Programming Bug Costs Citigroup $7M After Legit Transactions Mistaken For Test Data For 15 Years

An anonymous reader shares a report on The Register:A programming blunder in its reporting software has led to Citigroup being fined $7m. According to the US Securities and Exchange Commission (SEC), that error [PDF] resulted in the financial regulator being sent incomplete “blue sheet” information for a remarkable 15 years — from May 1999 to April 2014. The mistake was discovered by Citigroup itself when it was asked to send a large but precise chunk of trading data to the SEC in April 2014 and asked its technical support team to help identify which internal ID numbers they should run a request on. That team quickly noticed that some branches’ trades were not being included in the automated system and alerted those above them. Four days later a patch was in place, but it wasn’t until eight months later that the company received a formal report noting that the error had affected SEC reports going back more than a decade. The next month, January 2015, Citigroup fessed up to the SEC.The glitch resided in new alphanumeric branch codes that the bank had introduced in the mid-1990s. The program code filtered out any transactions that were given three-digit branch codes from 089 to 100 and used those prefixes for testing purposes. The report adds, “But in 1998, the company started using alphanumeric branch codes as it expanded its business. Among them were the codes 10B, 10C and so on, which the system treated as being within the excluded range, and so their transactions were removed from any reports sent to the SEC.” Read more of this story at Slashdot.

View article:
Programming Bug Costs Citigroup $7M After Legit Transactions Mistaken For Test Data For 15 Years

Pokemon Go Becomes Biggest Mobile Game In US History

An anonymous reader writes: Pokemon Go is now the biggest mobile game of all time in the U.S. Not only has it surpassed Twitter’s daily users, but it is seeing people spend more time in its app than in Facebook. An earlier report from SimilarWeb says Pokemon Go has surpassed Tinder in terms of installations — the app surpassed Tinder on July 7th. Today, the tracking firm says Pokemon Go has managed to surpass Twitter in terms of daily active users on Monday. It says almost 6% of the entire U.S. Android population is engaging with the app on a daily basis. A new report from SurveyMonkey intelligence indicated that Pokemon Go has claimed the title “biggest mobile game in U.S. history.” The game saw just under 21 million daily active users in the U.S. on Monday. It’s reportedly closing in on Snapchat on Android, and could surpass Google Maps on Android as well. According to app store intelligence firm SensorTower, the average iPhone user on iOS spent 33 minutes catching Pokemon, which is more than any other apps it analyzed, including Facebook, Snapchat, Twitter, Instagram, and Slither.io. The app with the second-most average usage at 22 minutes, 8 seconds, was Facebook. SurveyMonkey did note that Pokemon Go still falls short of other games when it comes to time spent in games. Game of War sees nearly 2 hours of total daily usage for the average user, while Candy Crush Saga sees daily usage of about 43 minutes. In just two days, Pokemon Go brought Nintendo’s market value to $7.5 billion. It’s worth noting that it remains to be seen whether or not the game will continue to break records or turn into a ghost town like Nintendo’s first mobile game, Miitomo. Read more of this story at Slashdot.

View article:
Pokemon Go Becomes Biggest Mobile Game In US History

Sega Saturn’s DRM Cracked Almost 23 Years After Launch

An anonymous reader writes from a report via Gamasutra: The Sega Saturn’s DRM has finally been cracked after it hit store shelves nearly 23 years ago in November 1994. Engineer James Laird-Wah first set forth to break through the console’s copy protection in an attempt to harness its chiptune capabilities. Laird-Wah has, however, developed a way to run games and other software from a USB stick in the process. Since disc drive failure is a common fault with the game console, his method circumvents the disc drive altogether, instead reworking the Video CD Slot so it can take games stored on a USB stick and run them directly through the Saturn’s CD Block. “This is now at the point where, not only can it boot and run games, I’ve finished just recently putting in audio support, so it can play audio tracks, ” explained Laird-Wah, speaking to YouTuber debuglive. “For the time being, I possess the only Saturn in the world that’s capable of writing files to a USB stick. There’s actually, for developers of home-brew, the ability to read and write files on the USB stick that’s attached to the device. Read more of this story at Slashdot.

Link:
Sega Saturn’s DRM Cracked Almost 23 Years After Launch

Ubuntu’s Unity desktop environment can run in Windows

An anonymous Slashdot reader writes: “This is one of the coolest tickets I’ve seen on GitHub, ” writes Ubuntu developer Adolfo Jayme Barrientos, adding “this kind of surreal compatibility between platforms is now enabled…the fact that you can execute and use Linux window managers there, without virtual machines, is simply mind-blowing.” “The Windows 10 Anniversary Update coming in August includes an unusual feature aimed at developers: an Ubuntu sub-system that lets you run Linux software using a command-line interface, ” explains Liliputing.com “Preview versions have been available since April, and while Microsoft and Canonical worked together to bring support for the Bash terminal to Windows 10, it didn’t take long for some users to figure out that they could get some desktop Linux apps to run in Windows. Now it looks like you can even load Ubuntu’s Unity desktop environment, making windows 10 look like Ubuntu. Read more of this story at Slashdot.

Read More:
Ubuntu’s Unity desktop environment can run in Windows

Amazon’s Chinese Counterfeit Problem Is Getting Worse

A report on CNBC, citing sellers, says that counterfeit problem on the platform has gotten worse after it made it easier for Chinese manufacturers to sell goods to U.S. consumers. The report gives an example of a seller Jamie Whaley who started a bedding business on Amazon that reached $700, 000 in annual sales within three years. Her patented product called BedBand consists of a set of shock cords, clamps and locks designed to keep fitted bed sheets in place. Whaley found quite an audience, selling up to 200 units a day for $13.99 a set. BedBand climbed into the top 200 selling products in the home and kitchen category. That was 2013. By mid-2015, the business was in a tailspin. Revenue plummeted by half and Whaley was forced to lay off eight employees. Her sheet fastener had been copied by a legion of mostly Chinese knockoffs that undercut BedBand on price and jumped the seller ranks by obtaining scores of reviews that watchdog site Fakespot.com determined were inauthentic and “harmful for real consumers.” The report adds:Spend any time surveying Amazon sellers and Whaley’s narrative will start sounding like the norm. In Amazon’s quest to be the low-cost provider of everything on the planet, the website has morphed into the world’s largest flea market — a chaotic, somewhat lawless, bazaar with unlimited inventory. Always a problem, the counterfeiting issue has exploded this year, sellers say, following Amazon’s effort to openly court Chinese manufacturers, weaving them intimately into the company’s expansive logistics operation. Merchants are perpetually unsure of who or what may kill their sales on any given day and how much time they’ll have to spend hunting down fakers. Read more of this story at Slashdot.

Original post:
Amazon’s Chinese Counterfeit Problem Is Getting Worse

Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

An anonymous reader writes: Security firm Bitdefender has issued an alert about a malicious app that hands over control of Macs to criminals via Tor. The software, called EasyDoc Converter.app, is supposed to be a file converter but doesn’t do its advertised functions. Instead it drops complex malware onto the system that subverts the security of the system, allowing it to be used as part of a botnet or to spy on the owner. “This type of malware is particularly dangerous as it’s hard to detect and offers the attacker full control of the compromised system, ” said Tiberius Axinte, Technical Leader, Bitdefender Antimalware Lab. “For instance, someone can lock you out of your laptop, threaten to blackmail you to restore your private files or transform your laptop into a botnet to attack other devices. The possibilities are endless.” The malware, dubbed Backdoor.MAC.Eleanor, sets up a hidden Tor service and PHP-capable web server on the infected computer, generating a .onion domain that the attacker can use to connect to the Mac and control it. Once installed, the malware grants full access to the file system and can run scripts given to it by its masters.A report on AppleInsider says that malware can also control the FaceTime camera on a victim’s computer. But thankfully, Apple’s Gatekeeper security prevents the unsigned app from being installed. Read more of this story at Slashdot.

See the article here:
EasyDoc Malware Adds Tor Backdoor To Macs For Botnet Control

American Cities Are Installing DHS-Funded Audio Surveillance

“Audio surveillance is increasingly being used on parts of urban mass transit systems, ” reports the Christian Science Monitor. Slashdot reader itwbennett writes “It was first reported in April that New Jersey had been using audio surveillance on some of its light rail lines, raising questions of privacy. This week, New Jersey Transit ended the program following revelations that the agency ‘didn’t have policies governing storage and who had access to data.'” From the article: New Jersey isn’t the only state where you now have even more reason to want to ride in the quiet car. The Baltimore Sun reported in March that the Maryland Transit Administration has used audio recording on some of its mass transit vehicles since 2012. It is now used on 65 percent of buses, and 82 percent of subway trains have audio recording capability, but don’t use it yet, according to the Sun. And cities in New Hampshire, Connecticut, Michigan, Ohio, Nevada, Oregon and California have either installed systems or moved to procure them, in many cases with funding from the federal Department of Homeland Security. Read more of this story at Slashdot.

See original article:
American Cities Are Installing DHS-Funded Audio Surveillance

Solar road technology comes to Route 66

Solar Roadways’ dreams of sunlight-gathering paths are one step closer to taking shape. Missouri’s Department of Transportation is aiming to install a test version of the startup’s solar road tiles in a sidewalk at the Historic Route 66 Welcome Center in Conway. Okay, it won’t be on Route 66 just yet, but that’s not the point — the goal is to see whether or not the technology is viable enough that it could safely be used on regular streets. You should see it in action toward the end of the year. The tiles will be familiar if you’ve followed Solar Roadways before. Each one combines a solar cell with LED lighting, a heating element and tempered glass that’s strong enough to support the weight of a semi-trailer truck. If successful, the panels will feed the electrical grid (ideally paying for themselves) and make the roads safer by both lighting the way as well as keeping the roads free of rain and snow. They should be easier to repair than asphalt, too, since you don’t need to take out whole patches of road to fix small cracks. Of course, “if successful” is the operative term here. The real litmus test comes if and when Solar Roadways subjects the tiles to the legions of cars traveling on Route 66 and beyond. Missouri has a strong incentive to make that happen, though. As the Transportation Department’s Tom Blair observes , it would be odd to push self-driving cars in the state’s Road to Tomorrow initiative when the streets aren’t as smart as the vehicles using them. Via: Inhabitat , CleanTechnica , The Verge Source: Kansas City Star , News Tribune

Continued here:
Solar road technology comes to Route 66

Linux Mint 18 ‘Sarah’ Released, Supports Generic GTK X-Apps

Slashdot reader Type44Q writes: The Linux Mint team announced the immediate availability of their latest release, Mint 18 “Sarah, ” in Cinnamon and MATE flavors. These follow on the heels of their respective beta versions, which have been out for nearly a month. “Linux Mint 18 is a long-term support release which will be supported until 2021, ” the team announces on MATE’s “new features” page, adding they’ve improved their update manager, included support for the Debian syntax of “apt”, and are working on the “X-Apps” project to “produce generic applications for traditional GTK desktop environments…to replace applications which no longer integrate properly outside of a particular environment.” Read more of this story at Slashdot.

Visit site:
Linux Mint 18 ‘Sarah’ Released, Supports Generic GTK X-Apps