As the first round of the 2025 Stanley Cup Playoffs heats up, Rogers announced today a preview of Rogers Xfinity Multiview, a new service that gives Canadian hockey fans the chance to watch two games at once – all on the same screen.
Rogers Xfinity Multiview will launch on select nights throughout the first round of the 2025 Stanley Cup Playoffs starting Monday, April 21 at 9:30 p.m. ET. Customers just need to say “Multiview” into their award-winning voice remote to enjoy side-by-side coverage, with the ability to switch audio and add captions.
These exclusive events are a free preview of the new Rogers Xfinity Multiview experience, starting with this year’s 2025 Stanley Cup Playoffs. Rogers plans to continue building on its Rogers Xfinity Multiview experience, including the ability to watch up to four live events at the same time, increasing the number of sports, and the ability for customers to build their own Multiview experience.
Starting tonight, customers can experience these matchups using Rogers Xfinity Multiview:
- April 21: Colorado at Dallas (9:30 p.m. ET) and Edmonton at Los Angeles (10 p.m. ET)
- April 22: New Jersey at Carolina (6 p.m. ET) and Ottawa at Toronto (7:30 p.m. ET), Florida at Tampa Bay (8:30 p.m. ET) and Minnesota at Vegas (11 p.m. ET)
- April 23: Dallas at Colorado (9:30 p.m. ET) and Edmonton at Los Angeles (10 p.m. ET)
- April 24: Florida at Tampa Bay (6:30 p.m. ET) and Toronto at Ottawa (7 p.m. ET), Vegas at Minnesota (9 p.m. ET) and Winnipeg at St. Louis (9:30 p.m. ET)
- April 25: Washington at Montreal (7 p.m. ET) and Carolina at New Jersey (8 p.m. ET)
Sportsnet is the place to catch all the 2025 Stanley Cup playoff action and Rogers Xfinity gives Canadians the best seat in the house. To learn more about Rogers Xfinity visit rogers.com/xfinity.
Google OAuth Abused by Phishers to Spoof Google in DKIM Replay Attack
Posted in Commentary with tags Google on April 21, 2025 by itnerdIn a novel attack, hackers are sending fake emails that appear to come from Google’s systems – no-reply@google.com – bypassing all verifications and the DomainKeys Identified Mail (DKIM) authentication method and pointing to a fraudulent page that collects logins.
You can get more details about this here: https://threadreaderapp.com/thread/1912439023982834120.html
Roger Grimes, data-driven defense evangelist at KnowBe4, commented:
“DMARC, DKIM, and SPF all focus on the DNS domain involved. The “email address” portion can change and the DMARC, DKIM, and SPF check will be just fine. So, if I can get an email sent from a common, global domain like google.com or hotmail.com, I can get nearly any email address name I like (e.g., the realbillgates@gmail.com) and it’s going to pass the checks.
DMARC, DKIM, and SPF should be understood this way: I claim to be from this and this domain (e.g., google.com) and if I pass the checks, I really am from that claimed domain. The user still has to look at the entire email address (friendly name and domain name) and figure out if it is or isn’t legitimate for the domain being claimed. On top of that, malicious scammers deploy DMARC, DKIM, and SPF at higher rates than non-scammers. Scammers early on decided that they needed all the domains they used to have DMARC, DKIM, and SPF enabled so their scammy email didn’t end up in the Junk Mail, Spam folder, or be rejected and never make it to the end-user. To that end, DMARC, DKIM, and SPF have been a total success. And at the same time it is a victim of its own success, with scammers using it even more than legitimate senders.”
I have certainly seen this with this attack that makes refund scam emails look like they are coming from Microsoft. Thus I am not shocked that this is happening on the Google side of the fence. And I fully expect to see more of this sort of thing going forward.
Leave a comment »