From left Brooke Russell, Executive Director and Chief Operating Officer of the SC chapter of the National Safety Council (NSC), presented the NSC awards to members of the SRR Safety Leadership Committee.
Monday, March 14, 2011
AIKEN, S.C. (March 14, 2011) – Savannah River Remediation (SRR) LLC, the liquid waste contractor at the Savannah River Site (SRS), has won five safety awards.
On February 16, 2011, Brooke Russell, Executive Director and Chief Operating Officer, of the South Carolina (SC) chapter of the National Safety Council (NSC) presented three awards to the SRR Safety Leadership Committee at their quarterly safety leadership meeting:
- NSC Operational Excellence Achievement Award presented to SRR Construction
- NSC Operational Excellence Achievement Award presented to SRR Operations
- NSC Million Hour Award
The NSC Operational Excellence Award is presented to organizations that in the previous 12 months had occupational injury rates that were 50 percent or more better than comparable industry-wide rates. This is the first time SRR has been eligible to win this award, since it is based on a full calendar year of performance, and 2010 was the first full calendar year for SRR.
The NSC Million Hour Award was presented to SRR in recognition for three million hours without a day away from work due to injury milestone achieved on January 15, 2011. SRR has won this award in the past.
“Safety is paramount in our business,” said Terrel Spears, Assistant Manager for Waste Disposition Project, U.S. Department of Energy (DOE) Savannah River Operations Office. “These awards underscore the fact that employees recognize the hazards our complex cleanup work and fully embrace the importance of safety in all facets of the job.”
Additionally, SRR Construction and Operations will each be presented SC Chamber of Commerce 2011 Commendation of Excellence Awards at the upcoming SC Chamber Safety Award luncheon held on March 16, 2011. This award is presented to companies who have a commendable occupational injury rate.
“It’s gratifying to know others notice our outstanding safety record,” said Dave Olson, SRR President and Project Manager. “I am very pleased with the safety performance by our employees and commend them for their commitment and dedication to working safely. I want employees to come to work safe, leave safe and continue that behavior after work.”
SRR is the Savannah River Site’s (SRS) Liquid Waste contractor. SRS is owned by DOE. SRR is composed of personnel from a team of companies led by URS with partners Bechtel National, CH2M Hill and Babcock & Wilcox. Critical subcontractors for the contract are AREVA, Energy Solutions and URS Safety Management Solutions.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email email@example.com and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.