Page 3,982«..1020..3,9813,9823,9833,984..3,9904,000..»

Beware of the Smart Device: Ways to Stay Private and Safe – The New York Times

NEW YORK Did someone invite a spy into your home over the holidays? Maybe so, if a friend or family member gave you a voice-controlled speaker or some other smart device.

It's easy to forget, but everything from internet-connected speakers with voice assistants such as Amazon's Alexa to television sets with built-in Netflix can be always listening and sometimes watching, too. As with almost all new technology, installing such devices means balancing privacy risks with the conveniences they offer.

The research firm IDC estimates worldwide shipments of 815 million smart speakers, security cameras and other devices in 2019, up 23% from 2018. Many of the sales are for gifts.

You could sidestep the risks altogether by returning the devices right away. But if you decide to keep them and the artificial intelligence behind them there are a few things you can do to minimize their eavesdropping potential.

THE SPEAKERS LISTEN ... AND WATCH

Smart speakers such as Amazon's Echo and Google Home let you check weather and appointments with simple voice commands. Fancier versions come with cameras and screens.

Many of these devices listen constantly for commands and connect to corporate servers to carry them out. Typically, they will ignore private chatter and transmit sound recordings only when you trigger the device, such as by pressing a button or speaking a command phrase like "OK Google. Some gadgets also have a mute button to disable the microphones completely.

But there's no easy way for consumers to verify those safeguards. In one case, the Alexa assistant in an Echo device misheard background conversation as a command to send the chatter to an acquitance and so it did.

One more catch: Voice commands sent over the internet are typically stored indefinitely and may include conversations in the background. They can be sought in lawsuits and investigations.

Reputable companies let you review and delete your voice history, Amazon now lets you request automatic deletions after three or 18 months but you need to set that up, and theres no option to keep Amazon from saving your command history at all.

Until recently, tech companies allowed employees and contractors to review the voice interactions for quality control and some of those details leaked. Following a backlash, many companies are at least making it clearer and easier to opt out of human review. Pay attention to your choices.

If you have kids, set up a passcode for shopping if your speaker allows it. Otherwise, it can be child's play for a kid to order toys and other goodies through Alexa.

As for those screen models, many also have cameras for video chats. When youre not using the device, consider turning it around to face the wall, especially in the bedroom and other private settings. Or stick a bandage or some tape over the camera. It shouldnt be recording, but why tempt fate?

SECURITY WITH SECURITY VIDEO

Online security cameras let you check in on your pets or kids when you're not home. Amazons Ring doorbell lets you check whos at the door without getting up.

Heres the rub: If you can view video on an app, it's possible that a skilled hacker can, too.

When you use the same password at multiple services, a hacker stealing your password from one place can try it on the camera service, too. So dont reuse password. When available, enable two-factor authentication, which requires you to enter a temporary code sent as a text to ensure its you.

Again, you might want to turn the camera to face the wall when you're home. It's a pain, though, and if you forget to turn it back when you leave, it defeats the purpose of having a security camera.

ARE SMART LOCKS SMART?

Smart locks let you unlock doors with an app, so you can let in guests even when you're not home. Burglars might try to hack the system, though it's often easier for them to just break a window.

As a precaution, disable any capabilities to unlock doors through a smart speaker voice command, especially if you have prankster kids or teens who might want to sneak someone in.

Though digital keys can be convenient for letting in guests and contractors, they can also leave a digital trail. In a child-custody dispute, for instance, your ex might subpoena the records to learn that you've been staying out late on school nights. If you rent and create a guest key that's used daily, the landlord might suspect an unauthorized occupant.

ABOUT THOSE TVs

Many smart TVs and TV streaming devices come with mics for voice-activated playback controls and video search. That means having audio snippets transmitted over the internet. The same warnings for smart speakers apply here.

There's a simple fix if you aren't using the internet features on your smart TV: Just don't connect the TV to your Wi-Fi in the first place. Of course, this won't work if you're not using a separate gadget for streaming video.

TOYS THAT TALK

Kids might get a kick out of dolls and other toys that talk back. But if the toy is connected to the internet, pay attention to how much control its giving parents and whether its letting kids connect to the outside world. You can check online to see if other parents or consumer groups have identified problems.

And be sure to install the latest apps and other software updates, as they may come with fixes for flaws that can otherwise be exploited by hackers.

Read more here:
Beware of the Smart Device: Ways to Stay Private and Safe - The New York Times

Read More..

A ton of Ruckus wireless routers are vulnerable to hackers – TechCrunch

A security researcher has found several vulnerabilities in a number of Ruckus wireless routers, which the networking giant has since patched.

Gal Zror told TechCrunch that the vulnerabilities he found lie inside in the web user interface software that runs on the companys Unleashed line of routers.

The flaws can be exploited without needing a routers password, and can be used to take complete control of affected routers from over the internet.

Routers act as a gateway between a home or office network and the wider internet. Routers are also a major line of defense against unauthorized access to that network. But routers can be a single point of failure. If attackers find and take advantage of vulnerabilities in the routers software, they can control the device and gain access to the wider internal network, exposing computers and other devices to hacks and data theft.

Zror said his three vulnerabilities can be used to to gain root privileges on the router the highest level of access allowing the attacker unfettered access to the device and the network.

Although the three vulnerabilities vary by difficulty to exploit, the easiest of the vulnerabilities uses just a single line of code, Zror said.

With complete control of a router, an attacker can see all of the networks unencrypted internet traffic. An attacker also can silently re-route traffic from users on the network to malicious pages that are designed to steal usernames and passwords.

Zror said that because many of the routers are accessible from the internet, they make very good candidates for botnets. Thats when an attacker forcibly enlists a vulnerable router or any other internet-connected device into its own distributed network, controlled by a malicious actor, which can be collectively told to pummel websites and other networks with massive amounts of junk traffic, knocking them offline.

There are thousands of vulnerable Ruckus routers on the internet, said Zror. He revealed his findings at the annual Chaos Communication Congress conference in Germany.

Ruckus told TechCrunch it fixed the vulnerabilities in the 200.7.10.202.92 software update, but said that customers have to update their vulnerable devices themselves.

By design our devices do not fetch and install software automatically to ensure our customers can manage their networks appropriately, said Ruckus spokesperson Aharon Etengoff. We are strongly advising our customers and partners to deploy the latest firmware releases as soon as possible to mitigate these vulnerabilities, he said.

Ruckus confirmed its SmartZone-enabled devices and Ruckus Cloud access points are not vulnerable.

Its very important for the customers to know that if theyre running an old version [of the software], they might be super vulnerable to this very simple attack, said Zror.

Originally posted here:
A ton of Ruckus wireless routers are vulnerable to hackers - TechCrunch

Read More..

4 Ways to Make Security Training A Priority in Your Healthcare Organization – HIT Consultant

Craig Smith, EVP of Operations at Absorb Software

cc

Healthcare finally made the shiftit went digital. Overdue, perhaps and maybe less rapid than the transition by other industries but nonetheless notable. The age of the Internet of Medical Things (IoMT) has dawned, and healthcare is riding the wave. You go, healthcare!

For healthcare organizations, the advent of IoMT means new technology tools like smart medical devices extending and streamlining care throughout the hospital. This gives clinicians more mobility and more efficiency in providing patient care. The shift to a completely digitized environment; however, gives the entire healthcare IT infrastructure something else to worry about: new cybersecurity risks.

Healthcare Cyber Threats Are Real

A recent study by Kaspersky confirms this cyber threat, with study data pointing to a significant lack of security awareness among healthcare organizations in both the U.S. and Canada. How big is this risk? Nearly one third (32%) of survey respondents said they had never received cybersecurity training from their employer, while 21% admitted they were not aware of the cybersecurity policy at their workplace.

This is a dangerously high level of exposure, especially when you consider the number of potential threats healthcare organizations face and the resulting impact on Personal Health Information (PHI) and associated data privacy regulations. Phishing attacks represent the biggest cybersecurity threat, cleverly disguised requests for login credentials to dupe unsuspecting employees into providing their usernames or passwords, which would then be used to gain unauthorized access to systems and data establishing an entry point into the target organization for data gathering and establishing an attack plan

Healthcare organizations urgently need a more proactive approach to security training.

Cybersecurity Isnt Just a Tech Problem

When it comes to cybersecurity, awareness matters. But business leaders need to think beyond their IT department and instead focus on training all employees on how to identify and address key risks. Everyone across the organizations regardless of his or her role needs to be equipped with knowledge and skills to protect against threats or attacks. And its not enough to just do the bare minimum to meet compliance or other regulatory requirements. Organizations need blended learning & development (L&D) and other training strategies that empower your employees to protect against cyber-attacks.

The following L&D guidance for cybersecurity training will help healthcare organizations overcome these hurdles and make security training more effective preventing untold costs in security incidents.

1. Make It Simple and Clear

People can be a powerful force when it comes to preventing cybercrime. But individuals often believe they are not a target, which exposes the organization to tremendous risk. Its important to address this misconception and explain the critical importance and benefits of leveraging a cybersecurity awareness and training program. Employee training should explain how threats work, and include recent examples of phishing messages. This will give learners a clear picture of how to detect possible threats, and respond accordingly. It is also recommended that organizations only focus on a single awareness and training topic per quarter to avoid overloading staff with too much information at one time.

2. Vary Your Training Techniques

Plan on using a blend of learning techniques to provide a combination of simulation and engagement. Why? This will build employee confidence in real-world security encounters. If you just lecture to your team, or more likely, have expert conduct the lecture, complete with ominous warnings about worst-case cybersecurity scenarios, your lesson may just backfire. Youll scare them about hackers, but not inspire any behavioral change. By blending the training techniques in your learning management system to include interactive components, videos, and a few real-life examples, you stand a much better chance of having the learning stick.

3. Keep a Steady Drumbeat of Learning

Continuous reinforcement of key lessons is more effective than long learning sessions that can be hard to digest. You can still perform annual cybersecurity training. But also assign microlessons and short quizzes throughout the year to keep learning fresh and top of mind. This way, when its test time everybodys ready to succeed. Thanks, coach!

4. Use Non-Experts

Perhaps the most important way to change employee behavior is by having the message about cybersecurity come from someone human and relatable. This approach can help employees build confidence in secure behaviors and avoid errors in real-world situations. Human behavior is more complex than just technical expertise. Including instructors with soft skills is crucial, according to a recent study of over 1,700 security pros from the SANS Institute. Enlist nontechnical staff members to create engaging learning modules, such as real-life examples your workforce can relate to.

The unique challenges of healthcare

Its been well established that healthcare is now more vulnerable to breaches than any other industry, and the implications of an attack go far beyond data privacy. Cyber incidents can potentially compromise patient safety and interfere with care delivery. Yet, healthcare workers are not getting the consistent education they need to keep organization and patient data safe. These vulnerabilities are exacerbated by the unique challenges healthcare presents, which makes training extremely difficult.

Unfortunately, there is no single, all-encompassing formula for ensuring that employees actually learn and apply the cybersecurity lessons theyre taught. Training can, however, go a long way in mitigating threats. By aligning with these tips, you can ensure your healthcare organization is taking the optimal steps to prepare your team for the new IoMT world, and its related cybersecurity risks.

About Craig Smith

Craig Smith serves as the Executive Vice President of Operations forAbsorb Software, acloud-based learning management system (LMS) engineered to inspire learning and fuel business productivity.Rising through the Absorb leadership ranks, Craig started as the Director of Technology before pivoting to lead Operations as its Vice President. Craig continues to leverage his IT roots to elevate the Absorb customer experience, drawing on his time as a developer at Honeywell International, building websites for clients at Autodata Solutions and leading a team of developers at AGAT Laboratories.

See the original post:
4 Ways to Make Security Training A Priority in Your Healthcare Organization - HIT Consultant

Read More..

The MS-ISAC Helps State and Local Governments Boost Their Cybersecurity – StateTech Magazine

As ransomware attacks proliferate across state and local governments, agencies can turn to a key federally funded ally the Multi-State Information Sharing and Analysis Center.

The MS-ISAC and the Elections Infrastructure Information Sharing and Analysis Center are staffed and operated by the Center for Internet Security through a cooperative agreement with the U.S. Department of Homeland Security at the CIS Security Operations Center24 hours a day, 365 days a year.

DHS designated the MS-ISAC as the key cyberthreat resource for the prevention, protection, response, and recovery for the state, local, tribal and territorial (SLTT) community. Throughout the past year, for example, the MS-ISAC helped SLTT agencies fight ransomware such as RobbinHood and LockerGoga.

Leveraging the experience of the MS-ISAC, CIS established the EI-ISAC following the 2016 elections. The EI-ISAC is fully operational in all 50 states, with over 2,000 local election offices as members. Membership is free to all SLTT agencies. EI-ISACs 24/7 operations share and correlate information on cyberthreats affecting members, including threats against internet-connected voting systems.

MORE FROM STATETECH: Discover how vulnerability scans can help secure election systems.

Sounds impressive, but what does the MS-ISAC really provide for its members? As a membership organization working exclusively with the SLTT community, the MS-ISAC has unparalleled insight into the cybersecurity threats and challenges faced by state and local government entities. Whether an agency is a large state IT department or a one- person operation handling a local school district, the MS-ISAC can help defend an organization from cyberthreats.

The CIS SOC is the MS-ISACs front line in the battle against cyberthreat actors. Trained SOC analysts and intelligence professionals work tirelessly reviewing logs and threat vectors, responding to calls and helping members navigate the complex world of cybersecurity. In conjunction with the SOC, the MS-ISAC offers members access to a premier computer emergency response team. This team provides forensic services, malware and vector identification.

The SOC team reviews thousands of logs more precisely, 37 petabytes of data per month looking for indicators of compromise. The data about cybercrimes affecting SLTT governments comes from open sources and nonpublic threat information received from the federal government.

In addition, the MS-ISACs intrusion detection system, called Albert, has been deployed across the United States and its territories. This passive monitoring device resides just outside members networks, where internet traffic meets members systems. The signature-based device is not a firewall; rather, it monitors network traffic to find suspicious activity. If a signature fires, the SOC is notified. Analysts review the event and determine what the signal is.

If warranted, the SOC then notifies an entity of a possible issue. The CIS ensures a very low false positive result thanks to a user review.

MORE FROM STATETECH:Keep an eye on these4 IT trends in state and local government in 2020.

The MS-ISAC ties this information together to provide its membership with timely alerts about attacking addresses and domains to help keep firewalls current. Combined with the ISACs IP- and domain-monitoring services and port profiler, the CIS offers a diverse toolkit to bolster cyberdefenses for MS-ISAC and EI-ISAC members.

These are just a few of the services offered to the SLTT community absolutely free of charge by the MS-ISAC. There are many others, including CIS SecureSuite membership, awareness campaigns, newsletters for both the security professional and the layperson, web-based malicious code analysis platforms, threat stream assessments and more.

To join the MS-ISAC or EI-ISAC and begin taking advantage of its many benefits, visit the Center for Internet Security at cisecurity.org.

More here:
The MS-ISAC Helps State and Local Governments Boost Their Cybersecurity - StateTech Magazine

Read More..

Discover Lafayette podcast with Rader Solutions’ security team: Here are 9 tips to prevent data breaches – The Advocate

Rader Cyber Security Team Discusses Threats to Small Businesses from Discover Lafayette on Vimeo.

The list of major security breaches keeps growing: Pensacola, Baltimore, the Texas Attorney General's Office, South Carolina Department of Revenue and the Louisiana Department of Motor Vehicles.

Success! An email has been sent with a link to confirm list signup.

Error! There was an error processing your request.

How do you protect your system from hackers? The cyber security team at Rader Solutions in Lafayette -- chief security officer Tim Fournet, head of security operations Sarah Bryson and cyber security analyst Tyler Robertson -- spoke about that with Jan Swift of the Discover Lafayette podcast.

You can listen to their conversation here.

Fournet, who has been with Rader for 14 years, said the company typically manages entire computer and telephone systems to prevent problems for businesses ranging in size from 10 to 1,000 employees.

With the increase of criminal activity over the internet, most of which is untraceable, Rader teachers clients to understand the risks that are out there and how to better protect themselves with security measures.

Here are Rader's nine computer safety tips:

1. Use strong passwords.

2. Dont email sensitive information.

3. Install computer and software updates.

4. When making payments online, make sure the website is using HTTPS.

5. Always secure your wireless network with a good password.

6. Dont write down passwords or store them in a MS Office document.

7. Be wary of email attachments from unknown senders.

8. Dont wire money based on an email request from a fellow employee without a verbal affirmation that the request is legitimate.

9. Lock your computer when you walk away.

Follow Adam Daigle on Twitter, @adamdaigleAdv.

See original here:
Discover Lafayette podcast with Rader Solutions' security team: Here are 9 tips to prevent data breaches - The Advocate

Read More..

#SocialSec Hot takes on this week’s biggest cybersecurity news (Dec 27) – The Daily Swig

Russia clamps down on the internet; ToTok used for state spying; and a critical vulnerability impacts Citrix applications worldwide

Vladimir Putins latest attempts to isolate Russia from the global internet caused the computer systems at several airports in the country to crash this week, according to an independent Russian TV station.

On December 24 The BBC reported that Russia had taken a major step towards emulating Iran and China in internet control after road-testing a gigantic intranet, in the words of computer scientist Professor Alan Woodward.

The sovereign Runet would effectively turn Russias online realm into a government-controlled walled garden by blocking, or regulating, the undersea nodes through which data is transmitted between national communication networks.

But while the Ministry of Communications claimed the test of the system was a success, Dozhd, or TV Rain, reported that check-in, baggage handling, and other systems at five airports had promptly crashed as a result of the operation.

Russia, which stands accused of weaponizing the global internet to destabilize liberal Western democracies, is also creating its own Wikipedia to combat fake news.

The United Arab Emirates (UAE) government is undermining digital rights beyond its own borders via a free messaging app with millions of users, US officials believe.

Apple and Google removed ToTok, a popular Emirati chat app, from their app stores following a report in The New York Times (December 22) that claimed UAE intelligence agencies were using the platform to track users conversations, locations, and photos, among other data.

ToTok, which blamed the removal on a technical issue, has alerted would-be users to its continuing availability through its own website, or their phone manufacturer's app store.

Only a few months old, the app already has users in Europe, Asia, Africa, and North America, as well as the Middle East.

A 22-year-old man who dodged jail after blackmailing Apple has claimed his elaborate extortion bluff started out as a legitimate business idea.

According to the UKs National Crime Agency (NCA), whose investigation led to his arrest, Kerem Albayrak threatened in 2017 to hack 250 million iCloud accounts, reset iCloud passwords, and factory-reset users' devices if the tech giant didnt pay a $100,000 ransom.

But Albayrak told Forbes that his ostensible hacking group, Turkish Crime Family, was actually a marketing vehicle and that he originally sought to whip up a storm of press coverage before launching a database search engine that would enable people to secure their accounts.

However, operating in a community frequented by cybercriminals had fuelled his decision to do something stupid in a bid to make a bigger PR splash.

Despite purporting to show otherwise in a now-deleted YouTube video, Albaryak only had access to login details leaked through other data breaches, according to Apple.

Albayrak was sentenced to a two-year suspended jail term, 300 hours of unpaid work, and a six-month electronic curfew at a London court on December 21.

And nothing screams the holidays better than a critical vulnerability impacting 80,000 companies worldwide.

On Monday (December 23) Positive Technologies disclosed a bug in two prominent Citrix applications that, if exploited, could allow an attacker to perform arbitrary code execution and obtain access to a companys local network via the internet.

Citrix products are typically used so that employees can connect to their companys internal applications remotely.

All versions of Citrix Application Delivery Controller (ACD) and Citrix Gateway are vulnerable to the flaw, which has been assigned as CVE-2019-19781 and is said to be easy to exploit since no authentication is required. A PoC has not been publicly released.

Considering the high risk brought by the discovered vulnerability, and how widespread Citrix software is in the business community, we recommend information security professionals take immediate steps to mitigate the threat, said Dmitry Serebryannikov, director of the security audit department at Positive Technologies in its blog post.

Companies operating in the US, the UK, Germany, the Netherlands, and Australia are among those affected. Citrix has advised these mitigation steps in its initial security bulletin from December 17. A patch is expected to be published in the near future.

And finally; Britains foreign intelligence service, MI6, has had a somewhat stressful festive season after sources in The Sunreport that building plans for the agencys iconic Vauxhall Cross headquarters had gone missing in the midst of refurbishment work.

More than 100 documents, which were sensitive but not classified, were implicated in the security breach, which is believed to have been an accident that occurred two weeks ago.

The source told the newspaper: The whole building went into lockdown and all the construction workers were kept in isolation.

To lose such sensitive documents was grossly irresponsible.

They showed the layout of the building and specifically where alarms and other security measures were. The documents would be gold dust to any enemy agents or terrorists.

Most of the documents were later found. Balfour Beatty, the construction company in charge of the renovation, was subsequently sacked.

Designed by Sir Terry Farrell, the MI6 HQ building, one that has become synonymous with the James Bond film franchise, was completed in 1994 for 135 ($177) million.

On reviewing the new addition to the Thames Embankment, British writer and design critic Deyan Sudjic is reported to have said: It's a design which combines high seriousness in its classical composition with a possible unwitting sense of humour.

The building could be interpreted equally plausibly as a Mayan temple or a piece of clanking art deco machinery.

Additional reporting by Catherine Chapman.

See the rest here:
#SocialSec Hot takes on this week's biggest cybersecurity news (Dec 27) - The Daily Swig

Read More..

Ookla Adds Free VPN To It’s Speedtest App For iOS And Android – Techworm

Speedtest.net is a popular web service around the worldthat provides free analysis ofinternet accessperformance metrics.

Now, Ookla, makers of the original Speedtest.net website, has launched a new free VPN service: Speedtest VPN, to spread its reach in the VPN market.

For those unaware, a Virtual Private Network (VPN) is an internet security toolthat encrypts your devices internet connection in order to secure your online privacy while browsing the internet.

A VPN also anonymizes your internet IP address and your geographic location.

Ookla has partnered with Seattle-based company NetProtect to offer this free VPN service. NetProtect already manages the infrastructure of major vendors including IPVanish, Encrypt.me, etc.

Like other VPN services, Ookla claims zero-logging policy and assignsshareableIP addressesfrom a collection of more than40,000 addressesto anonymize users identity.

In order to use Ooklas free VPN on your device, you need to use the latest version of the Speedtest app for Android or iOS.

Open the app and you will see the VPN option (with padlock icon) at the bottom of the Speedtest app. Tap on this to open VPN options. Here, you will see a toggle button, tap on this. Then follow the steps to create the Speedtest VPN profile on your device.

Currently, the Speedtest VPN service is in the beta phase and is being offered for free from within the Speedtest app.

Further, users get 2GB of free data to consume every month. However, once the VPN service comes out of beta, Ookla will offer paid plans to give users more bandwidth. Additionally, users who dont subscribe to the paid plans will still continue to get 2GB free data every month.

Currently, the Speedtest VPN service is only accessible to mobile users (Android and iOS). There is no option of VPN service for desktop clients.

If you are looking for a free VPN service to use, Speedtest can certainly be looked at as an option.

However, they are many other best free and paid VPN services available in the market. To know more, check out our article on The Best VPN Service For 2020.

Read the rest here:
Ookla Adds Free VPN To It's Speedtest App For iOS And Android - Techworm

Read More..

Chess Team Makes Right Moves at Pan-Am, Advances to Final Four – University of Texas at Dallas

Text size: campus

Dec. 30, 2019

For the 17th time in 20 years, The University of Texas at Dallaschess team will travel to New York to participate in the 2020 Final Four tournament. The finals berth comes after the team placed fourth in the Pan-American Intercollegiate Team Chess Championship this week.

The Presidents Cup, which is considered the Final Four of College Chess, will be held in April at the historic Marshall Chess Club in New York City.

The competition among the top collegiate chess programs has gotten fierce over the last few years, said Jim Stallings, UTDallaschess program director. For our chess team to make it to the Final Four tournament again is quite an achievement. Im very proud of our team members.

UT Dallas was among 63 teams participating in the Pan-Am tournament, which was held in Charlotte, North Carolina, on Dec. 27-30.

All credit goes to the guys for making the most of their chances when they came their way. While luck always plays a part in this tournament, our players were focused and ready.

UT Dallas chess team coach Julio Catalino Sadorra

The Pan-American tournament featured six rounds of play over four days. Some universities were represented by only one team, while others, such as UT Dallas, brought multiple teams to the contest. En route to its fourth-place finish, UT Dallas defeated teams from Webster University, the University of Missouri, Texas Tech University and the University of Pennsylvania.

The UT Dallas team consisting of Gil Popilski, David Berczes, Craig Hilby and Angel Arribas Lopez earned the Final Four berth for the University with a 5-1 record.

UT Dallas chess team coach Julio Catalino Sadorra said he was particularly pleased that one of the UT Dallas teams defeated the reigning Final Four champion, UT Rio Grande Valley.

All credit goes to the guys for making the most of their chances when they came their way, Sadorra said. While luck always plays a part in this tournament, our players were focused and ready.

The Comets will face Texas Tech, Webster and St. Louis University at the Presidents Cup tournament.

While the opponents are ranked higher than UT Dallas, Sadorra said he believes the team can again demonstrate a gritty, fighting spirit in representing the University at the Final Four.

On paper, our chances are lower. However, if we do what we did at this tournament, focusing on what we can control, we definitely have a chance to win, he said.

Media Contact: Phil Roth, UT Dallas, (972) 883-2193,[emailprotected]or the Office of Media Relations, UT Dallas, (972) 883-2155, [emailprotected]

Originally posted here:

Chess Team Makes Right Moves at Pan-Am, Advances to Final Four - University of Texas at Dallas

Read More..

Chess builds up a lot of tension, you are constantly lost in your own thoughts: Viswanathan Anand – India Today

Viswanathan Anand will be appearing in the New Year episode of India Today Inspiration in which he will be talking about his future in chess, the talent emerging from India in the sport and much more.

(Photo courtesy: Boria Majumdar Twitter)

Five-time world chess champion Viswanathan Anand is into his fifth decade in the sport but is showing no signs of stopping. Anand recently celebrated his 50th birthday on December 10th and also launched his book 'Mind Masters' just a couple of days later.

Anand, India's torchbearer in chess and the country's first-ever Grand Master, has inspired a legion of players over decades. But the fire inside him as a chess player is still burning and he is as hungry as ever to get back to winning the big tournaments.

2019 wasn't a great year for Anand and he himself was the first to admit that. He finished tied third spots in both the Tata Steel Masters in Wijk aan Zee and also at the 2019 Gashimov Memorial chess tournament in Shamkir, Azerbaijan.

But the New Year promises a new start for Anand and he is looking forward to new challenges against much-younger opponents.

"Chess builds up a lot of tension, you are constantly lost in your own thoughts, you have a lot of negative and positive emotions sitting inside and they are just knocking around.

"Given the demands of chess today and the pace at which it's going, this is quite hard. I am still able to play and cope and it is satisfying that I do so," Anand told in the New Year episode of India Today Inspiration.

So where is the next Anand coming from and is he happy with the future of Indian chess?

"About Indian chess, there are things that I like very much and there are things that we need to work on. I would like to work with a lot of these youngsters and help them because in the future, I'd be very proud of someone that I helped went on to become a world champion," Anand said.

The rest is here:

Chess builds up a lot of tension, you are constantly lost in your own thoughts: Viswanathan Anand - India Today

Read More..

Raunak shines in World blitz chess too, secures a higher finish – Times of India

Raunak Sadhwani gave yet another performance rating of above 2600 Elo points to make his mark in the World Blitz Chess Championship which concluded at Moscow, Russia, on Monday.

At an Elo of 2490, city's only Grandmaster was given a starting rank of 150. On his way to yet another performance like a strong GM, the 14-year-old finished the 21-round event in the Open category, where Magnus Carlsen emerged as the eventual champion, at a much higher 121st position.

Raunak surprised as many as eight higher ranked Grandmasters and held four rated opponents to finish his maiden World event collecting 10 points. In the shortest format, Raunak lost nine rounds.

The biggest upset the Centre Point Student did in his first open World Championship came in the very first round when he stunned 2657 Elo and 48th seed Alexey Sarana. Thereafter he suffered back-to-back defeats but brought himself back on track by stunning Israel's 52nd seeded GM Emil Sutovsky.

Original post:

Raunak shines in World blitz chess too, secures a higher finish - Times of India

Read More..