The Ocean Cleanup , a Dutch foundation that aims to deal with plastics polluting our seas, says it’s finally ready to put its technology to work. In a statement released today, the organization has revealed that it plans to start cleaning up the Great Pacific Garbage Patch in early 2018 using its newly redesigned cleaning system. That garbage patch is the biggest collection of debris in the ocean, a massive soup of visible and microscopic plastic particles poisoning marine life. The ship captain who discovered it in 2003 said he “never found a clear spot” in the week it took to cross the region. While Boyan Slat (the organization’s founder) originally envisioned trapping plastic trash with one large screen tethered to the ocean floor, the new design is smaller, sturdier and can save the group a ton of money. Instead of deploying a 60-mile stationary screen, they plan on releasing 50 smaller ones that measure 0.6 miles in length. They’ll weigh the floating screens down with anchor, so they can move with the currents like plastics do, albeit a bit slower in order to trap debris. Slat told FastCompany that he expected the original design to clean up half of the massive garbage patch in 10 years for $320 million. Now, he expects the new design to cut that timespan in half and to cost the group significantly less than that amount. Since he and his team still need to fund the project, though, they plan to use the plastic they collect to make items they can sell, such as sunglasses, chairs and car bumpers. Source: The Ocean Cleanup
See more here:
50 floating screens will clean the Pacific garbage patch next year
An anonymous reader writes: The Necurs botnet has been harnessed to fling a new strain of ransomware dubbed “Jaff”. Jaff spreads in a similar way to the infamous file-encrypting malware Locky and even uses the same payment site template, but is nonetheless a different monster. Attached to dangerous emails is an infectious PDF containing an embedded DOCM file with a malicious macro script. This script will then download and execute the Jaff ransomware. Locky — like Jaff — also used the Necurs botnet and a booby-trapped PDF, security firm Malwarebytes notes. “This is where the comparison ends, since the code base is different as well as the ransom itself, ” said Jerome Segura, a security researcher at Malwarebytes. “Jaff asks for an astounding 2 BTC, which is about $3, 700 at the time of writing.” Proofpoint reckons Jaff may be the work of the same cybercriminals behind Locky, Dridex and Bart (other nasty malware) but this remains unconfirmed. And Forcepoint Security Labs reports that malicious emails carrying Jaff are being cranked out at a rate of 5 million an hour on Thursday, or 13 million in total at the time it wrote up a blog post about the new threat. Read more of this story at Slashdot.