been used at least once by people in Delhi, followed by Chennai, Kolkata, Mumbai and Ahmedabad,” the results showed.Ironically, while consumers in Chennai and Hyderabad find online dating low risk, they have reported experiencing most security problems. “The solution is not to panic, nor is it to stop using the apps. Online dating on mobile devices isn’t going away but there are some simple, best practices Indians can adopt to keep themselves, their devices and mobile apps secure,” Chopra added.
GraftonSunday, Aug. 49:49 a.m. Old Upton Rd. Ambulance – medical.9:54 a.m. Summerfield Dr. Ambulance – medical.4:24 p.m. Snow Rd. Scam/attempted scam.5:34 p.m. Pleasant St./Grist Mill Rd. Road hazard.10:40 p.m. Millbury St./Sean Mikeal Way. Suspicious auto.Monday, Aug. 512:44 a.m. Providence Rd. Suspicious person.1:09 p.m. Worcester St. Well-being check.6:27 p.m. Providence Rd. Ambulance – medical.Tuesday, Aug. 61:32 a.m. Grafton Com. Suspicious auto.1:38 a.m. Millbury St. Erratic operator.8:44 a.m. Alana Dr./Fitzpatrick Rd. Well-being check.9:09 a.m. Forest Ln. Ambulance – medical.11:44 a.m. Centennial Dr. Larceny/theft.2:16 p.m. Church St. Suspicious activity.5:38 p.m. Second St. Ambulance – medical.9:08 p.m. Aspen Ave. Suspicious auto.Wednesday, Aug. 712:01 a.m. Providence Rd./Summerfield Dr. Suspicious auto.4:20 a.m. Upton St. Suspicious person.10:51 a.m. Worcester St. Ambulance – medical.3:39 p.m. Nichols Dr. Suspicious activity.4:44 p.m. Mass Pike WB. Accident – personal injury.10:20 p.m. Adams Rd. Ambulance medical – EMD.Thursday, Aug. 83:43 a.m. Willard St. Disturbance – general.7:04 a.m. Old Snow Rd. Ambulance – medical.9:52 a.m. Providence Rd. Larceny/theft.9:56 a.m. Old Snow Rd. Suspicious activity.3:50 p.m. Mass Pike Accident – no injuries.9:15 p.m. Institute Rd. Vandalism.10:34 p.m. Maxwell Dr. Ambulance – medical.Friday, Aug. 91:24 a.m. Arrested, Joseph C. Fraser, 43, of 47 Shore Dr., Upton, for OUI-liquor or .08%, negligent operation of motor vehicle, marked lanes violation.6:56 a.m. Mass Pike WB. Ambulance – medical.1:14 p.m. Waterville St. Road hazard.2:01 p.m. Old Upton Rd. Parking violation.4:26 p.m. Worcester St. Larceny/theft.6:50 p.m. Providence Rd. Ambulance – medical.10:07 p.m. Providence Rd. Animal complaint.11:38 p.m. Worcester St. Harassment.Saturday, Aug. 109:33 a.m. Providence Rd. Fraud/identity theft.10:58 a.m. Suzanne Ter. Animal complaint.10:59 p.m. Leland St. Ambulance – medical.5:03 p.m. Mass Pike E. Accident – personal injury.10:38 p.m. Pleasant St./Providence Rd. Animal complaint.11:02 p.m. Providence Rd. Erratic operator.The information from the police log is obtained directly from the official records maintained at each police station in our circulation area. It contains arrests and samplings of police activity. Those arrested are innocent until proven guilty. The Community Advocate will publish news of acquittals upon notification and a copy of court-issued documentation.
Opinions expressed by Entrepreneur contributors are their own. How Success Happens Cyber breaches of mega-retailers like Home Depot and Target, health care insurers like Anthem, Premera and Excellus and federal agencies — most prominently, the Office of Personnel Management — dominate the headlines, but it’s only a fraction of the story. What most people don’t realize is that a staggering 90 percent of breaches impact small businesses. Those figures, released by payment technology solutions powerhouse First Data, highlight the seriousness of the cyber security issue for small businesses.Unlike larger organizations with revenues in the billions, small businesses might easily experience a near extinction-level event from a data breach. The recovery expenses mount quickly — credit monitoring for affected customers, lost revenue, crisis management, customer notification and investigation of the breach, just to name a few — and can create a financial loss so staggering it has the potential to crush a small business. With 2016 already on pace to see a 4.7 percent rise in the number database compromises over last year, according to data released by the Identity Theft Resource Center, members of the business community have a right to wonder if or when this seemingly never-ending assault will plateau.Related: 1 in 5 Companies Had a Security Breach, New Study Says Small businesses need to follow the 3Ms in order to navigate a most dangerous digital world. Minimize the risk of exposure; monitor networks; and have comprehensive incident response and resolution programs in place in order to manage the damage. In other words, respond urgently, transparently and empathetically to customers and employees in the event of a compromise.Here are four strategies that can help small businesses better defend against malicious insider and hacker attacks and more effectively deal with them if a breach does occur.1. Know your risks.It’s imperative that small businesses acknowledge the value of their data and do what they can to protect it. Companies of every size can reduce the chance of an exposure if they scour their network and data assets with an eye toward where vulnerabilities might be lurking.First, review the type of data that you are collecting and storing. Businesses handling medical or financial information, for example, may need to comply with industry regulations or state and federal laws that require specific security measures. Also, understand where sensitive information currently resides. A server with remote access could present an easy target for hackers. Consider keeping top-level data somewhere that’s more difficult to reach.Related: 5 Ways to Avoid Data DisastersGet a handle on how data moves across your network. How are mobile devices authorized to connect? Which data is shared with third parties? See if security gaps exist at those connection points and fix them.2. Make employees your first line of defense.Employees typically have wide access to stored information — from customers’ financial data to personnel records. A better strategy is to match network access permissions to the requirements of specific job duties. If an employee doesn’t need access to sensitive data, don’t give it to them. When you change an employee’s role, update his or her login credentials to maintain a strong security posture. Equally important, immediately deactivate the network access of any employee who leaves the company, regardless of the circumstances of their departure.Employees represent a delicious target. Hackers view them as the weakest link, making the small business workforce a crucial link in the security chain. Raising employee awareness is essential. Educate them about the dangers of phishing and falling for other common scams. Be sure they know what to do if they think they might have clicked on a malware-laden link or mistakenly provided information on a clone website.Related: 5 Ways Your Employees Are Unintentionally Sabotaging Your Data Security3. Focus resources in the right areas.Like their larger counterparts, small businesses often hold enormous amounts of data. Trying to deploy an impenetrable fortress around all of it would be prohibitively expensive. Instead, identify the information that is most sensitive — and most valuable — and focus security resources in those areas. Consumer data (payment data and personally identifiable information such as Social Security numbers, names, addresses, birth dates, etc.) and employee data should be among the files afforded the highest level of protection.Strong security doesn’t have to be prohibitively expensive. Encryption technology is often free or very low cost, so look for opportunities to use it. By encrypting sensitive datasets, a stolen laptop or lost thumb drive will still be an annoyance but it may not result in a breach.4. Invest in cyber insurance with coverage that matches your business risk profile.Because the financial implications associated with even a minor breach are significant, small businesses must consider mitigating their risks by adding a cyber insurance policy. Coverage is available that helps pay costs related to forensic investigations, customer notification, reputation management and even legal counsel. Some policies also provide access to experts who can help the business evaluate its risks and address potential vulnerabilities. Adam Levin is a consumer advocate with more than 30 years of experience in security, privacy, personal finance, real estate and government service. A former director of the New Jersey Division of Consumer Affairs, Levin is chairman and founder of IDT911 and co-founder of Credit.com. He is also the author of “Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves.” June 15, 2016 5 min read Hear from Polar Explorers, ultra marathoners, authors, artists and a range of other unique personalities to better understand the traits that make excellence possible. Listen Now
Register Now » Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goals Opinions expressed by Entrepreneur contributors are their own. 10 min read Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right. October 4, 2016 Despite the surge in mobile phone usage, and the innovative payment technologies that have come of age in mainstream usage, some consumers remain reluctant to completely embrace the latest payment technologies. In fact, it’s been found that only 52 percent of North Americans have used mobile payments; and just 18 percent use them regularly.Related: Why Mobile Payments Aren’t Gaining Traction With Small BusinessesThe reason? Mobile and the latest payment technologies are broken when it comes to security and innovation. There’s evidence to support these concerns.ISACA is a nonprofit that works toward the development, adoption and use of globally accepted knowledge and practices for information systems. Last year, ISACA conducted a global survey that included 900 member cybersecurity experts to examine the biggest security risks for its 2015 Mobile Payment Security Experts. ISACA found;Just 23 percent of the experts surveyed said they believed that mobile devices are secure enough to keep personal information safe.47 percent claimed that mobile payments are not secure.An overwhelming majority 87 percent anticipated an increase in mobile payment data breaches over the next year.Despite these concerns, there’s no slowing down the growth of mobile usage. It’s projected that by 2017 there will be 4.77 billion mobile phone users worldwide, so it’s imperative we resolve security concerns involving new payment technologies. Hackers are persistent and can adapt their techniques to breach payment technologies. If you’re up to speed on the common security concerns, at least you can have a head start on these cybercriminals.Vulnerable payment technologies Whether it’s your mobile device, wearable gadget or home automation, hackers will exploit any security vulnerabilities. Don’t assume the latest payment technology has figured out all of its security flaws. Keep your personal information safe by following basic security measures like having a strong password and changing it frequently, using two-factor authentication, encrypting data, promptly installing software updates and only shopping on sites you know are safe.Phishing attacksPhishing scams, which are scams where an email or website attempts to steal information from you, have been around for years. And, they’re probably not going away anytime soon. As previously written, phishing is still an effective attack because of human error. Even if you were were using software that blocked phishing emails, a legitimate email could still pass through. Because you believe that you’re protected, you’ll willingly open the email. In most cases using common sense can prevent phishing attacks in the first place.Human errorThere are a number of security concerns that can be traced back to the people that you know. Such concerns could come down to a disgruntled employee, an uninformed family member or an employee who has had his or her personal device hacked.Basic measures like encrypting data, training employees/family members, monitoring devices and terminating access to employees who are no longer with you are places to start to prevent any human error.Using public wi-fiTapping into public wi-fi is a nice perk when you are out and about. The problem is that public wi-fi risks hackers have access to your unsecured data. To keep yourself protected, consider using a VPN and SSL connections. Don’t forget to turn off sharing and wi-fi when these services are not in use. Having a security solution wouldn’t hurt either.Future threatsWhile some attacks like phishing have, and will continue to be, a concern, you should also keep up with the latest security threats. For example, it’s predicted that in 2016 “extortion hacks” or “ransomware” will become more commonplace. As Wired explains, these are hacks “where attackers threaten to release sensitive company or customer data if the victim doesn’t pay up or meet some other demand.”Other potential threats include hackers changing or manipulating data, hackers figuring out chip and pin frauds, a rise in IoT botnets and attacks going through more back doors. Staying on top of these trends and educating yourself about these trends and joining a webinar such as “Trends in Information Security and Their Impact on You” can help thwart potential security breaches.Even though you may be able to address any security concerns for either your business or personal accounts, companies involved with payments are also attempting to put any former security concerns to rest.Related: The Future of Mobile Payments Awaits Your FingerprintApple PayApple Pay gained a lot of traction when it was released in 2014. And, one of the highlights, besides your being able to easily make a purchase on your Apple device, is that Apple Pay is secure. In fact, Apple claims that payment transactions are only between you, the merchant and your bank. Users “must have a passcode set on your device and, optionally, Touch ID.” Furthermore, when you use payment information, it’s encrypted to form a tokenization.Apple put a lot of effort into making Apple Pay secure, but there have been several instances of people taking advantage of its security flaws. For example, hackers have been able to simply enter a stolen credit card number and place it into a Apple Pay Wallet. Vijay Balasubramaniyan, CEO and cofounder of Pindrop, tells PYMENTS that this is because of a “bad security design.” One way the company could address this is by using blockchain technology that would require all transactions to not only be recorded in a public ledger, but prevent double spending — because once a coin is spent, it’s gone.Samsung PayIf you’re not an Apple user, then you probably have a Samsung device. Samsung Pay is similar to Apple Pay in that it’s a mobile wallet for specific mobile users that works in almost every POS system. As CNET reports, “Samsung Pay does not store the account or credit card numbers of cards on the device, instead using tokenization for transactions.” The article adds, “Each time a purchase is made, the Samsung Pay handset sends two pieces of data to the payment terminal. The first is a 16-digit token that represents the credit or debit card number, while the second piece of data is a one-time code or cryptogram that’s generated by the phone’s encryption key.” If you lose your device, you can remotely erase all information on the device.Hackers have attempted to hack Samsung. LoopPay was attacked in 2015, but Samsung Pay was not affected thanks to security features like digital tokenization, its KNOX security framework and fingerprint authentication. Just as happens with Apple Pay, the inclusion of third parties, such as banks, still presents security issue. Again, Samsung could welcome blockchain technology where transactions are directly between the two parties.DueDue is my personal company, and security is it’s something we’ve been working tirelessly on. Due is an innovative payment service that comes with features like setting-up recurring invoices. The company also offers a mobile wallet for users. We comply with the requirements established by the Payment Card Industry Data Security Standard (PCI DSS), which ensure that customer information is secure. The company also provides additional security features like 256-bit SSL encryption, as well as certification from security leaders like VeriSign and Norton.The first hurdle we’ve encountered is validation. The validation isn’t for more users but for regulators to enable companies like ours to function globally. Additionally, as with most ecash payment companies, the company could begin to incorporate the latest mobile wallet security advancements, such as accepting tokens like bitcoin or using biometrics to authenticate transactions.Google WalletGoogle Wallet has been around since 2011 and allows people to store payment information, like credit cards and bank accounts. With Google’s mobile wallet you can quickly send and request money from anyone in the world and then cash it out at your bank. Google encrypts data using a Secure Socket Layer so that your full information is never shown. Users are also required to create a PIN in order to access their wallet. Furthermore, Google Wallet provides 100 percent fraud protection.Google Wallet seems incredibly secure. But, as mentioned several times already, dealing with banks and credit card companies always leaves the door open for potential security breaches. Besides embracing cryptocurrencies, Google Wallet might want to start to use biometrics as an added layer of security.VenmoFinally, there’s the popular Venmo app. Unlike the already discussed mobile wallets, Venmo gives you the power to send and receive money directly to friends or family members. Venmo, which is owned by PayPal, is a bit vague on its security features by simply stating that it uses “advanced security systems and data encryption” to keep users safe. However, the company has made efforts to update its security. For example, in early 2015 Venmo began using multifactor authentication (MFA).Venmo has had its fair share of security breaches but has evolved with its growing user base.. Obviously, that’s an area where the company could start improving if it wants to improve security. Because Venmo is used between two parties, it’s a prime candidate for digital coins like bitcoin which would allow users to send and receive payments without banking or credit card information.Payment technologies may offer a wide range of security features, but ultimately it’s up to you, the user, to ensure that your data is protected and remains secure. This can be accomplished by following these security tips:Only use proper and unique passwords. Stay away from common passwords like “123456.”Use multi-factor authentication.Encrypt sensitive data.Back up your data often both online and offline.Update security software like anti-virus software and firewalls.Provide employees with their login credentials.Make sure that all mobile devices have wipe capabilities.Educate employees by hiring an expert or having them attend webinars like “Why do people fail the CISSP exam – and what you should do to prevent yourself from failing.”Use common sense through moves like shopping from reputable merchants and never falling for any “it’s too good to be true” scams.Stay vigilant.Finally, be sure to follow all these tips as part of your normal routine and learn to keep an eye out for the aforementioned vulnerabilities. This is not a one-time deal. With hackers and fraudsters continually developing new ways to break into payment technologies, it’s important to make sure that you look at the above tips as an ongoing process.Related: How Apple Pay Is Poised to Transform the Trillion-Dollar Service IndustryWhile many of the above technologies have stopped criminals in their tracks, the companies behind those technologies also know to keep a vigilant eye out because fraudsters do not give up. In the meantime, don’t be afraid to use these payment technologies because they offer significant benefits and are using the most advanced security layers available.