Author: Zachariah Boren

  • Go big in Vegas. Consider a convention sponsorship

    02.04.10 01:12 PM

    Why sponsor, exhibit or advertise at the 95th Annual Kiwanis InternationalConvention? With nearly 6,000 attendees, your investment has the potentialto see a significant return. Kiwanians have tremendous purchasing power and ourmembership encompasses leaders from throughout the world. Don't miss thisopportunity to market to the single largest gathering of your peers!

    Download the Sponsor andExhibitor Prospectus and discover the unique opportunities to participate.

    Sponsorship options include convention presentingsponsor, Internet Café, official souvenir tote bag, welcome reception,relaxation station, family lounge and the official convention program. Variousbudget ranges exist to suit your company's social or civic mission. Sponsorshipspots are available on a first come, first served basis. Submit your interest assoon as possible for prime sponsorship spots.

    Sponsorship questions? Contact Al Smith at [email protected].

    Booths in the exhibit hall will put your programs,services and products front and center to thousands of browsing Kiwanians overthe convention's four exhibiting days (Wednesday-Saturday). Booth space must bereserved via signed contract by May 3. Space goes fast – submit yourapplication today.

    Advertising space in the official convention programsells out quickly. Reserve your ad space early (no later than April 16) toensure your message makes it into the hands of every attendee in June. Thepower of your message doesn't fade at the end of convention-programs travelhome with Kiwanians and are shared with club members unable to make the trip toLas Vegas.

    Booth or advertising questions? Contact Kim Stephenson at [email protected].

    http://community.kiwanisone.org/blog…onsorship.aspx

  • 02.01.10 02:07 PM – LA Parks

    02.01.10 02:07 PM

    REMEMBERING A FALLEN HERO’S LEGACY
    Renaming of West Valley Park in honor of Officer Randal D. Simmons

    Reseda – It has been almost two years since LAPD SWAT Officer Randal D. Simmons died in the line of duty but his heroism and dedication are still making undying influences. On Thursday, January 28, 2010 the Department of Recreation and Parks, in partnership with Councilmember Dennis P. Zine, brought together Officer Simmons’ family, friends and colleagues for a special ceremony to remember the fallen hero.

    West Valley Park was renamed as LAPD SWAT Officer Randal D. Simmons Park and will serve as a tribute to his personal sacrifice and his community advocacy. A 27-year LAPD veteran, Officer Simmons was shot during a standoff on February 7, 2008 in Winnetka (about a mile away from the community park). He was the first SWAT officer to die in the unit’s 40-year history.

    Officer Simmons has been described by his colleagues as loyal, selfless, focused, compassionate, brave and inspirational. He committed much of his time to helping and comforting people in urban neighborhoods including Watts, Hacienda Heights, Compton and Carson. He was an ordained minister at Glory Christian Fellowship International. Simmons was instrumental in developing programs and Christian events for at-risk youth such as the annual "Greatest Toy Giveaway" which provided toys and gifts to over 1,000 needy children during the holiday season.

    The ceremony included the unveiling of the new park sign and remarks from General Manager Jon Kirk Mukri, former LAPD officer Councilmember Zine, Assistant Chief Micheal Moore, Deputy Chief Kirk Albanese and Captain John Incontro. Officer Simmons’ wife Lisa also spoke thanking the City for the honor and added, "I know Randy is looking down and smiling and couldn’t be happier because this is a park where children will come and play, families will gather and people will jog. They’ll see his name and know he was a great man."

    LAPD SWAT Officer Randal D. Simmons Park is located at 6731 Wilbur Avenue in the Reseda community. The 8.38 acre park includes a children’s play area, walking paths and picnic tables.

    Although he is no longer with us and will be missed, his charitable and giving legacy will live on forever. Officer Simmons is survived by his wife Lisa, son Matthew and daughter Garbrielle.

    MEDIA CONTACTS:
    Jane Kolb: (213) 202-2694
    Amy A. Garcia: (213) 202-2689

    LA Parks News and Information …

  • Malicious Web Site / Malicious Code: Malicious Google Job Application Response

    Sat, 30 Dec 1899 12:00:00 AM GMT

    Websense Security Labs? ThreatSeeker? Network has discovered a new malicious spam campaign that spoofs Google job application responses. The messages look very well written and are so believable that they are probably scrapes from actual Google job application responses. Typically, spam has grammatical errors or spelling mistakes that make the messages obviously unofficial and act as red flags. The text of these messages, however, has no such mistakes, making them much more believable–especially if the target really has applied for a job with Google.

    The From: address is even spoofed to fool victims into believing the message was sent by Google. The messages have an attached file called CV-20100120-112.zip that contains a malicious payload. This is where the message gets suspicious, because the contents of the .zip file have a double extension ending with .exe. The attackers attempt to hide the .exe extension by preceding it with .html or .pdf, followed by a number of spaces and then the .exe extension. The .exe file (SHA1:80366cde71b84606ce8ecf62b5bd2e459c54942e) has little AV coverage at the moment.

    Websense Messaging and Websense Web Security customers are protected against this attack.

    http://securitylabs.websense.com/con…erts/3543.aspx

  • Malicious Web Site / Malicious Code: Oklahoma Tax Commission Site Compromised

    01.28.10 04:00 PM

    Websense Security Labs? ThreatSeeker? Network has discovered that the home page of the Oklahoma Tax Commission Web site has been compromised with malicious script code. The heavily obfuscated code has been injected at the bottom of the page.

    Here is what site visitors see when they visit the Oklahoma Tax Commission home page:

    After the page is loaded, the browser executes the injected script in the background.

    Below is a screen shot of the injected code:

    The injected script code goes through a series of deobfuscation techniques that ultimately take the victim computer to an attack Web site without the victim’s consent or knowledge.

    At the time of this posting, the attack Web site is down, but it could come back up at anytime to carry out attacks against visitors to the Oklahoma Tax Commission home page.

    Websense Messaging and Websense Web Security customers are protected against this attack.

    http://securitylabs.websense.com/con…erts/3540.aspx

  • Malicious Web Site / Malicious Code: Apple Tablet Announcement Black SEO

    01.26.10 04:00 PM

    Websense Security Labs? ThreatSeeker? Network has discovered that search terms related to the forthcoming Apple Tablet announcment have already become the latest target for Blackhat SEO poisoning attacks.

    In the lead up to Apple’s official announcment which is scheduled to happen today, there has been a great deal of anticipation and speculation over the Internet. As people become interested in finding more information on the product, related search terms are currently gaining momentum, and as they do so Blackhat SEO attacks are starting to climb up the search result listings.

    Below is a screenshot from Google Trends showing how one of the targeted phrases by Black SEO "apple tablet announcement" is starting to gain momentum:

    Black SEO attacks start climbing up in search ranks, clicking on such result leads to a Rogue Antivirus site:

    The file in the rogue AV site has 30% detection rate. If the file is installed it reports non-existent infections and disturbs the user with on going pop-ups. In order to "clean" the system the rogue program is offered for a price:


    Websense® Messaging and Websense Web Security customers are protected against this attack.

    http://securitylabs.websense.com/con…erts/3538.aspx