Die Zukunft der Arbeit heißt Home Office

Arbeitsminister Hubertus Heil forciert ein Recht auf Home Office, die Mehrheit der Arbeitnehmer wünscht sich genau das, aber Union und Arbeitgeber sperren sich. Ein Kommentar

Arbeitsminister Hubertus Heil forciert ein Recht auf Home Office, die Mehrheit der Arbeitnehmer wünscht sich genau das, aber Union und Arbeitgeber sperren sich. Ein Kommentar

Botched Excel import may have caused loss of 15,841 UK COVID-19 cases

Lost data was reportedly the result of Excel’s limit of 1,048,576 rows.

Botched Excel import may have caused loss of 15,841 UK COVID-19 cases

Enlarge (credit: Ars Technica)

Public Health England admitted on Sunday that the agency has under-reported COVID-19 infections by 15,841 cases in recent days due to a "technical issue." The missing positive tests were conducted between September 25 and October 2 and have since been added to national statistics, the agency said.

PHE didn't explain the nature of the technical issue, but a number of British news sources have pointed the finger at Microsoft Excel. Here's how the Guardian describes the issue:

PHE was responsible for collating the test results from public and private labs, and publishing the daily updates on case count and tests performed.

In this case, the Guardian understands, one lab had sent its daily test report to PHE in the form of a CSV file – the simplest possible database format, just a list of values separated by commas. That report was then loaded into Microsoft Excel, and the new tests at the bottom were added to the main database.

But while CSV files can be any size, Microsoft Excel files can only be 1,048,576 rows long. When a CSV file longer than that is opened, the bottom rows get cut off and are no longer displayed. That means that, once the lab had performed more than a million tests, it was only a matter of time before its reports failed to be read by PHE.

The agency says it will take precautions to make sure an error like this doesn't happen in the future.

Read 3 remaining paragraphs | Comments

Wegen US-Wirtschaftskrieg: Samsung wird als Mobilfunkausrüster stärker

Samsung kann die Angriffe der USA auf Huawei für sich nutzen. Der südkoreanische Konzern etabliert sich in vielen Ländern als Mobilfunkausrüster für 4G und 5G. (Samsung, Mobilfunk)

Samsung kann die Angriffe der USA auf Huawei für sich nutzen. Der südkoreanische Konzern etabliert sich in vielen Ländern als Mobilfunkausrüster für 4G und 5G. (Samsung, Mobilfunk)

Amnestie für 25.000 IS-Familienmitglieder

Kurdische Selbstverwaltung will al-Hol-Lager entlasten: Syrische Mütter und Kinder sollen freigelassen werden. Ausländer sollen dagegen bis auf Weiteres bleiben

Kurdische Selbstverwaltung will al-Hol-Lager entlasten: Syrische Mütter und Kinder sollen freigelassen werden. Ausländer sollen dagegen bis auf Weiteres bleiben

Magisk v21 adds support for rooting Android 11 (and much more)

One of the most popular tools for rooting Android devices has received a major update that adds support for rooting Android 11. Magisk v21.0 also works with a “completely redesigned” Magisk Manager app, and a bunch of other under-the-hood …

One of the most popular tools for rooting Android devices has received a major update that adds support for rooting Android 11. Magisk v21.0 also works with a “completely redesigned” Magisk Manager app, and a bunch of other under-the-hood changes. Magisk v21.0 is still considered beta, and it may not work with all Android devices […]

The post Magisk v21 adds support for rooting Android 11 (and much more) appeared first on Liliputing.

Metal detector enthusiasts find 6th-century Anglo-Saxon warrior’s grave

The burial hints at the complex political landscape of post-Roman Britain.

Metal detector enthusiasts find 6th-century Anglo-Saxon warrior’s grave

Enlarge (credit: University of Reading)

The Berkshire hilltop where metal detector hobbyists found a warrior's grave was supposed to have been an unimportant patch of borderland between neighboring tribes 1,400 years ago. But the warrior, buried with a view of the Thames River valley and all the trappings of power and status, tells a different story. His presence suggests that this quiet bit of English countryside may have been in the thick of the power struggles that rippled across Britain in the decades after the Roman Empire receded.

Around 400 CE, Rome abandoned its far-flung colony in Britain and withdrew its troops back to the mainland of Europe. Not long after that, Germanic warriors from the continent swept onto the island: the forerunners of the Anglo-Saxons. Archaeologists don’t entirely agree on whether the Anglo-Saxons arrived as a huge wave of settlers who overwhelmed and replaced the native Britons, or whether only a smaller number of warriors came to Britain to seize power in the wake of Rome’s departure. Either way, they reshaped British culture and society over the next several centuries.

The Anglo-Saxon tribes banded together under strong military leaders. Over time, some of those groups would coalesce into the medieval Anglo-Saxon kingdoms of Wessex, Mercia, and Kent. Others faded from power, wiped out or absorbed by their rivals. And that brings us to the stretch of the Thames River between Oxford and London, and the man archaeologists have nicknamed the Marlow Warlord.

Read 10 remaining paragraphs | Comments

Custom-made UEFI bootkit found lurking in the wild

Attackers are going to great lengths to gain the highest level of persistence.

Software security concept. Errors in the program. Bugs in the program. The presence of a backdoor, rootkit.

Enlarge / Software security concept. Errors in the program. Bugs in the program. The presence of a backdoor, rootkit. (credit: sasha85ru | Getty Imates)

For only the second time in the annals of cybersecurity, researchers have found real-world malware lurking in the UEFI, the low-level and highly opaque firmware required to boot up nearly every modern computer.

As software that bridges a PC’s device firmware with its operating system, the UEFI—short for Unified Extensible Firmware Interface—is an operating system in its own right. It’s located in a SPI-connected flash storage chip soldered onto the computer motherboard, making it difficult to inspect or patch the code. And it’s the first thing to be run when a computer is turned on, allowing it influence or even control the OS, security apps, and all other software that follows.

Those characteristics make the UEFI the perfect place to stash malware, and that’s just what an unknown attack group has done, according to new research presented on Monday by security firm Kaspersky Lab.

Read 28 remaining paragraphs | Comments