Mercredi, 24 Mai 2017
Latest news
Main » Let Joe Know: Your computer may still be vulnerable to cyber attack

Let Joe Know: Your computer may still be vulnerable to cyber attack

17 Mai 2017

That's why it's called ransomware. Here's what you need to know.

According to Microsoft, the havoc caused by WannaCry should serve as a "wake-up call" for governments around the world.

"I'm anxious about how the numbers will continue to grow when people go to work and turn on their machines on Monday", Europol director Rob Wainwright told Britain's ITV television.

Smith's blog post did not address another factor in the ransomware's spread, one that hints at the difficulty of uniting against a hacking attack: Users of pirated Microsoft software are unable to download the security patch, forcing them to fend for themselves or rely on a third-party source for a solution. What's this about the NSA?

The attacks exploit a vulnerability in outdated versions of Microsoft Windows that is particularly problematic for corporations that don't automatically update their systems. Microsoft said it had released a Windows security update in March to tackle the problem involved in the latest attack, but many users were yet to run it.

China's National Computer Network Emergency Response Center has confirmed that by 14 May, half of the infected IPs were located in China. If your computer is infected by WannaCry, experts agree the best solution is to wipe it clean and restore it from a recent backup.

Once your files are encrypted, your options are limited.

Victims of the attack received a message on their computer screens demanding $300 (275 euros) via the virtual currency, Bitcoin, saying: "Ooops, your files have been encrypted!"

Ransomware is a term that we will be hearing more about, and 2017 will go down as the year with the highest number of attacks.

"There's nothing you can do but pay once you're hit", Camacho said in an interview. How did researchers stop WannaCry? But consumers bear a responsibility of their own to stay current with critical patches, he said, and the spread of the WannaCry attack was exacerbated by the volume of machines that had not had the patch installed - two months after it was issued.

But even now, security experts aren't certain how the WannaCry infection was spread.

NSA does not discuss its capabilities, and some computer experts say the MS17-010 exploit was developed by unknown parties using the name Equation Group (which may also be linked to NSA).

A 22-year-old British researcher identified online as "MalwareTech" saw the findings and activated a "kill switch" for the attack, slowing its spread. That's when criminals hide malware inside the code of a legitimate website that is then downloaded onto any computer that visits the site. So, is the threat over? Patched computers carry a much lower risk of being infected by malware or ransomware than those without an update. And it's possible the attackers behind WannaCry are already working on a new version without a kill switch. The initial attack had started after many offices had closed Friday. Why would somebody do this? The malware asks the users to make payments through bitcoins to get back access to their devices and has made it extremely important to learn about the steps that will help protect the Windows backed laptops and PCs. There are also other theories. His law firm sued LinkedIn after a 2012 data breach, alleging individuals paid for premium accounts because the company falsely stated it had top-quality cyber security measures.

But some other technology industry executives said privately that it reflected a widely held view in Silicon Valley that the United States government is too willing to jeopardize internet security in order to preserve offensive cyber capabilities.

Let Joe Know: Your computer may still be vulnerable to cyber attack