The evening before Volkswagen Group and the US Department of Justice (DOJ) are supposed to submit a settlement to San Francisco District Judge Charles Breyer, Bloomberg’s sources have leaked new details about that supposed settlement.
Last week, VW Group was rumored to offer a settlement of $10.2 billion, with $1,000- $7,000 per car affected by the diesel emissions scandal that’s rocked the company since September. Today, Bloomberg is reporting that that number has gone up to a total of about $15 billion, with affected diesel owners potentially getting up to $10,000 in compensation.
Bloomberg’s sources specify that VW Group will set aside $10.03 billion to pay back the owners of nearly 500,000 Volkswagen and Audi 2.0 L diesel engine vehicles in the United States. “Those figures could rise if VW misses certain deadlines,” the news outlet writes.
Volkswagen settles emissions cheating for $15.3 billion
WASHINGTON — Volkswagen is taking a major step toward compensating owners and government regulators for its emissions cheating scandal. But it will take much longer to repair the damage to its reputation. The German automaker has agreed to spend ...
VW agrees to buy back diesel vehicles, fund clean air efforts
VW's US Diesel Settlement Clears Just One Financial Hurdle
Volkswagen Pays High Price for Diesel Deceit
Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices.
The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
The DDoS attack continued for days, causing the Sucuri researchers to become curious about the origins of the attack. They soon discovered the individual devices carrying out the attack were CCTV boxes that were connected to more than 25,500 different IP addresses. The IP addresses were located in no fewer than 105 countries around the world.