The project that'll create thousands of jobs is still on schedule for a 2016 completion. (WRDW-TV / July 24, 2012)
News 12 at 6 o'clock / Tuesday, July 24, 2012
NEW ELLENTON, S.C. -- This August will mark the five-year anniversary of construction of a massive project at Savannah River Site. After it's built, the MOX Fuel Fabrication Facility will convert nuclear weapons-grade plutonium into fuel that can power commercial-grade reactors.
On Tuesday afternoon, MOX Services President and Chief Operating Officer Kelly Trice gave Nuclear Regulatory Commission inspectors and members of the public an update.
"Things are actually going very well. We just closed out another quarter with zero violations. The project is moving on track," he told News 12.
He says the project that'll create thousands of jobs is still on schedule for a 2016 completion, but folks like nuclear watchdog Tom Clements aren't convinced.
"Congress is definitely waking up to the overall cost of the program and how much is yet to be spent and all the unanswered problems that are facing the program," Clements said.
A Government Accountability Office report from 2010 says the $1.4 billion tax payer project is now estimated to be just shy of $5 billion.
"And I calculate there's about $17.5 billion left to be spent on the overall plutonium disposition and MOX program, but unfortunately, the Department of Energy will not release the figure on that," Clements said.
Clements is also concerned that no private companies will buy the reprocessed fuel called MOX. So far, the Tennessee Valley Authority is the only company seriously interested, according to the GAO report.
"We have other utilities that are interested as well, and we're in the process of working that now," Trice said.
Meanwhile, the United State House of Representatives recently cut about $17 million from MOX. Rep. Jeff Fortenberry from Nebraska wrote, "The MOX fuel program has cost billions in taxpayer dollars with little practical effect."
Clements with the Alliance for Nuclear Accountability also now questions whether the TVA is really on board with buying MOX fuel.
The most recent bump is faulty piping the builder purchased from Spain. News 12 was told Tuesday that it should not be a problem. Most -- if not all -- of that faulty pipe was not installed.
Have information or an opinion about this story? Click here to contact the newsroom.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email firstname.lastname@example.org and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.