Last week, we told you the U.S. had a 1.2 percent chance of winning the World Cup. The odds of that dream have dropped by half since then, without the U.S. playing a match: Underdogs like the U.S. have come oh so close before without winning a match in the knockout stage.Argentina vs. Switzerland, 12 p.m. EDTU.S. vs. Belgium, 4 p.m. EDTIn briefSee our World Cup predictions for the latest probabilities.In depthHeading into Tuesday, the last day of the Round of 16, six group leaders have played six group runners-up in the knockout stage. Nearly every match has been close-fought and competitive. Brazil and Costa Rica needed penalty kicks to advance. Germany went to added extra time. The Dutch needed to come from behind in the final minutes. And France was locked in a scoreless battle until the final 20 minutes.Yet in every case, the group leaders won.That’s bad news for the U.S. and Switzerland, the two remaining group runners-up, for two reasons: First, if they do manage to upset Belgium and Argentina, respectively, difficult opponents await. In their half of the draw is the Netherlands, sixth in the world in ESPN’s Soccer Power Index ratings. If they somehow reach the final, one of the world’s top five teams awaits.The second reason is that by winning, all the soccer powers have demonstrated they’re even better than previously thought, making it even less likely that a solid but not elite team such as the U.S. could upset them.Add to that a tweak to our model late last week, to account for the advantage favorites have in added extra time and penalty kicks, and the U.S. team’s chances of winning the Cup have dropped to 0.6 percent, from 1.2 percent after last week’s match against Germany. Switzerland’s chances have dropped to 0.7 percent from 0.9 percent after its previous match.Winning the Cup was always a long shot for these two teams, though. Reaching the quarters would be a good result for either one. And the U.S. has the better chance. It gets Belgium, the second weakest of the eight group winners, in the late match Tuesday. The U.S. has a 41 percent chance of winning. That’s nearly double Switzerland’s 23 percent chance of upsetting Lionel Messi and Argentina.Drawing Belgium in the Round of 16 was the U.S.’s reward for making it out of one of the toughest groups. Belgium advanced to the World Cup out of one of the weakest European qualifying groups, then won the weakest World Cup group. It remains a formidable opponent and is better than the U.S., with high-priced talent on its roster, much of it familiar to English Premier League fans. But Belgium is a tier or three beneath tournament favorite Brazil. After nearly beating Portugal and nearly equalizing late against Germany, the U.S. shouldn’t fear another European opponent.Switzerland, meanwhile, will attempt to earn what would be only Europe’s third win in 10 tries against South American opponents at this World Cup. The Swiss have one of the two wins so far, over Ecuador. (The Netherlands has the other, over Chile.) Ecuador is a far cry from Argentina, though. Messi has scored on four of his seven shots on target, all with his left foot. Switzerland might need Xherdan Shaqiri, who scored a hat trick against Honduras, to live up to his stretch of a nickname, “Alpine Messi,” to have a chance.YesterdayTwo Union of European Football Associations powers stamped tickets to the quarterfinals Monday thanks to substitutes. France beat Nigeria behind the influence of Antoine Griezmann, whereas it took an André Schürrle goal to finally open the scoring in Germany’s lively 2-1 extra-time win against Algeria.Olivier Giroud started at forward for France, but the French game really started when Griezmann replaced him in the 63rd minute. Giroud had 14 attacking-third touches and didn’t create a chance during a lackluster 62 minutes, but Griezmann provided the necessary spark. He had 12 attacking-third touches in 28 minutes, including a great scoring chance with a 1-2 ball to Karim Benzema in the 70th minute. In total, the French created six chances in the first 62 minutes and five over the final 28, converting two for goals.Griezmann was the difference, though he did not officially figure in either goal. His best “shot” was an 84th-minute close-range strike that required a reaction save from Nigerian goalkeeper Vincent Enyeama. Enyeama left the tournament with a competition-best 21 saves over Nigeria’s four matches. Although it wasn’t a shot, Griezmann’s near-post run in the first minute of stoppage time produced a goal officially credited as a Joseph Yobo own goal.The Germans, meanwhile, did not lack for attacking possession throughout Monday’s match, posting a 246-90 advantage on touches in the attacking third. In the first 90 minutes, Germany completed almost four times as many passes into the attacking third as the Algerians (125-32), but it couldn’t convert a massive advantage in chances created (18-5) into a regulation winner.Two minutes into extra time, Schürrle put the Germans ahead. He actually hit the ball on his near-post run (as opposed to Griezmann), and Schürrle was credited for the goal. But the result was the same in both cases.Mesut Özil scored later in the extra time, and that proved to be the eventual game-winner, though Algeria scored before the final whistle. Abdelmoumene Djabou’s left-footed finish was the latest goal in World Cup history, but it wasn’t enough to prevent the Germans from facing France on July 4. — John Parolin, senior stats analyst, ESPNOff the pitchArgentina and Switzerland cooperate in a number of ways — investment protection, aviation, legal protection — but perhaps the most important aspect of their relationship is trade. According to data from the Observatory of Economic Complexity, Swiss exports to Argentina have increased significantly in recent years, from $187 million in 2005 to $1.06 billion in 2012, which is most likely because of an increase in bilateral trade agreements. A majority of those exports were health-related products and chemicals, at 62 percent. Watches made up 7 percent of the exports, chocolate comprised .22 percent, and milk and cheese was just .05 percent. Trade in the opposite direction has increased over time as well, but not to the same degree. Argentine exports to Switzerland totaled $121 million in 2005 and $627 million in 2012. Gold dominated at 79 percent, followed by wine, trucks/vans and bovine meat. — Hayley MunguiaFurther readingLionel Messi Is ImpossibleHas the U.S. Men’s National Team Plateaued?Stoppage Time Is Often Home-Cooked, Especially in the MLSThe Rise of the Red Devils
Comments Black Widow takes out a room of men — while tied to a chair. Gamora wins an electric sword fight with her sister Nebula. Okoye points a spear at her own husband after he charges her down on a rhino. The women of Marvel, needless to say, are fearless. CBS Interactive, which CNET is part of, is celebrating the March 8 release of Captain Marvel, and all of International Women’s Month, by highlighting the powerful women of Marvel movies and shows. We’re focusing not only on the incredible women of the MCU, but also on Marvel comics and their impact on pop culture. Multiple CBS sites have come together to produce this special report on the women of the Marvel universe. CNET has a mega-bracket showdown of powerful women; Entertainment Tonight is profiling prominent women behind and in front of the camera; and TV Guide will look ahead at the future of Marvel’s strong characters on the small screen. Highlighting the scope of talented women who work at CBS Interactive, women throughout the company wrote, edited and produced every article, gallery and video in this collection — from our long-running compendium of Marvel movies to our roundtable of women talking about more strong ladies and our Q&A with Danai Gurira, Black Panther’s General Okoye, for CNET Magazine. Women of the MCU making magic Captain Marvel may be taking the lead right now, but many other women have been key to making magic happen in the Marvel universe. CNET’s Patricia Puentes talked to costume designer Ruth E. Carter, who just won an Oscar for costume design for Black Panther. Entertainment Tonight looks at the women of Wakanda, aka all the women behind Black Panther, making Oscar history. And there’ll be much, much more Marvel flying your way. More on iDaily: Can you name all 25 of these Marvel women? Tags Now playing: Watch this: How to watch every Marvel Cinematic Universe film in the right order 3:04 Powerful women of the Marvel universe Captain Marvel sets the stage Brie Larson stars as Carol Danvers, aka Captain Marvel, the 21st MCU movie now open around the world. For anyone unfamiliar with Captain Marvel’s backstory, check out GameSpot’s comic book history of Captain Marvel. CNET’s Patricia Puentes called the film “two hours of pure female empowerment packaged with all the visual power you’d expect from a Marvel blockbuster.”Additionally, Entertainment Tonight’s Meredith B. Kile reviewed Captain Marvel, noting that its “origin-story-in-reverse structure allows Captain Marvel to do away with many of the more overdone origin story tropes.” As the film opens, GameSpot will feature more explainers, spoilers, and breakdowns of how Captain Marvel (and those post-credits scenes!) will tie into Avengers: Endgame. More from GameSpot: How the Skrulls change everything and Why everyone’s talking about Goose the cat 4 Becoming a Marvel woman through cosplay, and getting paid for it 15 Photos 26 Photos Share your voice International Women’s Month The first National Women’s Day was observed in the United States all the way back in 1909, many years before we’d celebrate Women’s History Month. In 1980, President Jimmy Carter declared the week of March 8 to be National Women’s History Week, and by 1987, Congress had passed a statute designating March as Women’s History Month. We continue to celebrate International Women’s Day on March 8. Did we mention one or 100 times that’s the day Captain Marvel, the first female-led film in the entire MCU, comes out? Since the ’90s, the United Nations has focused on an annual theme for International Women’s Day. This year’s theme is “Think equal, build smart, innovate for change.” That’s why it feels appropriate for us to look to the women of Marvel who’ve been working in innovative ways, both on screen and off screen, to get more seats at the franchise’s proverbial table. More on Entertainment Tonight: Women of Wakanda: The Female Forces Behind ‘Black Panther’s Historic Oscar Push TV and Movies Women of Marvel Captain Marvel Marvel
Kolkata: Train services in South Eastern Railway’s (SER) Kharagpur division were affected from Monday morning due to a blockade put up by an umbrella organisation of the Adivasis, who demands official recognition of their language.Around 72 students accompanied by 12 teachers of Ballygunge Siksha Sadan are reportedly stuck since afternoon while on their way to the city. The group had gone on an educational tour. Railway Recruitment Board Examination has also been cancelled. Also Read – Rain batters Kolkata, cripples normal lifeA spokesperson of SER said members of Bharat Jakat Majhi Marwa squatted on tracks at several stations such as Balichak, Nekusini, Salboni, Chattna and Khamasuli affecting train movement. A number of mail, express and local trains were detained at various stations of Kharagpur-Howrah, Kharagpur-Tatanagar, Kharagpur-Bhadrak and Kharagpur-Adra sections. A good number of trains were cancelled due to the agitation that included Howrah-Hyderabad East Coast Express, Howrah-Mumbai CSMT Duranto Express, Howrah-Yesvantpur AC Express, Shalimar- LTT Express, Santragachi-Puducherry Special, Santragachi-Chennai Central Antyodaya Express, Howrah-Puri Sri Jaganath Express, Shalimar-Bhanjpur Express. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedThe agitators also blocked roads at different places of Salboni, Khemasuli, Nekusini and Khirpai in West Midnapore district, said Superintendent of Police Alok Rajoria. It may be mentioned that all the cancelled trains were scheduled on Monday. Three of the express trains were short terminated. The Howrah-Titlagarh Ispat Express was terminated at Mecheda. Titlagarh-Howrah Ispat Express was short-terminated at Tatanagar and ran from Tatanagar to Titlagarh. The Howrah-Puri Dhauli Express was short-terminated at Belda and further service to Puri was cancelled. The Santragachi-Anand Vihar Express was short-terminated at Uluberia, according to a release by SER. “Arrangements for drinking water and food have been made at major stations for the stranded passengers,” a senior SER official said. The Adivasis during their agitation also caused road blockade on National Highways in the state leading to disruption of traffic movement. Traffic movement in districts like Jhargram, East Burdwan, Purulia, Birbhum, Hooghly, North Dinajpur, South Dinajpur, East Midnapore and West Midnapore bore the brunt of the agitation. However, the police removed the squatters within a few hours. Demanding fulfilment of their nine-point charter of demands, including the propagation and promotion of Olchik script of Santhali language in various schools and colleges of the town, members of Bharat Jakat Majhi Pragana Mahal (BJMPM), the largest outfit of tribals had carried out the protests.
Defence Minister Nirmala Sitharaman has called upon the engineering students to use the latest technology and skills to help India face cyberwar in future.Delivering the convocation address at the 33rd Annual Convocation of the Vellore Institute of Technology at the VIT campus, Sitharaman said that in future, wars will be fought less on the borders and more in cyberspace.The country was facing the threat of cyberwar with its far-reaching ramifications on national security. Besides, one’s security and interests were also threatened by cybercrime. Also Read – Add new books to your shelf”The students who are qualifying today in science and technology will have to start working to see how technology can be to be adopted to tackle these twin threats”, she said.The defence minister added that the Indians have imbibed the entrepreneurial spirit genetically from their forefathers dating back to the period when the Nalanda University was flourishing. The era saw the emergence of English education which was intended to educate the Indian people to work as clerks and serve their British masters. This trend which started during the colonial rule continued for the 50 years after Independence. The Narendra Modi government wants to break the chain which fettered the students by forcing them to take up salaried jobs instead of own business. Also Read – Over 2 hours screen time daily will make your kids impulsiveDr G Viswanathan, VIT Chancellor said that after the liberalisation, privatisation and globalisation regime in 1991-96, all sectors were de-regulated. But de-regulation has not so far happened in the education sector.He requested the defence minister to help in the de-regulation education sector.The Chancellor pointed out that though India had to become a hub of international education, it contributed just one percent of students throughout the world. On the other hand, lakhs of students from India were going abroad for higher education and the Government of India was spending Rs 75,000 crore worth of foreign exchange annually on these students. Dr Viswanathan said that VIT was ranked 13th among the various engineering institutions in India under the National Institutional Ranking Framework (NIRF) of the Ministry of Human Resources Development, and first among the private engineering institutions.A total of 39,000 students were studying in the four campuses of VIT in India. A total of 3300 students were recruited through campus placements in 2017-18. Till date, 2600 students were placed through campus recruitment in 2018-19.Viji Santhanam, Managing Director, Brakes India Private Limited and Chairman, Sundaram Finance Limited, Chennai, who was the guest of honor said that while at present, a majority of the population was below the age of 27 years, this demographic dividend will start declining by 2040.”In order to propel economic growth, India has to make good use of this competitive advantage which it can enjoy only for another 20 years,” he added.Sitharaman then distributed the gold medals and degree certificates to 54 candidates. A total of 6277 candidates received their degree certificates at the convocation.Dr Anand A Samuel, Vice-Chancellor of VIT welcomed the gathering. Sankar Viswanathan, Dr Sekar Viswanathan and G V Selvam, Vice-presidents, Kadambari S Viswanathan, Assistant Vice-President, Pro Vice-Chancellors Dr S Narayanan, Dr N Sambantham, Registrar Dr K Sathiyanarayanan of VIT participated in the convocation.
Growing a business sometimes requires thinking outside the box. October 20, 2017 In the wake of the Equifax breach and the global WannaCry ransomware outbreak earlier this year, tensions around cybersecurity are at an all-time high. Companies are feeling more pressure to invest in new policies and products that can keep their sensitive data safe.Yet even as they increase their security budgets, many organizations harbor real concerns as to whether any existing technology can help them keep up with the rapidly evolving nature of today’s threats.Related: Got Effective Cybersecurity Practices? Be Aware: The FTC Is Watching You.In particular, they’re worried about the steadily growing number of attacks designed to gain access to their systems and silently infect them silently, without ever downloading malicious programs or leaving behind any obvious trace.These attacks can go by several names. “Fileless attacks” is a common one, but “non-malware attacks and” “living-off-the-land attacks” are also used. The bottom line is these malicious actions are specifically designed to evade detection, primarily by using a victim company’s trusted software and system tools against it. As a result, these attacks are quickly becoming the number-one threat keeping IT and security professionals up at night.To clarify what actually constitutes a fileless attack and explain how it can work, here are five things every business leader should know:1. Fileless attacks exploit a fundamental gap in traditional endpoint security.Traditionally, cyber attacks involving malware have revolved around attackers gaining access to a victim’s computer (typically by either exploiting a software vulnerability or tricking the victim into downloading something he or she shouldn’t), and then installing an executable file (the “payload”) that does the damage.The problem with this approach from an attacker’s perspective is that antivirus solutions are built to scan and block any suspicious files that land on the computer. By not installing malicious files, however, attackers can simply bypass these solutions. All they need to do is hijack otherwise legitimate system tools and trusted applications to do their dirty work for them.Related: Phishing In All Its Forms Is a Menace to Small Businesses2. There are a variety of fileless techniques attackers can use.At a high level, attacks can be broken down into two primary stages: the initial compromise that gives attackers access to a target system, and the post-exploitation activities they conduct once those attackers are there. Attackers can utilize fileless techniques during one or both of these stages to accomplish their goals even as they evade traditional and even next-generation, machine-learning-powered antivirus software. To gain initial access, attackers will often utilize exploits designed to take advantage of flaws in the software the victim is already running. The Equifax breach is a recent example. Attackers were able to exploit a vulnerability in the company’s unpatched version of Apache Struts and use it to execute malicious commands.Exploiting vulnerable applications and injecting code into normal system processes are both popular fileless techniques for gaining access and execution on machines without getting noticed.Once the initial compromise is complete, attackers can continue avoiding detection by abusing powerful system administration tools like PowerShell, PsExec and Windows Management Instrumentation (WMI). Because these tools have legitimate use cases, they allow attackers to hide in plain sight while they escalate privileges, move laterally throughout the network and achieve persistence by making changes to the registry.3. A fileless attack can involve files.Before going any further, we should dispel one of the most common misunderstandings surrounding fileless attacks — they often do involve files, especially in the initial compromise stage of the attack. The primary difference is that these files aren’t malicious executables, but instead files like Microsoft Office documents.The challenge from a traditional endpoint security perspective is that there is nothing inherently malicious about these files on their own, so scanning them won’t necessarily raise any red flags. That makes them the perfect vehicles to kick off an attack.For example, an attack may begin with an employee being tricked into opening a Word document received in a phishing email; the employee thus inadvertently activates a macro or script embedded inside.That macro or script then launhes PowerShell, a legitimate framework built into Windows for automating system-administration tasks. From there, the attacker uses PowerShell to execute malicious code directly in memory, making the attack from this point forward truly fileless.Because the individual components of the attack aren’t malicious, security solutions need to be able to observe how they are behaving together, and recognize when a chain of behaviors from otherwise legitimate programs constitutes an attack.4. Fileless attacks are on the rise.In truth, many of the techniques that fileless attacks utilize have been around for some time. In-memory exploits, for example, date back to the prolific Code Red and SQL Slammer worms of the early 2000s. But the creation and widespread distribution of easy-to-use attack tools and exploit kits has made them far more prevalent. In particular, penetration-testing frameworks like Metasploit and PowerSploit are being abused since they provide ready-made fileless exploits that can be added to any attack.As a result, these techniques aren’t limited to sophisticated hackers and nation-state espionage groups anymore. They’re readily available for the average cyber criminal to use, and the number of fileless attacks on companies has risen dramatically. Once considered fringe cases, according to the SANS 2017 Threat Landscape survey, fileless attacks have been reported by nearly a third of the organizations polled.5. Fileless attacks can be stopped.While fileless techniques can be extremely difficult to detect, there are things you can do to protect your business and reduce your risk. A good first step is to disable admin tools that your organization isn’t actively utilizing, or, at the least, restrict their permissions and functionality. Because so many fileless techniques rely on it, PowerShell should be at the top of your list to consider limiting or disabling altogether.Likewise, disabling Office macros can take away one of the most common launching points for fileless attacks. Operating systems and applications should be patched as religiously as possible, and when patching isn’t feasible, those systems should be isolated to prevent potential attacks from spreading.Related: 4 Vital Cyber Security Measures Every Safety-Conscious Entrepreneur Needs to TakeWith no files to scan, detecting and blocking fileless attacks ultimately comes down to your IT department’s ability to identify malicious activity and behaviors on the end point — ideally before any damage is done. There are new end-point solutions that can accomplish that task and stop fileless attacks in real time and before they are able to compromise the device. IT and security leaders should investigate their options to determine the right solution for keeping their organizations safe. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Opinions expressed by Entrepreneur contributors are their own. 6 min read Register Now »