lottery results today
2025-01-09   

lottery results today
lottery results today Robinson won’t appear at Trump’s North Carolina rally after report on online posts, AP sources say

Soccer-Villa end winless run with nervy win over BrentfordMannatech Stock Soars to 52-Week High, Hits $10.6It is an ambitious social experiment of our moment in history — one that experts say could accomplish something that parents, schools and other governments have attempted with varying degrees of success: keeping kids off social media until they turn 16. Australia’s new law, approved by its Parliament last week, is an attempt to swim against many tides of modern life — formidable forces like technology, marketing, globalization and, of course, the iron will of a teenager. And like efforts of the past to protect kids from things that parents believe they’re not ready for, the nation’s move is both ambitious and not exactly simple, particularly in a world where young people are often shaped, defined and judged by the online company they keep. The ban won’t go into effect for another year. But how will Australia be able to enforce it? That’s not clear, nor will it be easy. TikTok, Snapchat and Instagram have become so ingrained in young people’s lives that going cold turkey will be difficult. Other questions loom. Does the ban limit kids’ free expression and — especially for those in vulnerable groups — isolate them and curtail their opportunity to connect with members of their community? And how will social sites verify people’s ages, anyway? Can’t kids just get around such technicalities, as they so often do? This is, after all, the 21st century — an era when social media is the primary communications tool for most of those born in the past 25 years who, in a fragmented world, seek the common cultures of trends, music and memes. What happens when big swaths of that fall away? Is Australia’s initiative a good, long-time-coming development that will protect the vulnerable, or could it become a well-meaning experiment with unintended consequences? Platforms will be held liable The law will make platforms including TikTok, Facebook, Snapchat, Reddit, X and Instagram liable for fines of up to 50 million Australian dollars ($33 million) for systemic failures to prevent children younger than 16 from holding accounts. “It’s clear that social media companies have to be held accountable, which is what Australia is trying to do,” said Jim Steyer, president and CEO of the nonprofit Common Sense Media. Leaders and parents in countries around the world are watching Australia’s policy closely as many seek to protect young kids from the internet’s dangerous corners — and, not incidentally, from each other. Most nations have taken different routes, from parental consent requirements to minimum age limits. Many child safety experts, parents and even teens who have waited to get on social media consider Australia’s move a positive step. They say there’s ample reason to ensure that children wait. “What’s most important for kids, just like adults, is real human connection. Less time alone on the screen means more time to connect, not less,” said Julie Scelfo, the founder of Mothers Against Media Addiction, or MAMA, a grassroots group of parents aimed at combatting the harms of social media to children. “I’m confident we can support our kids in interacting in any number of ways aside from sharing the latest meme.” The harms to children from social media have been well documented in the two decades since Facebook’s launch ushered in a new era in how the world communicates. Kids who spend more time on social media, especially as tweens or young teenagers, are more likely to experience depression and anxiety, according to multiple studies — though it is not yet clear if there is a causal relationship. What’s more, many are exposed to content that is not appropriate for their age, including pornography and violence, as well as social pressures about body image and makeup. They also face bullying, sexual harassment and unwanted advances from their peers as well as adult strangers. Because their brains are not fully developed, teenagers, especially younger ones the law is focused on, are also more affected by social comparisons than adults, so even happy posts from friends can send them into a negative spiral. What unintended harms could be caused? Many major initiatives, particularly those aimed at social engineering, can produce side effects — often unintended. Could that happen here? What, if anything, do kids stand to lose by separating kids and the networks in which they participate? Paul Taske, associate director of litigation at the tech lobbying group NetChoice, says he considers the ban “one of the most extreme violations of free speech on the world stage today” even as he expressed relief that the First Amendment prevents such law in the United States “These restrictions would create a massive cultural shift,” Taske said. “Not only is the Australian government preventing young people from engaging with issues they’re passionate about, but they’re also doing so even if their parents are ok with them using digital services,” he said. “Parents know their children and their needs the best, and they should be making these decisions for their families — not big government. That kind of forcible control over families inevitably will have downstream cultural impacts.” David Inserra, a fellow for Free Expression and Technology, Cato Institute, called the bill “about as useful as an ashtray on a motorbike” in a recent blog post. While Australia’s law doesn’t require “hard verification” such as an uploaded ID, he said, it calls for effective “age assurance.” He said no verification system can ensure accuracy while also protecting privacy and not impacting adults in the process. Privacy advocates have also raised concerns about the law’s effect on online anonymity, a cornerstone of online communications — and something that can protect teens on social platforms. “Whether it be religious minorities and dissidents, LGBTQ youth, those in abusive situations, whistleblowers, or countless other speakers in tricky situations, anonymous speech is a critical tool to safely challenge authority and express controversial opinions,” Inserra said. A spot check of kids at one mall in the Australian city of Brisbane on Wednesday didn’t turn up a great deal of worry, though. “Social media is still important because you get to talk to people, but I think it’s still good that they’re like limiting it,” said Swan Son, a 13-year-old student at Brisbane State High School. She said she has had limited exposure to social media and wouldn’t really miss it for a couple of years. Her parents already enforce a daily one-hour limit. And as for her friends? “I see them at school every day, so I think I’ll be fine.” Conor Negric, 16, said he felt he’d dodged a bullet because of his age. Still, he considers the law reasonable. “I think 16 is fine. Some kids, I know some kids like 10 who’re on Instagram, Snapchat. I only got Instagram when I was 14.” His mom, Sive Negric, who has two teenage sons, said she was happy for her boys to avoid exposure to social media too early: “That aspect of the internet, it’s a bit ‘meanland.’” Other countries are trying to figure it out, too Parents in Britain and across Europe earlier this year organized on platforms such as WhatsApp and Telegram to promise not to buy smartphones for children younger than 12 or 13. This approach costs almost no money and requires no government enforcement. In the United States, some parents are keeping kids off social media either informally or as part of an organized campaign such as Wait Until 8th, a group that helps parents delay kids’ access to social media and phones. This fall, Norway announced plans to ban kids under 15 from using social media, while France is testing a smartphone ban for kids under 15 in a limited number of schools — a policy that could be rolled out nationwide if successful. U.S. lawmakers have held multiple congressional hearings — most recently in January — on child online safety. Still, the last federal law aimed at protecting children online was enacted in 1998, six years before Facebook’s founding. In July, the U.S. Senate overwhelmingly passed legislation designed to protect children from dangerous online content, pushing forward with what would be the first major effort by Congress in decades to hold tech companies more accountable. But the Kids Online Safety Act has since stalled in the House. While several states have passed laws requiring age verification, those are stuck in court. Utah became the first state to pass laws regulating children’s social media use in 2023. In September, a judge issued the preliminary injunction against the law, which would have required social media companies to verify the ages of users, apply privacy settings and limit some features. NetChoice has also obtained injunctions temporarily halting similar laws in several other states. And last May, U.S. Surgeon General Vivek Murthy said there is insufficient evidence to show social media is safe for kids. He urged policymakers to treat social media like car seats, baby formula, medication and other products children use. “Why should social media products be any different? Scelfo said. “Parents cannot possibly bear the entire responsibility of keeping children safe online, because the problems are baked into the design of the products.”

It looked like a recipe for disaster. So, when his country's swimmers were being accused of doping earlier this year, one Chinese official cooked up something fast. He blamed it on contaminated noodles. In fact, he argued, it could have been a culinary conspiracy concocted by criminals, whose actions led to the cooking wine used to prepare the noodles being laced with a banned heart drug that found its way into an athlete's system. This theory was spelled out to international anti-doping officials during a meeting and, after weeks of wrangling, finally made it into the thousands of pages of data handed over to the lawyer who investigated the case involving 23 Chinese swimmers who had tested positive for that same drug. The attorney, appointed by the World Anti-Doping Agency, refused to consider that scenario as he sifted through the evidence. In spelling out his reasoning, lawyer Eric Cottier paid heed to the half-baked nature of the theory. "The Investigator considers this scenario, which he has described in the conditional tense, to be possible, no less, no more," Cottier wrote. Even without the contaminated-noodles theory, Cottier found problems with the way WADA and the Chinese handled the case but ultimately determined WADA had acted reasonably in not appealing China's conclusion that its athletes had been inadvertently contaminated. Critics of the way the China case was handled can't help but wonder if a wider exploration of the noodle theory, details of which were discovered by The Associated Press via notes and emails from after the meeting where it was delivered, might have lent a different flavor to Cottier's conclusions. "There are more story twists to the ways the Chinese explain the TMZ case than a James Bond movie," said Rob Koehler, the director general of the advocacy group Global Athlete. "And all of it is complete fiction." In April, reporting from the New York Times and the German broadcaster ARD revealed that the 23 Chinese swimmers had tested positive for the banned heart medication trimetazidine, also known as TMZ. China's anti-doping agency determined the athletes had been contaminated, and so, did not sanction them. WADA accepted that explanation, did not press the case further, and China was never made to deliver a public notice about the "no-fault findings," as is often seen in similar cases. The stock explanation for the contamination was that traces of TMZ were found in the kitchen of a hotel where the swimmers were staying. In his 58-page report, Cottier relayed some suspicions about the feasibility of that chain of events — noting that WADA's chief scientist "saw no other solution than to accept it, even if he continued to have doubts about the reality of contamination as described by the Chinese authorities." But without evidence to support pursuing the case, and with the chance of winning an appeal at almost nil, Cottier determined WADA's "decision not to appeal appears indisputably reasonable." A mystery remained: How did those traces of TMZ get into the kitchen? Shortly after the doping positives were revealed, the Institute of National Anti-Doping Organizations held a meeting on April 30 where it heard from the leader of China's agency, Li Zhiquan. Li's presentation was mostly filled with the same talking points that have been delivered throughout the saga — that the positive tests resulted from contamination from the kitchen. But he expanded on one way the kitchen might have become contaminated, harkening to another case in China involving a low-level TMZ positive. A pharmaceutical factory, he explained, had used industrial alcohol in the distillation process for producing TMZ. The industrial alcohol laced with the drug "then entered the market through illegal channels," he said. The alcohol "was re-used by the perpetrators to process and produce cooking wine, which is an important seasoning used locally to make beef noodles," Li said. "The contaminated beef noodles were consumed by that athlete, resulting in an extremely low concentration of TMZ in the positive sample. "The wrongdoers involved have been brought to justice." This new information raised eyebrows among the anti-doping leaders listening to Li's report. So much so that over the next month, several emails ensued to make sure the details about the noodles and wine made their way to WADA lawyers, who could then pass it onto Cottier. Eventually, Li did pass on the information to WADA general counsel Ross Wenzel and, just to be sure, one of the anti-doping leaders forwarded it, as well, according to the emails seen by the AP. All this came with Li's request that the noodles story be kept confidential. Turns out, it made it into Cottier's report, though he took the information with a grain of salt. "Indeed, giving it more attention would have required it to be documented, then scientifically verified and validated," he wrote. Neither Wenzel nor officials at the Chinese anti-doping agency returned messages from AP asking about the noodles conspiracy and the other athlete who Li suggested had been contaminated by them. Meanwhile, 11 of the swimmers who originally tested positive competed at the Paris Games earlier this year in a meet held under the cloud of the Chinese doping case. Though WADA considers the case closed, Koehler and others point to situations like this as one of many reasons that an investigation by someone other than Cottier, who was hired by WADA, is still needed. "It gives the appearance that people are just making things up as they go along on this, and hoping the story just goes away," Koehler said. "Which clearly it has not." Get local news delivered to your inbox!Decking the halls for the Christmas Cheer Breakfast

Saquon Barkley: "Pretty cool" to set Eagles single-season rushing record - NBC SportsNoneNone

NoneVANCOUVER, British Columbia, Dec. 03, 2024 (GLOBE NEWSWIRE) -- Anfield Energy Inc. (TSX.V: AEC; OTCQB: ANLDF; FRANKFURT: 0AD) (“Anfield” or “the Company”) is pleased to announce that the proposed plan of arrangement (the “Arrangement”) between the Company and IsoEnergy Ltd. was approved at the Company’s special meeting of shareholders (the "Meeting") held on December 3, 2024. The resolution approving the Arrangement (the “Arrangement Resolution”) was required to be passed by: (i) the affirmative vote of at least two-thirds (66 2⁄3%) of the votes cast by Anfield shareholders present in person or represented by proxy and entitled to vote at the Meeting (the “Shareholder Vote”); and (ii) a simple majority of the votes cast by shareholders present in person or represented by proxy at the Meeting and entitled to vote at the Meeting, excluding votes held by persons described in items (a) through (d) of Section 8.1(2) of Multilateral Instrument 61-101 – Protection of Minority Security Holders in Special Transactions, being the votes held by Corey Dias, Joshua Bleak and Ken Mushinski. The hearing of the application for a final order in respect of the Arrangement is scheduled for December 6, 2024, or as soon thereafter as the application can be heard. Closing of the Arrangement remains subject to customary closing conditions, including receipt of court and stock exchange approvals. Subject to the satisfaction of these closing conditions, the parties currently expect to complete the Arrangement in December 2024. Anfield is also pleased to announce that the parties have received written notice from the Committee on Foreign Investment in the United States that it has concluded its review of the Arrangement and determined that there are no unresolved national security concerns with respect to the Arrangement. About Anfield Anfield is a uranium and vanadium development and near-term production company that is committed to becoming a top-tier energy-related fuels supplier by creating value through sustainable, efficient growth in its assets. Anfield is a publicly traded corporation listed on the TSX Venture Exchange (AEC-V), the OTCQB Marketplace (ANLDF) and the Frankfurt Stock Exchange (0AD). On behalf of the Board of Directors ANFIELD ENERGY INC. Corey Dias, Chief Executive Officer Contact: Anfield Energy, Inc. Corey Dias, Chief Executive Officer Clive Mostert, Corporate Communications 780-920-5044 contact@anfieldenergy.com www.anfieldenergy.com Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this news release. No securities regulatory authority has either approved or disapproved of the contents of this news release. None of the securities to be issued pursuant to the Arrangement have been or will be registered under the United States Securities Act of 1933, as amended (the “ U.S. Securities Act “), or any state securities laws, and any securities issuable in the Arrangement are anticipated to be issued in reliance upon available exemptions from such registration requirements pursuant to Section 3(a)(10) of the U.S. Securities Act and applicable exemptions under state securities laws. This press release does not constitute an offer to sell, or the solicitation of an offer to buy, any securities. Cautionary Note Regarding Forward-Looking Information This press release contains “forward-looking information” within the meaning of applicable Canadian securities legislation. Generally, forward-looking information can be identified by the use of forward-looking terminology such as “plans”, “expects” or “does not expect”, “is expected”, “budget”, “scheduled”, “estimates”, “forecasts”, “intends”, “anticipates” or “does not anticipate”, or “believes”, or variations of such words and phrases or state that certain actions, events or results “may”, “could”, “would”, “might” or “will be taken”, “occur” or “be achieved”. These forward-looking statements or information may relate to the Arrangement, including statements with respect to the timing of the hearing of the application for a final order in respect of the Arrangement, satisfaction of conditions and timing for the completion of the Arrangement and availability of the exemption under Section 3(a)(10) of the U.S. Securities Act with respect to the securities issuable in the Arrangement and any other activities, events or developments that the companies expect or anticipate will or may occur in the future. Forward-looking statements are necessarily based upon a number of assumptions that, while considered reasonable by management at the time, are inherently subject to business, market and economic risks, uncertainties and contingencies that may cause actual results, performance or achievements to be materially different from those expressed or implied by forward-looking statements. Such assumptions include, but are not limited to, assumptions that the timing of the final order or closing of the Arrangement will occur as anticipated, that the final order in respect of the Arrangement will be obtained, that the conditions to closing of the Arrangement will be satisfied or waived and that the exemption under Section 3(a)(10) of the U.S. Securities Act with respect to the securities issuable in the Arrangement will be available. Although the Company has attempted to identify important factors that could cause actual results to differ materially from those contained in forward-looking information, there may be other factors that cause results not to be as anticipated, estimated or intended. There can be no assurance that such information will prove to be accurate, as actual results and future events could differ materially from those anticipated in such statements. Accordingly, readers should not place undue reliance on forward-looking information. Such statements represent the current views of the Company with respect to future events and are necessarily based upon a number of assumptions and estimates that, while considered reasonable by the Company, are inherently subject to significant business, economic, competitive, political and social risks, contingencies and uncertainties. Risks and uncertainties include, but are not limited to the following: that the hearing of the final order and the closing of the Arrangement may not occur on the anticipated timeline; that the final order may not be obtained; that the closing conditions of the Arrangement may not be satisfied or waived; and that the parties to the Arrangement may be unable to rely on the exemption under Section 3(a)(10) of the U.S. Securities Act with respect to the securities issuable in the Arrangement. The Company does not undertake to update any forward-looking information, except in accordance with applicable securities laws.

EDMONTON - Alberta’s Technology Minister Nate Glubish says he’s hoping to see $100 billion worth of artificial intelligence data centres under construction within the next five years. Such centres are filled with computer servers used by companies like Meta to develop and train large-scale artificial intelligence models. Glubish says Meta, as well as other major companies including Google and Amazon, are on the hunt for space to build more facilities, and he wants Alberta to be an option. He says landing some data centres would create jobs and bring in much needed new tax revenue for the province. Glubish also says that since Alberta’s electricity grid regulations allows for off-grid power generation, he thinks the province is an ideal location. He says allowing for off-grid power connections where power generators supply data centres directly also means there’s less risk for Albertans, as there wouldn’t be major drains on the electrical grid. This report by The Canadian Press was first published Dec. 4, 2024.Alberta minister wants to see $100B in data centre infrastructure in next five years

Logility Adds New AI Capabilities to Supply Chain Management Offering

President-elect Donald Trump’s lawyers urge judge to toss his hush money conviction

EDMONTON - Alberta’s Technology Minister Nate Glubish says he’s hoping to see $100 billion worth of artificial intelligence data centres under construction within the next five years. Such centres are filled with computer servers used by companies like Meta to develop and train large-scale artificial intelligence models. Glubish says Meta, as well as other major companies including Google and Amazon, are on the hunt for space to build more facilities, and he wants Alberta to be an option. He says landing some data centres would create jobs and bring in much needed new tax revenue for the province. Glubish also says that since Alberta’s electricity grid regulations allows for off-grid power generation, he thinks the province is an ideal location. He says allowing for off-grid power connections where power generators supply data centres directly also means there’s less risk for Albertans, as there wouldn’t be major drains on the electrical grid. This report by The Canadian Press was first published Dec. 4, 2024.Ousted Syrian leader Assad flees to Moscow after fall of Damascus, Russian state media sayFBI Warning—Online Holiday Shopping Scams Could Ruin Your 2024 Season

The Las Vegas Grand Prix kicked off with an unexpected twist this week at Formula 1 . During the second free practice session, it wasn't the usual track talk about lap times or track conditions being discussed by the drivers. Instead, they were commenting on the pervasive cannabis aroma filling the air around the circuit. See Also: Cannabis Can Be A ‘Great Tool In Dealing With Adversity,’ Says Former NFL Star Ricky Williams The first to bring it up was young Argentine driver Colapinto . After his media interview following practice, he made a candid observation that quickly went viral. "Yes, there was a smell of weed. If they do a doping test on the drivers now, I think everyone would test positive, I swear," Colapinto joked. "When we all test positive, it'll be a mess," the 21-year-old William’s driver said in a playful tone. Colapinto wasn't alone in noticing the cannabis scent. Red Bull's Sergio “Checo” Pérez also weighed in, concerned about the track conditions: “Practice 1 was a total disaster, the track was very dirty.” According to Infobae, he quickly added: "What's really noticeable around the whole circuit is the smell of marijuana all night long. I'm a little tired of it, the amount of odor is unbelievable. It's something that all the drivers will surely talk about." Cannabis In Las Vegas: What You Need to Know Since recreational cannabis became legal in Nevada in 2017, adults 21 and over can legally possess up to 2.5 ounces of cannabis flower or 0.25 ounces of THC concentrate, including edibles. However, while cannabis use is widespread in the city, public consumption remains off-limits. Smoking or using cannabis in public places is prohibited, with consumption confined to private residences or licensed lounges. Read Next: Will Cannabis Be A Game-Changer For Athletes? NFL’s $1M Study Suggests It Could Image created using photos from Shutterstock and Unsplash. © 2024 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Telehealth companies and other industry stakeholders have had a watchful eye towards the end of 2024 and the impending “telehealth cliff” as COVID-era Drug Enforcement Agency (DEA) flexibilities and Medicare expanded telehealth coverage are set to expire. Although a recent temporary joint rule from the DEA and the Department of Health and Human Services (HHS) along with the 2025 Medicare Physician Fee Schedule final rule has provided some hope, questions regarding telehealth access in 2025 and under a new Administration remain unclear. Further, calls continue for increased oversight of telehealth services. Below, we breakdown recent updates for the telehealth industry. DEA Telehealth Flexibilities Providing some good news, late last month the DEA and HHS jointly issued a temporary rule (the Temporary Rule) extending the COVID-era flexibilities for prescribing controlled substances via telehealth through the end of 2025. The flexibilities, which previously were twice extended and set to expire December 31, 2024, temporarily waive the in-person requirements for prescribing under the Controlled Substances Act. The DEA and HHS issued the Temporary Rule to ensure that providers and patients who have come to rely on telehealth services are able to smoothly transition to the new requirements, which as previously covered , are likely to significantly limit providers’ ability to prescribe controlled substances without an in-person interaction. The Temporary Rule also acknowledges that the DEA and HHS continue to work with relevant stakeholders and will use the additional time to promulgate proposed and final regulations that “effectively expand access to telemedicine” in a manner that is consistent with public health and safety, while mitigating the risk of diversion. The agencies also note that the limited time period of the extension is aimed at avoiding investment in new telemedicine companies that may encourage or enable problematic prescribing practices. The Temporary Rule effectively allows all DEA-registered providers to prescribe Schedule II-V controlled substances via telehealth through the end of 2025, regardless of when the provider-patient relationship was formed. Consistent with the prior temporary rules, the following requirements continue to apply: The prescription must be issued for a legitimate medical purpose by a practitioner acting in the usual course of professional practice. The prescription must be issued pursuant to a telehealth interaction using two-way, real-time audio-visual technology, or for prescriptions to treat a mental health disorder, a two-way, real-time audio-only communication if the patient is not capable of, or does not consent to, the use of video technology. The practitioner must be authorized under their DEA registration to prescribe the basic class of controlled medication specified on the prescription or be exempt from obtaining a registration to dispense controlled substances. The prescription must meet all other requirements of the DEA regulations. Providers should also be cognizant of applicable state laws that may place additional restrictions on the ability to prescribe certain medications or otherwise provide treatment via telehealth. Medicare Coverage of Telehealth Services Unlike the DEA flexibilities, many of the COVID-era flexibilities for traditional Medicare coverage of telehealth services will end on December 31, 2024. Despite bipartisan support, congressional action is required to extend broad coverage for certain telehealth services existing since March 2020. Most notably, unless Congress acts, beginning January 1, 2025 expiring flexibilities include waiving the originating site requirements to allow beneficiaries to receive services in their homes and expanding the list of Medicare-enrolled providers who can furnish telehealth services. Further, beginning January 1, 2025, Medicare coverage of telehealth services for beneficiaries outside of rural health care settings will be limited to: Monthly End-Stage Renal Disease visits for home dialysis; Services for diagnosis, evaluation, or treatment of symptoms of an acute stroke; Treatment of substance use disorder or a co-occurring mental health disorder, or for the diagnosis, evaluation or treatment of a mental health disorder; Behavioral health services; Diabetes self-management training; and Nutrition therapy. For its part, the Centers for Medicare & Medicaid Services (CMS) recently issued its 2025 Medicare Physician Fee Schedule Final Rule (the MPFS Final Rule) extending and making permanent certain telehealth flexibilities within its authority. In particular, through December 31, 2025, practitioners may continue to utilize live video to meet certain Medicare direct supervision requirements and reference their currently enrolled practice when providing telehealth services from their home. The MPFS Final Rule continues to remove frequency limitations for certain hospital inpatient/observation care, skilled nursing facility visits, and critical care consultation services furnished via telehealth. Additionally, the MPFS Final Rule makes permanent the utilization of audio-only telehealth for any Medicare-covered telehealth service. Increased Telehealth Oversight Recent months also have seen renewed calls for increased oversight of telehealth services. In September, the HHS Office for Inspector General (OIG) issued a report (the OIG Report) recommending increased oversight of Medicare coverage of remote patient monitoring. As a basis for its findings, the OIG Report cites the dramatic increased utilization of and payments for remote patient monitoring from 2019 to 2022, the fact that over 40% of Medicare beneficiaries receiving remote patient monitoring did not receive all three components of the service (i.e., education and setup, device supply, and treatment management), and the observation that Medicare lacks key information regarding the data being collected and the types of monitoring devices utilized. Notably, OIG conducted its review in part because of the potential for significant expansion of remote patient monitoring in the Medicare population. Given these factors, the OIG Report recommends that CMS: Separately, concerns also have been raised regarding the recent emergence of direct-to-consumer telehealth platforms sponsored by pharmaceutical companies. In this model, patients seeking specific medications are linked to a health care provider who can virtually prescribe the requested medication. In October, U.S. Senate Majority Whip Dick Durbin (D-IL), joined by Senators Bernie Sanders (I-VT), Peter Welch (D-VT), and Elizabeth Warren (D-MA) sent letters to several pharmaceutical companies requesting written response to questions regarding these platforms including the cost of direct-to-consumer advertising, the arrangements between the telehealth providers and the pharmaceutical companies, and whether the virtual consultation comply with the standard of care. Conclusion Despite attempts to preserve and expand telehealth access and affordability, effective January 1, 2025, many Medicare beneficiaries will be cut off from certain telehealth services unless one of the bills currently pending in Congress is passed. Crucially, bipartisan support for increased access to telehealth services is likely to continue in both chambers of Congress. Although the incoming Administration has not detailed its plans regarding telehealth access on a permanent, or even temporary basis, telehealth will continue to play an important role in the United States health care system through 2025 and beyond. As telehealth continues to play an important role in increasing access to care, increased oversight and enforcement is almost certain, even if future oversight priorities are unclear. As always, we will continue to monitor and report on important telehealth developments.

WASHINGTON — A top White House official said Wednesday at least eight U.S. telecom firms and dozens of nations were impacted by a Chinese hacking campaign. Deputy national security adviser Anne Neuberger offered new details about the breadth of the that gave officials in Beijing access to private texts and phone conversations of an unknown number of Americans. Neuberger divulged the scope of the hack a day after the FBI and the Cybersecurity and Infrastructure Security Agency intended to help root out the hackers and prevent similar cyberespionage in the future. White House officials cautioned that the number of telecommunication firms and countries impacted could grow. The U.S. believes the hackers were able to gain access to communications of senior U.S. government officials and prominent political figures through the hack, Neuberger said. “We don’t believe any classified communications has been compromised,” Neuberger added during a call with reporters. She added that Biden was briefed on the findings and the White House “made it a priority for the federal government to do everything it can to get to the bottom this.” The Chinese embassy in Washington rejected the accusations that it was responsible for the hack Tuesday after the U.S. federal authorities issued new guidance. “The U.S. needs to stop its own cyberattacks against other countries and refrain from using cyber security to smear and slander China,” embassy spokesperson Liu Pengyu said. The embassy did not immediately respond to messages Wednesday. White House officials believe the hacking was regionally targeted and the focus was on very senior government officials. Federal authorities confirmed in October that hackers linked to China of then-presidential candidate Donald Trump and his running mate, Sen. JD Vance, along with people associated with Democratic candidate Vice President Kamala Harris. The number of countries impacted by the hack is currently believed to be in the “low, couple dozen,” according to a senior administration official. The official, who spoke on the condition of anonymity under rules set by the White House, said they believed the hacks started at least a year or two ago. The released Tuesday are largely technical in nature, urging encryption, centralization and consistent monitoring to deter cyber intrusions. If implemented, the security precautions could help disrupt the operation, dubbed Salt Typhoon, and make it harder for China or any other nation to mount a similar attack in the future, experts say. Neuberger pointed to efforts made to beef up cybersecurity in the rail, aviation, energy and other sectors following . “So, to prevent ongoing Salt Typhoon type intrusions by China, we believe we need to apply a similar minimum cybersecurity practice,” Neuberger said. The cyberattack by a gang of criminal hackers on the critical U.S. pipeline, which delivers about 45% of the fuel used along the Eastern Seaboard, sent ripple effects across the economy, highlighting cybersecurity vulnerabilities in the nation’s aging energy infrastructure. Colonial confirmed it paid $4.4 million to the gang of hackers who broke into its computer systems as it scrambled to get the nation's fuel pipeline back online.

Rams can take huge step toward NFC West title by avenging 31-point loss to CardinalsWASHINGTON — A top White House official said Wednesday at least eight U.S. telecom firms and dozens of nations were impacted by a Chinese hacking campaign. Deputy national security adviser Anne Neuberger offered new details about the breadth of the sprawling Chinese hacking campaign that gave officials in Beijing access to private texts and phone conversations of an unknown number of Americans. FILE - The American and Chinese flags wave at Genting Snow Park ahead of the 2022 Winter Olympics, in Zhangjiakou, China, on Feb. 2, 2022. A top White House official on Wednesday said at least eight U.S. telecom firms and dozens of nations have been impacted by a Chinese hacking campaign. (AP Photo/Kiichiro Sato, File) Neuberger divulged the scope of the hack a day after the FBI and the Cybersecurity and Infrastructure Security Agency issued guidance intended to help root out the hackers and prevent similar cyberespionage in the future. White House officials cautioned that the number of telecommunication firms and countries impacted could grow. The U.S. believes the hackers were able to gain access to communications of senior U.S. government officials and prominent political figures through the hack, Neuberger said. “We don’t believe any classified communications has been compromised,” Neuberger added during a call with reporters. She added that Biden was briefed on the findings and the White House “made it a priority for the federal government to do everything it can to get to the bottom this.” US officials recommend encrypted messaging apps amid "Salt Typhoon" cyberattack, attributed to China, targeting AT&T, Verizon, and others. The Chinese embassy in Washington rejected the accusations that it was responsible for the hack Tuesday after the U.S. federal authorities issued new guidance. “The U.S. needs to stop its own cyberattacks against other countries and refrain from using cyber security to smear and slander China,” embassy spokesperson Liu Pengyu said. The embassy did not immediately respond to messages Wednesday. White House officials believe the hacking was regionally targeted and the focus was on very senior government officials. Federal authorities confirmed in October that hackers linked to China targeted the phones of then-presidential candidate Donald Trump and his running mate, Sen. JD Vance, along with people associated with Democratic candidate Vice President Kamala Harris. The number of countries impacted by the hack is currently believed to be in the “low, couple dozen,” according to a senior administration official. The official, who spoke on the condition of anonymity under rules set by the White House, said they believed the hacks started at least a year or two ago. The suggestions for telecom companies released Tuesday are largely technical in nature, urging encryption, centralization and consistent monitoring to deter cyber intrusions. If implemented, the security precautions could help disrupt the operation, dubbed Salt Typhoon, and make it harder for China or any other nation to mount a similar attack in the future, experts say. Trump's pick to head the Federal Bureau of Investigation Kash Patel was allegedly the target of cyberattack attempt by Iranian-backed hackers. Neuberger pointed to efforts made to beef up cybersecurity in the rail, aviation, energy and other sectors following the May 2021 ransomware attack on Colonial Pipeline . “So, to prevent ongoing Salt Typhoon type intrusions by China, we believe we need to apply a similar minimum cybersecurity practice,” Neuberger said. The cyberattack by a gang of criminal hackers on the critical U.S. pipeline, which delivers about 45% of the fuel used along the Eastern Seaboard, sent ripple effects across the economy, highlighting cybersecurity vulnerabilities in the nation’s aging energy infrastructure. Colonial confirmed it paid $4.4 million to the gang of hackers who broke into its computer systems as it scrambled to get the nation's fuel pipeline back online. Picture this: You're on vacation in a city abroad, exploring museums, tasting the local cuisine, and people-watching at cafés. Everything is going perfectly until you get a series of alerts on your phone. Someone is making fraudulent charges using your credit card, sending you into a panic. How could this have happened? Cyberattacks targeting travelers are nothing new. But as travel has increased in the wake of the COVID-19 pandemic, so has the volume of hackers and cybercriminals preying upon tourists. Financial fraud is the most common form of cybercrime experienced by travelers, but surveillance via public Wi-Fi networks, social media hacking, and phishing scams are also common, according to a survey by ExpressVPN . Spokeo consulted cybersecurity sources and travel guides to determine some of the best ways to protect your phone while traveling, from using a VPN to managing secure passwords. Online attacks are not the only type of crime impacting travelers—physical theft of phones is also a threat. Phones have become such invaluable travel aids, housing our navigation tools, digital wallets, itineraries, and contacts, that having your phone stolen, lost, or compromised while abroad can be devastating. Meanwhile, traveling can make people uniquely vulnerable to both cyber and physical attacks due to common pitfalls like oversharing on social media and letting your guard down when it comes to taking risks online. Luckily, there are numerous precautions travelers can take to safeguard against cyberattacks and phone theft. Hackers can—and do—target public Wi-Fi networks at cafés and hotels to gain access to your personal information or install malware onto your device, particularly on unsecured networks. Travelers are especially vulnerable to these types of cybersecurity breaches because they are often more reliant on public Wi-Fi than they would be in their home countries where they have more robust phone plans. This reliance on public, unsecured networks means travelers are more likely to use those networks to perform sensitive tasks like financial transfers, meaning hackers can easily gain access to banking information or other passwords. One easy way to safeguard yourself against these breaches is to use a virtual private network, or VPN, while traveling. VPNs are apps that encrypt your data and hide your location, preventing hackers from accessing personal information. An added bonus is that VPNs allow you to access websites that may be blocked or unavailable in the country you are visiting. To use a VPN, simply download a VPN app on your phone or computer, create an account, choose a server, and connect. Pickpockets, scammers, and flagrant, snatch-your-phone-right-out-of-your-hand thieves can be found pretty much everywhere. In London, for instance, a staggering 91,000 phones were reported stolen to police in 2022 , breaking down to an average of 248 per day, according to the BBC. Whether you're visiting a crowded tourist attraction or just want peace of mind, travel experts advise taking precautions to make sure your phone isn't physically stolen or compromised while traveling. There are several antitheft options to choose from. If you want a bag that will protect your phone from theft, experts recommend looking for features like slash-resistant fabric, reinforced shoulder straps, hidden zippers that can be locked, and secure attachment points, like a cross-body strap or a sturdy clip. For tethers, look for those made of tear-resistant material with a reinforced clip or ring. If your phone falls into the wrong hands, there's a good chance you won't be getting it back. Out of those 91,000 phones stolen in London in 2022, only 1,915 (or about 2%) were recovered. The good news is that you can take precautions to make the loss of your phone less devastating by backing up your data before you travel. With backed-up data, you can acquire a new device and still access your photos, contacts, messages, and passwords. Moreover, if you have "Find My Device" or "Find My Phone" enabled, you can remotely wipe your stolen phone's data so the thief cannot access it. It's safest to back up your data to a hard drive and not just the cloud. That way, if you have to wipe your device, you don't accidentally erase the backup, too. In order for the previous tip on this list to work, "Find My Phone" must be turned on in advance, but remotely wiping your device isn't the only thing this feature allows you to do. The "Find My Phone" feature enables you to track your device, as long as it's turned on and not in airplane mode. This is particularly helpful if you misplaced your phone or left it somewhere since it can help you retrace your steps. While this feature won't show you the live location of a phone that has been turned off, it will show the phone's last known location. With "Find My Phone," you can also remotely lock your phone or enable "Lost Mode," which locks down the phone, suspends any in-phone payment methods, and displays contact information for returning the phone to you. If your phone was stolen, experts caution against taking matters into your own hands by chasing down the thief, since this could land you in a potentially dangerous situation and is unlikely to result in getting your phone back. Strong passwords for important accounts help protect your information while you travel, but it's just a first step. The National Cybersecurity Alliance recommends creating long, unique, and complex passwords for every account and combining them with multifactor authentication to create maximum barriers to entry. If you're worried about remembering these passwords, password managers can be a vital tool for both creating and storing strong passwords. Password managers are apps that act as secure vaults for all your passwords. Some even come with a feature that allows you to temporarily delete sensitive passwords before you travel and then easily restore them once you return. Story editing by Mia Nakaji Monnier. Additional editing by Kelly Glass. Copy editing by Tim Bruns. Photo selection by Lacy Kerrick. This story originally appeared on Spokeo and was produced and distributed in partnership with Stacker Studio. Get the latest local business news delivered FREE to your inbox weekly.

Global Times: China’s aircraft carriers make confident strides toward blue waters, play pivotal role in national defenseBrayden Point's 4-point night leads the Lightning over the Canucks 4-2

Pete Hegseth's mother says The New York Times made 'threats' by asking her to comment on a story

Related hot word search:

Previous: lottery online betting
Next: today lottery result