News 12 at 11 o'clock / Friday, June 17, 2011
SAVANNAH RIVER SITE-The MOX Facility at Savannah River Site is slowly coming to form.
"This project has been underway for about 15 years now. They still haven't disposed of any of the plutonium that's been brought into the Savannah River Site," said Tom Clements, Southeastern Nuclear Campaign Coordinator for the non-profit organization Friends of the Earth.
He says the program is hurting taxpayers like him.
"The MOX plan itself-DOE still claims that the cost of it is around 4.9 billion, but the overall cost of the MOX program is nearing 10 billion dollars," he told News 12.
The program is all about converting nuclear weapons into nuclear fuel. That nuclear fuel could be used in reactors throughout the country to make power. But after the events in Japan, commercial companies have been more hesitant to invest in MOX fuel.
"If it's not going to be producing any product that's going to be used it ought to be terminated now rather than wasting billions of more dollars," said Clements.
Clements' concerns about the MOX Facility were also brought up in Washington this week. Some members of the House of Representatives Energy and Water Subcommittee which appropriates money to the MOX project were a little more hesitant to do so this time around.
Even though the subcommittee ultimately passed the measure to continue MOX funding, some of its members warned in a report that SRS needs to prove that the MOX Program is not becoming "expensive and wasteful."
"Sixty-something tons of weapons-grade plutonium off the market-that to me is priceless in this age of international terrorism," said Republican Senator Lindsey Graham.
He says the program will not only get rid of dangerous nuclear materials, but it'll also create 500 permanent jobs at SRS, plus thousands of construction jobs.
"These are jobs that will be given to the local community. We're not importing people," Senator Graham told News 12.
He and other members of Congress are happy with what they've seen so far.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email email@example.com and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.