Programming Bug Costs Citigroup $7M After Legit Transactions Mistaken For Test Data For 15 Years

An anonymous reader shares a report on The Register:A programming blunder in its reporting software has led to Citigroup being fined $7m. According to the US Securities and Exchange Commission (SEC), that error [PDF] resulted in the financial regulator being sent incomplete “blue sheet” information for a remarkable 15 years — from May 1999 to April 2014. The mistake was discovered by Citigroup itself when it was asked to send a large but precise chunk of trading data to the SEC in April 2014 and asked its technical support team to help identify which internal ID numbers they should run a request on. That team quickly noticed that some branches’ trades were not being included in the automated system and alerted those above them. Four days later a patch was in place, but it wasn’t until eight months later that the company received a formal report noting that the error had affected SEC reports going back more than a decade. The next month, January 2015, Citigroup fessed up to the SEC.The glitch resided in new alphanumeric branch codes that the bank had introduced in the mid-1990s. The program code filtered out any transactions that were given three-digit branch codes from 089 to 100 and used those prefixes for testing purposes. The report adds, “But in 1998, the company started using alphanumeric branch codes as it expanded its business. Among them were the codes 10B, 10C and so on, which the system treated as being within the excluded range, and so their transactions were removed from any reports sent to the SEC.” Read more of this story at Slashdot.

View article:
Programming Bug Costs Citigroup $7M After Legit Transactions Mistaken For Test Data For 15 Years

Pokemon Go Becomes Biggest Mobile Game In US History

An anonymous reader writes: Pokemon Go is now the biggest mobile game of all time in the U.S. Not only has it surpassed Twitter’s daily users, but it is seeing people spend more time in its app than in Facebook. An earlier report from SimilarWeb says Pokemon Go has surpassed Tinder in terms of installations — the app surpassed Tinder on July 7th. Today, the tracking firm says Pokemon Go has managed to surpass Twitter in terms of daily active users on Monday. It says almost 6% of the entire U.S. Android population is engaging with the app on a daily basis. A new report from SurveyMonkey intelligence indicated that Pokemon Go has claimed the title “biggest mobile game in U.S. history.” The game saw just under 21 million daily active users in the U.S. on Monday. It’s reportedly closing in on Snapchat on Android, and could surpass Google Maps on Android as well. According to app store intelligence firm SensorTower, the average iPhone user on iOS spent 33 minutes catching Pokemon, which is more than any other apps it analyzed, including Facebook, Snapchat, Twitter, Instagram, and Slither.io. The app with the second-most average usage at 22 minutes, 8 seconds, was Facebook. SurveyMonkey did note that Pokemon Go still falls short of other games when it comes to time spent in games. Game of War sees nearly 2 hours of total daily usage for the average user, while Candy Crush Saga sees daily usage of about 43 minutes. In just two days, Pokemon Go brought Nintendo’s market value to $7.5 billion. It’s worth noting that it remains to be seen whether or not the game will continue to break records or turn into a ghost town like Nintendo’s first mobile game, Miitomo. Read more of this story at Slashdot.

View article:
Pokemon Go Becomes Biggest Mobile Game In US History

Ubuntu’s Unity desktop environment can run in Windows

An anonymous Slashdot reader writes: “This is one of the coolest tickets I’ve seen on GitHub, ” writes Ubuntu developer Adolfo Jayme Barrientos, adding “this kind of surreal compatibility between platforms is now enabled…the fact that you can execute and use Linux window managers there, without virtual machines, is simply mind-blowing.” “The Windows 10 Anniversary Update coming in August includes an unusual feature aimed at developers: an Ubuntu sub-system that lets you run Linux software using a command-line interface, ” explains Liliputing.com “Preview versions have been available since April, and while Microsoft and Canonical worked together to bring support for the Bash terminal to Windows 10, it didn’t take long for some users to figure out that they could get some desktop Linux apps to run in Windows. Now it looks like you can even load Ubuntu’s Unity desktop environment, making windows 10 look like Ubuntu. Read more of this story at Slashdot.

Read More:
Ubuntu’s Unity desktop environment can run in Windows

Wendy’s Says More Than 1,000 Restaurants Affected By Hack

An anonymous reader writes from a report via ABC News: The fast food giant Wendy’s has reported today that hackers were able to steal customers’ credit and debit card information at 1, 025 of its U.S. restaurants. The company said Thursday hackers were able to obtain card numbers, names, expiration dates and codes on the card, beginning in late fall. Some customers’ cards were used to make fraudulent purchases at other stores. Wendy’s first announced it was investigating a possible hack in January. In May, it found malware in fewer than 300 restaurants; two types of malware were found two months later and the number of restaurants affected was “considerably higher.” There are more than 5, 700 Wendy’s restaurants in the U.S. Customers can check to see which locations were affected via Wendy’s website. The company said it is offering free one-year credit monitoring to people who paid with a card at any of those restaurants. In May, Wendy’s announced plans to start automating all of its restaurants with self-service ordering kiosks. Read more of this story at Slashdot.

View post:
Wendy’s Says More Than 1,000 Restaurants Affected By Hack

Password Sharing Is a Federal Crime, Appeals Court Rules

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: “In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an ‘unauthorized’ use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that ‘Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.’ She then went on to describe a thoroughly run-of-the-mill password sharing scenario — her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend — that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal ‘had no authority from Korn/Ferry to provide her password to former employees.’ At issue is language in the CFAA that makes it illegal to access a computer system ‘without authorization.’ McKeown said that ‘without authorization’ is ‘an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.’ The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?” Read more of this story at Slashdot.

See the original post:
Password Sharing Is a Federal Crime, Appeals Court Rules

Microsoft Targets The iMac With New All-In-One Surface PCs, Reports Say

New submitter Miche67 writes: Two reports say Microsoft is working on an all-in-one (AIO) PC under the Surface brand. If that’s true, it would put it in competition with HP and Dell, which have their own AIO lines, as well as put it in competition with Apple’s iMac. Network World reports: “Both DigiTimes and Windows Central picked up on the story, each citing their own sources. DigiTimes, a Taiwan-based publication with connections to the PC industry over there (but also a very mixed record of accuracy) said the new devices would come in the third quarter of this year. Windows Central, which is a little better when it comes to rumors, said it did not have a solid release date.” Business Insider was able to find a patent filing by Microsoft for a desktop PC that supports the rumored AIO design. “The device is evidently targeting a ‘modern and elegant’ design and is meant to be something akin to a premium appliance or furniture, ” Windows Central wrote. Intel’s release date of the new Kaby Lake line of processors around Q3 of this year complicates things. While Kaby Lake is said to be more mobile-friendly with less power consumption and heat, they would make for a good choice for an AIO machine. However, it would be pushing it for Microsoft to release its AIO machines in the same quarter that Kaby Lake is due. On a semi-related note, a programmer at Building 88 recently confirmed that Microsoft will release Surface 5 devices next year powered by Kaby Lake processors. He posted pictures of four device holders marked “2017” on his Twitter account. Read more of this story at Slashdot.

See the original article here:
Microsoft Targets The iMac With New All-In-One Surface PCs, Reports Say

EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

An anonymous reader writes: Security firm Bitdefender has issued an alert about a malicious app that hands over control of Macs to criminals via Tor. The software, called EasyDoc Converter.app, is supposed to be a file converter but doesn’t do its advertised functions. Instead it drops complex malware onto the system that subverts the security of the system, allowing it to be used as part of a botnet or to spy on the owner. “This type of malware is particularly dangerous as it’s hard to detect and offers the attacker full control of the compromised system, ” said Tiberius Axinte, Technical Leader, Bitdefender Antimalware Lab. “For instance, someone can lock you out of your laptop, threaten to blackmail you to restore your private files or transform your laptop into a botnet to attack other devices. The possibilities are endless.” The malware, dubbed Backdoor.MAC.Eleanor, sets up a hidden Tor service and PHP-capable web server on the infected computer, generating a .onion domain that the attacker can use to connect to the Mac and control it. Once installed, the malware grants full access to the file system and can run scripts given to it by its masters.A report on AppleInsider says that malware can also control the FaceTime camera on a victim’s computer. But thankfully, Apple’s Gatekeeper security prevents the unsigned app from being installed. Read more of this story at Slashdot.

See the article here:
EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

MRI Software Bugs Could Upend Years Of Research

An anonymous reader shares a report on The Register: A whole pile of “this is how your brain looks like” MRI-based science has been invalidated because someone finally got around to checking the data. The problem is simple: to get from a high-resolution magnetic resonance imaging scan of the brain to a scientific conclusion, the brain is divided into tiny “voxels”. Software, rather than humans, then scans the voxels looking for clusters. When you see a claim that “scientists know when you’re about to move an arm: these images prove it”, they’re interpreting what they’re told by the statistical software. Now, boffins from Sweden and the UK have cast doubt on the quality of the science, because of problems with the statistical software: it produces way too many false positives. In this paper at PNAS, they write: “the most common software packages for fMRI analysis (SPM, FSL, AFNI) can result in false-positive rates of up to 70%. These results question the validity of some 40, 000 fMRI studies and may have a large impact on the interpretation of neuroimaging results.” Read more of this story at Slashdot.

See more here:
MRI Software Bugs Could Upend Years Of Research

American Cities Are Installing DHS-Funded Audio Surveillance

“Audio surveillance is increasingly being used on parts of urban mass transit systems, ” reports the Christian Science Monitor. Slashdot reader itwbennett writes “It was first reported in April that New Jersey had been using audio surveillance on some of its light rail lines, raising questions of privacy. This week, New Jersey Transit ended the program following revelations that the agency ‘didn’t have policies governing storage and who had access to data.'” From the article: New Jersey isn’t the only state where you now have even more reason to want to ride in the quiet car. The Baltimore Sun reported in March that the Maryland Transit Administration has used audio recording on some of its mass transit vehicles since 2012. It is now used on 65 percent of buses, and 82 percent of subway trains have audio recording capability, but don’t use it yet, according to the Sun. And cities in New Hampshire, Connecticut, Michigan, Ohio, Nevada, Oregon and California have either installed systems or moved to procure them, in many cases with funding from the federal Department of Homeland Security. Read more of this story at Slashdot.

See original article:
American Cities Are Installing DHS-Funded Audio Surveillance

Linux Mint 18 ‘Sarah’ Released, Supports Generic GTK X-Apps

Slashdot reader Type44Q writes: The Linux Mint team announced the immediate availability of their latest release, Mint 18 “Sarah, ” in Cinnamon and MATE flavors. These follow on the heels of their respective beta versions, which have been out for nearly a month. “Linux Mint 18 is a long-term support release which will be supported until 2021, ” the team announces on MATE’s “new features” page, adding they’ve improved their update manager, included support for the Debian syntax of “apt”, and are working on the “X-Apps” project to “produce generic applications for traditional GTK desktop environments…to replace applications which no longer integrate properly outside of a particular environment.” Read more of this story at Slashdot.

Visit site:
Linux Mint 18 ‘Sarah’ Released, Supports Generic GTK X-Apps