ChiefMonkeyGrinder writes: Clydesdale Bank and Yorkshire Bank have blamed a software glitch for under-calculating customer mortgage repayments. In a statement, the banks have admitted to miscalculating around 18,000 borrowers’ repayments, which has led to customers underpaying. Customers are now being told to fork out more money as the banks try to recoup the money customers should have been paying in line with their mortgage terms.
SnugglesTheBear writes: 'The browser, which is based on version 3.6 of Firefox, comes with Adobe Reader and Flash plug-ins, as well as the ability to create 'white' and 'black' lists of the processes that may be started during web surfing as well as the sites that can be visited.
"Limiting browser use to specific sites can control usage and protect from cross-site scripting attacks. By specifying which sites are to be blocked, it makes it easy to keep users away from known bad sites, and thereby limit their exposure to attacks," Dell said.' Coupled with the malware shipped in Dell's motherboards, you will still have an infected machine, but perhaps this can help..
suraj.sun writes: The Lightspark project has released version 0.4.2 of its free, open source Flash player. According to Lightspark develoepr Alessandro Pignotti, the alternative Flash Player implementation is "designed from the ground up to be efficient on current and (hope fully) future hardware".
The latest release of Lightspark features better compatibility with YouTube videos, sound synchronisation support and the ability to use fontconfig for font selection. Other changes include plug-in support for Google's Chrome/Chromium web browser and support for Firefox's out of process plug-in (OOPP) mode, which was added in version 3.6.4 of the browser.
Trailrunner7 writes: Threatpost has an interesting column that provides a detailed analysis of the notorious Black Energy 2 botnet, which has been wreaking havoc with DDoS attacks, spam operations and playing a part in web redirects and malware campaigns. "The bot has several main functions: it hides the malware code from antivirus products, infects system processes and, finally, offers flexible options for conducting a range of malicious activities on an infected computer when commands are received from the botnet command-and-control (C&C) center. Each task is performed by a different component of the malicious program.
Initially, the Black Energy bot was created with the aim of conducting DDoS attacks, but with the implementation of plugins in the bot’s second version, the potential of this malware family has become virtually unlimited. (However, so far cybercriminals have mostly used it as a DDoS tool). Plugins can be installed, e.g. to send spam, grab user credentials, set up a proxy server etc. The upd command can be used to update the bot, e.g. with a version that has been encrypted using a different encryption method. Regular updates make it possible for the bot to evade a number of antivirus products, any of which might be installed on the infected computer, for a long time.
This malicious tool has high potential, which naturally makes it quite a threat. Luckily, since there are no publicly available constructors online which can be used online to build Black Energy 2 bots, there are fewer variants of this malware than say, ZeuS or the first version of Black Energy. However, the data we have shows that cybercriminals have already used Black Energy 2 to construct large botnets, and these have already been involved in successful DDoS attacks.
sciencehabit writes: Science reports: Using the world's most powerful ground-based telescope, astronomers have identified the seven heaviest stars ever found. One of these "blue supergiants" has a mass equivalent to 300 of our Suns—or twice as much mass as prevailing theory said a star could acquire. All will eventually go supernova, but the type of explosion they will generate is unknown. They could form neutron stars or black holes or obliterate themselves.
xednieht writes: Bosnian man's house hit an incredible 6 times by meteorites — believes ET is messing with him. The odds of being hit by a meteorite are very small yet since 2007 his house has been hit 6 times. Belgrade University confirms the rocks he handed over are in fact meteorites.
An anonymous reader writes: Despite a number of announcements in recent months that ARM and Marvell would be having a tilt at the server market, an analyst from Future Horizons gives them little hope of success. Big players like Google are solidly based on Intel, need 64-bit processing and will not migrate to ARM for legacy reasons, according to Mike Bryant, quoted here.
crimeandpunishment writes: Attorneys for Facebook and a New York man claiming majority ownership of the site faced off in a Buffalo courtroom Tuesday, and if Facebook gets its way there won't be too many more days in court. The site wants to get Paul Ceglia's claim thrown out of court. He claims a seven-year-old agreement with Facebook founder Mark Zuckerberg entitles him to 84 percent of the company. Facebook acknowledges Ceglia and Zuckerberg worked together, but says the contract Ceglia submitted was full of "things that don't make sense".
An anonymous reader writes: Researchers at New Energy Technologies Inc. (Burtonsville, Maryland), are developing SolarWindow technology, and plan to unveil a working prototype of the world's first-ever glass window capable of generating electricity in a matter of weeks, according to this EE Times story. Up until now solar cells have been opaque. But if you can see through a solar cell why shouldn't we make every window a solar cell?
Maria Williams writes: The Lifeboat Foundation is a nonprofit that seeks to protect people from some seriously catastrophic technology-related events. It funds research that would prevent a situation where technology has run amok, sort of like a pre-Fringe Unit.
The organization has a ton of areas that it's looking into, ranging from artificial intelligence to asteroids. A particular interest for the group revolves around building shields and lots of them, such as Neuroethics Shield — "to prevent abuse in the areas of neuropharmaceuticals, neurodevices, and neurodiagnostics."
DMandPenfold writes: Barack Obama welcomed the British Prime Minister to talks at the White House yesterday, with the President suggesting there may be a better "way through" for the case of NASA and Pentagon hacker Gary McKinnon.
alphadogg writes: Is Snort, the 12-year-old open-source intrusion detection and prevention system, dead?
The Open Information Security Foundation (OISF), a nonprofit group funded by the U.S. Dept. of Homeland Security (DHS) to come up with next-generation open source IDS/IPS, thinks so. But Snort's creator, Martin Roesch, begs to differ, and in fact, calls the OISF's first open source IDS/IPS code, Suricata 1.0 released this week, a cheap knock-off of Snort paid for with taxpayer dollars.
The OISF was founded about a year and a half ago with $1 million in funding from a DHS cybersecurity research program, according to Matt Jonkman, president of OISF. He says OISF was founded to form an open source alternative and replacement to Snort, which he says is now considered dead since the research on what is supposed to be the next-generation version of Snort, Snort 3.0, has stalled.
"Snort is not conducive to IPv6 nor to multi-threading," Jonkman says, adding, "And Snort 3.0 has been scrapped."
According to Jonkman, OISF's first open source release Suricata 1.0 is superior to Snort in a number of ways, including how it can inspect network packets using a multi-threading technology to inspect more than one packet at a time, which he claims improves the chances of detecting attack traffic