RR Donnelley Buys Paid Content Engine Journalism Online

first_imgR.R. Donnelley has acquired Journalism Online Inc., and its Press+ service, which enables publishers to offer a variety of paid and metered content plans as well as mobile/tablet access, enhanced site functionality, and out-of-market-access.Press+ allows publishers to offer day or week passes, print/online bundles, monthly or annual subscriptions as well as credit for previous day passes as readers select longer-term subscriptions. The original concept of the service was to get about 10 percent of a content site’s users to pay. Journalism Online co-founders Steve Brill and former Wall Street Journal Publisher Gordon Corvitz–members of the 2010 FOLIO: 40–will continue working with the company under R.R. Donnelley. News Corp., which purchased a stake in Journalism Online last year, sold its interest as part of the deal. “Our publishing customers continue to develop multi-channel advertising and editorial strategies, and Press+ provides a valuable tool for monetizing content,” said R.R. Donnelley president and CEO Thomas J. Quinlan III in a statement. The deal comes one week after The New York Times embarked on what may be the biggest bet on online paid content yet. According to Crovitz, the Times new paywall could generate more than $150 million in new revenue (compared to the $150 million in digital advertising the site already generates). “Done right, a ‘freemium’ approach such as a meter is a big win for news publishers,” he said. “The publishers using Press+ for metered access to web sites and other digital products are keeping all their online ad revenue and their visitors month to month, as they add the new revenue stream from online subscriptions. We estimate the N.Y. Times should be able to generate $100 million in new revenues with this approach.”Last year, Journalism Online said it had “more than 1,300” affiliates signed up. The company previously offered data from about two dozen small and medium-sized newspapers that suggested implementing a paywall did not significantly hurt overall traffic numbers, with monthly uniques to the participating sites falling between zero to 7 percent, while page views dropped between zero to 20 percent, with no decline in advertising revenue. The Jordan, Edmiston Group handled the deal.last_img read more

Tags: , , , , , , , , ,

QUE DELICIOSO News On Casa Blanca Panchos Cantina

first_imgWILMINGTON, MA — Wilmington will soon have two Mexican restaurants as Casa Blanca is expected to open soon, following the August launch of Pancho’s Cantina. Both restaurants were recently in front of town boards with requests.Pancho’s Cantina Adds Mariachi BandPancho’s Cantina, located at 206 Ballardvale Street near Target, recently received an Entertainment License from the town. Owner and Executive Chef Fonzi Chavez came in front of the Board of Selectmen last month and explained his desire to host a mariachi band in his restaurant on its slow nights (Monday-Wednesday). The 3-4-piece group will perform as they walk around to tables and around the bar. Chavez stressed it’s nothing like a concert and there will be no ticket sales. Selectmen unanimously approved the request, contingent upon successful review of the Town’s Building Inspector, who noted that if the building’s capacity exceeds 125 during a performance, there would need to be a license crowd control management present. Chavez responded that both he and his have taken the necessary training.Casa Blanca’s Opening SoonCasa Blanca, located at the old Chili’s location in the Wilmington Crossing plaza (207 Main Street), will be opening “early next year,” according to Wilmington Health Director Shelly Newhouse.  The restaurant’s floor plans were up for review at the November Board of Health meeting. The owners have already obtained an alcohol license from the Board of Selectmen back in July, when a fall opening was suggested. Since then, however, the restaurant’s Andover location was forced to close for two months (September 19-November 16) due to the Merrimack Valley gas explosions. Wilmington Apple will report on the restaurant’s opening date once it’s officially announced.Like Wilmington Apple on Facebook. Follow Wilmington Apple on Twitter. Follow Wilmington Apple on Instagram. Subscribe to Wilmington Apple’s daily email newsletter HERE. Got a comment, question, photo, press release, or news tip? Email wilmingtonapple@gmail.com.Thank You To Our Sponsor:Share this:TwitterFacebookLike this:Like Loading… RelatedWORTH THE WAIT: Pancho’s Cantina, New Mexican Restaurant, Opens In Wilmington, Near TargetIn “Business”New Mexican Restaurant — “Pancho’s Cantina” — Coming To WilmingtonIn “Business”SELECTMEN NEWS: Big Issues To Be Discussed At Tonight’s MeetingIn “Government”last_img read more

Tags: , , , , , , , ,

Malware Attacks On Olympics Could Have Come From Russia And North Korea

first_img Share Natacha Pisarenko/APSpectators watch the mixed doubles bronze medal curling match between Russian athletes and Norway at the 2018 Winter Olympics in Gangneung, South Korea, on Tuesday.Cybersecurity experts are confirming that a computer malware attack dubbed “Olympic Destroyer” hit select networks and Wi-Fi systems at the Winter Games in Pyeongchang on Friday, but they would not say for sure whether Russia or North Korea are to blame.Users with a @pyeongchang2018.com email address were targeted in the attack, which lasted less than an hour on Friday night, experts said.The Pyeongchang Organizing Committee for the 2018 Olympic & Paralympic Games (POCOG) confirmed the cyberattack caused a malfunction of Internet protocol televisions (IPTVs) at the Main Press Center, according to South Korea’s Yonhap News.Yonhap reports that POCOG was forced to “shut down the servers to prevent further damage, leading to the closure of the Pyeongchang 2018 website.”“Due to the shutdown of the website, spectators who purchased tickets to 2018 Winter Games events were unable to print their reservations,” Yonhap says.According to Wired, though “neither Olympics organizers nor security firms are ready to point the finger at the Kremlin, the hackers seem to have at least left behind some calling cards that look rather Russian.”The magazine writes that Cisco’s Talos division, which deals with cyberthreats, “points out that Olympic Destroyer’s disruptive tactics and spreading methods resemble NotPetya and BadRabbit, two pieces of Ukraine-targeting malware seen in the last year that the Ukrainian government, the CIA, and other security firms have all tied to Russian hackers.”Some have speculated that Russian hackers may have targeted the Olympics because the country’s athletes were barred from competing under the Russian Federation flag due to a doping scandal that dates to the 2014 games in Sochi.The malware “turns off all the services, the boot information is nuked, and the machine is disabled,” Talos research director Craig Williams was quoted by Wired as saying.However, the malware deliberately pulls its punches. The software designed to wipe computer files “intentionally holds back from inflicting maximum damage. Instead of deleting all the files on a computer, it only deleted those related to booting up, meaning an average tech could fix it with relative ease. Researchers have never seen that sort of restraint before from that kind of malware,” according to Talos, BuzzFeed writes.A separate hacking operation, dubbed Operation GoldDragon, has attempted to infect target computers belonging to South Korean Olympics-related organizations with three separate malicious tools, according to the computer security firm McAfee Inc. The spyware “would enable hackers to deeply scour the compromised computers’ contents. McAfee identifies those malicious tools by the names GoldDragon, BravePrince, and GHOST419.”McAfee traced the phishing scheme that provided entry for the spyware “to a remote server in the Czech Republic, registered with fake credentials to a South Korean government ministry. And they found publicly accessible logs on that remote server that showed victim machines were in fact connecting to it from South Korea, a sign of actual infections,” Wired reports.Although McAfee won’t say for sure, the company’s chief scientist, Raj Samani, says his working theory is that the spyware attack is a North Korean operation.“It is clear attacks are ongoing and are likely to continue throughout the duration of the games. What is yet to be determined is if actors are working simply to gain disruption, or if their motives are greater,” McAfee Advanced Threat Research senior analyst Ryan Sherstobitoff says, according to ZdNet.Copyright 2018 NPR. To see more, visit http://www.npr.org/.last_img read more

Tags: , , , , , , , , , ,

Google Chrome Mozilla Firefox and others to disable TLS 10 and TLS

first_imgYesterday, Google, Mozilla, and Apple announced that by 2020, they will disable TLS 1.0 and 1.1 by default in their respective browsers. Kyle Pflug, Senior Program Manager for Microsoft Edge said, “January 19th of next year marks the 20th anniversary of TLS 1.0, the inaugural version of the protocol that encrypts and authenticates secure connections across the web.” Chrome, Edge, Internet Explorer, Firefox, and Safari already support TLS 1.2 and will soon support recently-approved final version of the TLS 1.3 standard. On the other hand, Chrome and Firefox already support TLS 1.3, while Apple and Microsoft are still working towards supporting TLS 1.3. Why disable TLS 1.0 and 1.1? The Internet Engineering Task Force (IETF), an organization that develops and promotes Internet standards is hosting discussions to formally deprecated both TLS 1.0 and 1.1. TLS provides confidentiality and integrity of data in transit between clients and servers while exchanging information. In order to keep this data safe, it is essential to use modern and highly secures versions of this protocol. The Apple’s Secure Transports team has listed down some benefits of moving away from TLS 1.0 and 1.1 including: Modern cryptographic cipher suites and algorithms with desirable performance and security properties, e.g., perfect forward secrecy and authenticated encryption, that are not vulnerable to attacks such as BEAST. Removal of mandatory and insecure SHA-1 and MD5 hash functions as part of peer authentication. Resistance to downgrade-related attacks such as LogJam and FREAK. For Google Chrome users, Enterprise deployments can preview the TLS 1.0 and 1.1 removal today by setting the SSLVersionMin policy to ‘tls1.2’. For enterprise deployments that need more time, this same policy can be used to re-enable TLS 1.0 or TLS 1.1 until January 2021. Post depreciation here is what each browser maker has promised: TLS 1.0 and 1.1 will be disabled altogether in Chrome 81, which will start rolling out “on early release channels starting January 2020.” Edge and Internet Explorer 11 will disable TLS 1.0 and TLS 1.1 by default “in the first half of 2020.” Firefox will drop support for TLS 1.0 and TLS 1.1 in March 2020. TLS 1.0 and 1.1. will be removed from Safari in updates to Apple iOS and macOS beginning in March 2020. Read more about this news in detail on Internet Engineering Task Force (IETF) blog post. Read Next Introducing TLS 1.3, the first major overhaul of the TLS protocol with improved security and speed Let’s Encrypt SSL/TLS certificates gain the trust of all Major Root Programs Java 11 is here with TLS 1.3, Unicode 11, and more updateslast_img read more

Tags: , , , , , , , , ,