Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission + - Bank missed signs of money laundering :o (amlcube.com)

An anonymous reader writes: The Fowler Oldfield and NatWest Money Laundering Scandal — What Went Wrong

1: Unprecedented Cash Deposits – Fowler Oldfield’s predicted turnover was £15 million per year. Instead, the company deposited £365 million in under five years.

2: Scottish Banknotes Deposited Across England – Large volumes of Scottish banknotes were deposited in various NatWest branches in England, an indicator of drug-related money laundering. NatWest was made aware of this by authorities but did not take appropriate action.

3: Suspicious Deposit Methods – Cash was delivered to NatWest branches in black bin liners, sports bags, and takeaway food containers. The sums deposited were so large that some branches ran out of secure storage space.

4: Transaction Monitoring System Failures – The bank’s automated system misclassified large cash deposits as cheque deposits, significantly reducing oversight. This occurred due to outdated rule sets that treated deposits at certain branches as lower risk. Approximately £165 million of transactions were affected by this error.

5: Inexplicable Downgrading of Risk Classification – Despite the high-risk nature of jewellery businesses and the growing cash deposits, Fowler Oldfield’s risk classification was downgraded in 2013. This decision removed key layers of oversight, allowing the laundering to continue unchecked.

6:Lack of Effective Internal Controls – There was no central mechanism to aggregate warnings from different branches, making it easier for suspicious activity to slip through the cracks. Frontline employees flagged concerns, but no robust escalation framework ensured these reports led to meaningful action. Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout https://www.securityjoes.com/p... Our investigation has revealed an innovative approach that leverages executables commonly found in the trusted WinSxS folder and exploits them via the classic DLL Search Order Hijacking technique. This method allows threat actors to circumvent high privilege requirements to execute malicious code in applications within the Windows folder, specifically WinSxS, and eliminates the need for additional binaries in the attack chain. Furthermore, it facilitates the execution of malicious code from any location, and it is compatible with both Windows 10 and 11.

Submission + - Germany is building the worlds largest wind turbine

Qbertino writes: Heise, a (the) German IT news publisher reports (English version by Google Translate) that the German state of Brandenburg is getting the worlds highest wind turbine, with an overall height of 300m designed to capture so-called 3rd level winds at higher altitudes. The article also has a short 3D animation illustrating construction and size relative to regular modern wind turbines.

Comment Re:Three letters (Score 1) 32

The article keeps referring to "domains", which means DNS-level, in which case VPN would be overkill. You would just need to use a uncompromised DNS server, and HTTPS. Using an adblocking DNS server will also fix the site-blocking problem.

      But it sounds like there is more here, with vague words like "geoblock websites to limit access in the relevant jurisdiction to those websites through Cloudflare’s pass-through security and CDN services".
    Can someone explain? Does this mean blocking IP addresses? Wouldn't that also block a lot of other sites sharing the same server set and IP addresses? Or is Cloudflare using some sort of packet analysis, ports or traffic patterns, to block individual sessions?

Slashdot Top Deals

After a number of decimal places, nobody gives a damn.

Working...