Premier League: Four positive coronavirus cases in latest testing for second week in a row | Football News

first_img“Of these, there were four new positive tests.“Players or club staff who have tested positive will self-isolate for a period of 10 days.”It is the second successive week there have been four positive tests in the Premier League.- Advertisement – The competition is now pausing for the international break but will resume on 21 November.Previous Premier League test results31 August-6 September – 1,605 tested, with three positives 7-13 September – 2,131 tested, with four positives- Advertisement – The Premier League has announced that there were once again four new positive tests for coronavirus among staff and players in the last week.A statement from the league read: “The Premier League can today confirm that between Monday 2 November and Sunday 8 November, 1,646 players and club staff were tested for Covid-19.- Advertisement – 14-20 September – 1,574 tested, with three positives21-27 September – 1,595 tested, with 10 positives28 September-4 October – 1,587 tested, with nine positives5-11 October – 1,128 tested, with five positives12-18 October – 1,575 tested, with eight positives19-25 October – 1,609 tested, with two positives26 October-1 November – 1,446 tested, with four positives2-8 November – 1,646 tested, with four positives More from Coronavirus In Sport – Advertisement –last_img read more

FIGHTING BACK: After slow start, Syracuse’s offense breaks out in 13-12 win over Cornell

first_img Published on April 10, 2013 at 8:29 pm Contact Jacob: jmklinge@syr.edu | @Jacob_Klinger_ Connor Buczek buried Cornell’s fourth goal just more than five minutes into Wednesday night’s game.He shot from 15 yards away, right between the hashes. But two hours later, in the exact same spot, his teammates were left desperately leaping for a Brian Megill clear they never caught. Dylan Donahue did, though, and time expired five seconds later.Syracuse beat No. 2 Cornell 13-12 on Wednesday night in the Carrier Dome in front of an emotional and sharply divided 3,862 fans that included about 100 Cornell students and a traveling pep band. The No. 7 Orange stormed back from an early 4-0 gap, stifling the Big Red’s (10-2, 4-0 Ivy) high-powered offense and tearing into the visitors with its seemingly overpowering first midfield. The SU (8-2, 2-1 Big East) comeback set up a chaotic final two minutes when the Orange held onto its lead by a mere bounce off of the crossbar.“This is why you go to Cornell,” Big Red attack Rob Pannell said, “for an Upstate battle against Syracuse. There’s nothing like it.”For the opening five minutes, though, there was no battle. Doug Tesoriero won every faceoff and every ground ball. Cornell started picking apart the Orange.AdvertisementThis is placeholder textThe Cornell players were everywhere, popping up for goals from either side of Dominic Lamolinara’s cage.“We were just on the sideline trying to keep our legs warm, trying to cheer on our defense,” Syracuse midfielder JoJo Marasco said. “… And we tell each other on the sideline to, ‘When you get the ball, go to the net and try and win this game.’”It’s exactly how Henry Schoonmaker gave SU its first lead. With 6:15 remaining, he darted away from his man 20 yards from goal on the left hash marks and bounced the ball in before Cornell defender Jason Noble could even turn and help his burnt teammate.When SU awoke, the game fell into a duel of first midfield units. And with Megill frustrating Cornell’s leading assist man Pannell, the Big Red offense slowed down while Syracuse’s ran wild.“They’re athletic, they’re big, they play with both hands, they shoot the ball extremely well and they put a lot of pressure on defenses,” Cornell head coach Ben DeLuca said of SU’s midfield. “We didn’t respond the way we would’ve liked.”Pannell assisted on three of the Big Red’s first four goals. He didn’t have a single point in the last 54 minutes. Cornell scored six goals in the first quarter. It scored six goals the rest of the game.By the middle of the third quarter, momentum was building steadily for SU. Cornell led by just one.Syracuse scored 11 of its 13 goals with the first midfield line on. Kevin Rice scored one of the only goals without SU’s top midfielders with 5:10 remaining off of a defense-splitting, 20-yard diagonal cross from Ryan Barber that found Rice alone on the right side of the crease.With 27.1 seconds left in the game, SU led 13-12. The Syracuse players were divided into two huddles.In the larger huddle, on the right of the SU sideline, assistant coach Lelan Rogers and head coach John Desko warned their players of a play drawn up for Connor English.In the smaller huddle on the left, assistant coach Kevin Donahue simply told the attackers to kill off the clock if they got the ball.Out of the timeout, English beat Matt Pratt down the right hash marks and ran at Lamolinara wide open. Lamolinara came out, but English looped his shot over him.“I heard it hit something, so hopefully it was the pipe, but I didn’t know where it went, so that was really my big fear,” Lamolinara said. “I didn’t know if it bounced out front or behind.”The ball bounced inches beyond the crease. Steve Ianzito recovered and sprinted to the back of the SU defensive end zone before chucking it to Megill. The defender whipped the ball 50 yards downfield for Donahue to catch right where Buczek scored, and for Billy Ward to run toward the opposite end zone as the last five seconds ticked off of the clock as the Orange bench poured onto the field.Afterward, Megill said he was deaf to the electric atmosphere in the stands. He could only hear his teammates for most of the game.“But when you hear that sound, one minute remaining, and the Dome just erupts,” Megill said. “You feel it in your body.” Comments Facebook Twitter Google+last_img read more

US-based Jamaican athlete Xavier Boland charged with sex-related felony

first_imgJamaican track and field athlete Xavier Boland faces a possible 12-year prison term after he was charged with three counts of felony invasion of privacy. Authorities alleged he secretly recorded three people having sex without their knowledge or consent, a felony.According to reports, 24-year-old Boland, an honor-roll student at Lindenwood University, committed the felony on February 18 in St. Charles, Missouri, where he lives.Recordings found on phoneThe reports said court documents indicated that the recordings were found on the Lindenwood University senior’s phone after a woman alleged that he not only showed her a video and a photo of her having sex with Boland’s roommate but sexually assaulted her and threatened to post recordings he’d made of her on social media when she resisted.The court documents also say that Boland’s roommate was unaware that he was in the recordings, as was another woman who was also recorded having sex.In woman’s bedroomThe police report said a woman who brought the matter to light was asleep in the house where Boland lives and awoke to find him in the bedroom. She raised an alarm, got dressed and told the honor student to leave the bedroom.The woman claimed Boland told her he had seen her naked many times and played a video on his phone which showed her engaged in sexual encounters. Boland told her he had more recordings of her having sex in the bedroom.Threatens to publish videoThe woman then tried to leave the house, but Boland allegedly threatened to ruin her life by publishing the videos on a public forum. The police report further stated that Boland then took the woman to his bedroom where he then undressed her and began fondling her before she fought him off and fled. The victim then filed a report with authorities.Boland allowed police to search his phone and the videos by the St. Charles County Cyber Crime Task Force. The victim identified herself on one of the videos. The male acquaintance, who also spoke with police, identified himself in two videos. A third victim, who had a similar account as the others, was also identified and contacted.Boland is said to have admitted to recording the victims without their approval. He also claimed the woman fabricated the sexual assault claim to get authorities to make him erase the videos.Boland was arrested and charged with three counts of invasion of privacy, though no charges were filed in relation to the alleged sexual assault. He was also ordered to surrender his passport.If convicted, Boland faces up to four years in prison per count on the current charges.Was named Intercollegiate Athlete of the WeekJust last week Boland was named the Mid-America Intercollegiate Athletics Association’s (MIAA) Men’s Indoor Field Athlete of the Week. At the Missouri Collegiate Open he set an NCAA provisional mark of 5.20m, which is the second-best in NCAA Division II this season and the top mark in the MIAA.The university has not said whether he remains a student or on the track team, citing student privacy law, but said in a statement that the school “is committed to the safety of its students and the campus’.last_img read more

The world of Internetconnected devices targeted a

first_imgThe world of Internet-connected devices targeted at children is a magical one. Toy dinosaurs can learn and communicate with a growing child, teddy bears can transmit messages overseas to military parents, and talking dolls can communicate with children via speech recognition software. But this connectedness comes with a price. Recent hacks on IoT toys are an indication that when children’s privacy is breached, the ramifications are serious. Before rushing to market with the latest IoT toy, cybersecurity experts urge companies to approach security before they even build the product, not after a hacker gets into the device of a five-year-old. Another day, another breach There’s still much chatter in the cybersecurity and hacker community about the Spiral Toys brand CloudPets, which are toys that let parents and children send personal messages back and forth. Parents can send messages using a CloudPets app, which is then approved and delivered wirelessly to the toy. RELATED CONTENT: Series of missteps leaves smart-toy brand CloudPets database exposedIt was in mid-February when Ryn Melberg, a cybersecurity expert and agile consultant, starting seeing discussions about a possible breach with this product, but it wasn’t until the end of February that the company acknowledged the breach. According to Melberg, hackers are always skimming and looking for unprotected servers. When they stumbled upon this toy’s huge data cache — which wasn’t protected behind a firewall — it was exposed. Melberg added that hackers took a Bluetooth extension and went around neighborhoods, discovering a few CloudPets toys, and found that none of the Bluetooth receivers in the pets were encrypted. “You would think something like this would have dual encryption,” said Melberg. “Most [devices] do, and you have to be able to log in to the app and then log in to the Bluetooth connection. So several other hackers tried this and found all the toys were open, and then they started to expose it.”To make matters worse, Melberg said malicious hackers can get into the Bluetooth receiver and have control over the toy. If the hacker is clever enough, they can piggyback code onto the message, thus controlling the toy remotely. Melberg said the cybersecurity community is discussing the fact that these toys are military-friendly, meaning some mothers and fathers can use CloudPets to communicate with their child when overseas or in active duty. “When it comes to specifics about the toys being hacked, I have been watching for [Spiral Toys] to respond and I haven’t seen anything,” said Melberg. “I’ve also been waiting for the military to respond and I haven’t seen anything.”Password policies and protection was another security concern of these toys. According to Bojan Simic, CTO and co-founder of HYPR, a biometrics security company for IoT, the data compromised contained email addresses and passwords. Chances are, some of these users reuse the same email passwords and passwords as they do with their banking, LinkedIn, and other private accounts, said Simic.A hacker can compromise one system that doesn’t have security in place, like the CloudPets toy, and then go after another weakest link with the same credentials that were stolen. Hackers can then gain access to other resources they find useful, said Simic.“[Passwords] have been an ongoing issue for four to five decades,” said Simic. “We have to eliminate the password from the question entirely. That way you don’t let people hurt themselves because clearly, they are not learning, and each breach shows us that.”There are other ways to protect IoT devices besides passwords, like fingerprint sensors, facial recognition, voice recognition, and secure eye recognition. Embedding these multi-factor authentications is an efficient way to secure connected devices, according to Simic. Getting security right On a positive note, Elemental Path, the company bring toys to life with its CogniToys platform and its IBM Watson-powered dinosaur smart toy, said it’s treating security and privacy as a top priority. To protect their users, John Paul Benini, founder and CTO of Elemental Path, said they encrypt traffic to and from the dinosaur, with each dinosaur generating its own set of keys. Even if one dinosaur is compromised, no other dinosaurs’ information is encrypted in the same way. The toy is also cloud based, so Benini said they are constantly updating the security behind it. Since their users are around five-years-old, they completely anonymize all the interactions outside of the system. This way, it can’t get tracked back to the original child.What about the audio transmitted from the dinosaur to the child, and vice versa? Benini said that they run an analysis on the audio, in order to improve the speech recognition of the toy. The analysis is completely disjointed from the toy itself, and it’s anonymized and has a data store completely set in a separate location. “Because we stream everything, that audio doesn’t even exist,” said Benini. “It’s not stored, you can’t get to it.”And their application is only there to set up provisioning of the toy, just to set up the dinosaur on the home Wi-Fi. Outside of that, the application is where the parent can accept the terms and conditions, set up a profile, and only those items are needed so the dinosaurs can interact and talk with the child. Because children’s private information can be a liability, all of the information that is not relevant to a game or story or activity is left out, said Benini. If a child says their favorite color is red, that could be incorporated into a story. If a child says they go to “xyz elementary school,” that information is left out. “We like to think we’ve done a pretty good job with security thus far,” said Benini. “[The dinosaur] has been updated, we have another security patch coming up soon, and we are testing it now.”Benini mentioned they were alerted of something under the hood of the toy, which wasn’t necessarily a vulnerability, but it was something a security researcher suggested they take a look at. “A security researcher told us, ‘Hey, you can do this better.’ And we said, ‘Yes we can,’” said Benini. Guidelines for IoT-loving parents Melberg said while it’s up to these toy companies to take proper security measures to secure their devices, it’s also important that consumers understand what steps they can take to protect themselves. “I do my best to say please never, ever connect to any Internet that isn’t secured,” said Melberg. “I don’t care if it’s Wi-Fi or Bluetooth, just don’t do it. So when I have people ask me about toys like [CloudPets] I say, do you have to authenticate? If it’s no, don’t buy the toy. Can you change the authentication? If it’s no, don’t buy the toy.”It’s important to understand all of the features and functionality of an IoT device being brought into the home, especially if it will be used by a child, said chief research officer of SecurityScorecard, Alex Heid. He suggests parents understand if and how the devices interact with computers or the Internet, and they need to understand if there are any authentication mechanism related to the product or service. Parents should understand what data is actually being collected by the company and stored or shared, said Heid.“As boring as it seems, becoming familiar with the user manual, privacy policies and terms of service will oftentimes reveal surprising conditions that are accepted by the general public without any second thoughts,” said Heid.Website and online services directed to children under 13 are also heavily regulated under the Children’s Online Privacy and Protection Act (COPPA). Companies handling this data generated by minors should be even more diligent about their information security practices because of COPPA and standard compliance acts, said Heid. Despite these rules and regulations, there is a general consensus from the cybersecurity community that we are going backwards, said Melberg. IoT continues to expand and it is being applied to more consumer products, yet there seems to be a decrease in understanding of the security that is necessary, she said. “This is something that has the community concerned,” said Melberg. “Part of it comes down to how few people understand cybersecurity. Then we need to provide guidance on how to apply it to a service or product, because these mistakes are avoidable. We need to make security a part of consumer products.”Which means companies that are racing to get their device to market should really stop and think about security, because unless “someone really takes the security part seriously, we are just going to see worse and worse hacks in the future,” said Benini.He said the responsibility of security is an overarching issue of IoT in general, where the promise of the Internet of Things is really turning into the “Internet of Terrible Things,” said Benini. “Everyone is out there racing to put something on the market, but no one is stopping to think, does my refrigerator really need an IP address?” said Benini. “Companies that are releasing these IoT devices are shirking the responsibilities and they are not securing the devices either.”There are a number of steps companies can take to ensure that any data stored or transmitted is encrypted. That’s the easiest thing that can be done, said HYPR’s Simic. The second thing to do is to allow time for penetration testing before the product is released. This way the company can know that at least a third party or a person with a security background and knowledge approved and tested the device at least once, said Simic.last_img read more