• News
  • Finance

NCSC outlines ways to protect against WannaCry ransomware

NCSC outlines ways to protect against WannaCry ransomware

Those include a known and highly risky security hole in Microsoft Windows, tardy users who didn't apply Microsoft's March software fix, and malware created to spread quickly once inside university, business and government networks.

Dore said companies that faced disruptions because they did not run the Microsoft update or because they were using older versions of Windows could face lawsuits if they publicly touted their cyber security.

The National Informatics Centre, which builds and manages nearly all government websites, and the Centre for Development of Advanced Computing, a premier research institute that has built supercomputers, have actively installed patches to immunise their Windows systems, Sundararajan said, according to the agency report. "We have not got any reports of widespread infection of the ransomware", she said. It exploits a flaw in Microsoft's Remote Desktop Protocol in Windows XP and Windows 2003 operating systems. Officials urged organizations and companies to immediately update their security software. WannaCry, on the other hand, threatens to permanently lock away user files if the computer owner doesn't pay a ransom, which starts at $300 but goes up after two hours.

However, there is no clarity yet on whether access is restored upon payment of the amount demanded.

Weisman: Microsoft issued a patch for this vulnerability a few weeks ago, but many companies and institutions have not installed it yet. Ensure that security solutions are switched on all nodes of the network.

Kaspersky said it was seeking to develop a decryption tool "as soon as possible".

LONDON - A global ransomware cyberattack, unprecedented in scale, had technicians scrambling to restore Britain's crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

James Clapper told ABC's "This Week" on Sunday that he expects similar attacks to become a growing problem in the future.

The patches won't do any good for machines that have already been hit. While you should use AV, you need to bolster it with other defenses as well.

Microsoft has responded to the news that the "ransomware" virus dubbed WannaCry locked up more than 200,000 computers around the world. The cost of buying Internet anti-virus security programs must be built into all budgets, besides levels of alacrity in putting to work security patches that leading companies like Microsoft put out to protect systems from malware.

Bison softball team to play defending national champion Oklahoma in NCAA tournament
The Women's College World Series starts on June 1, and it will be held at the USA Softball Hall of Fame Stadium in Oklahoma City. CT Friday afternoon at Tiger Park, with McNeese State and Louisiana-Lafayette playing in the first game of the regional at 3 p.m.


HTC releases first promo videos for the U11
If you thought the HTC U Ultra was already too gimmicky with its "U" features, you're definitely in for a ride with the HTC U11 . As such, the U11 also offers Alexa, Amazon's voice assistant, with HTC describing it as an "equal-class citizen" on the phone.


GOP lawmaker cautions health care bill is Obamacare 'tweak'
Under the GOP bill , once they leave the Medicaid rolls, they would not be able to return, even if their income declines. The House plan prohibits insurers from denying coverage to anyone with a pre-existing condition.


"Upon learning of these incidents, McAfee quickly began working to analyse samples of the ransomware and develop mitigation guidance and detection updates for its customers". Usually, they fear they might get bugs or can not afford spending time on updates.

Home users are unlikely to be affected, but if you don't regularly update Windows and take care with emails, you may want to double check.

"The exploit known as MS17-010 was previously patched by Microsoft". No reports have come to Cert-In.

"This is big and set to get bigger". Many of those victims will be businesses, including large corporations.

It's not the first time hackers have used the leaked NSA tools to infect computers.

"The odds of getting back their files decrypted is very small", said Vikram Thakur, technical director at security firm Symantec.

But, if everything is backed up, the encrypted files are not as valuable to the attackers.

The effects were felt across the globe, with Britain's National Health Service, Russia's Interior Ministry and companies including Spain's Telefonica, FedEx Corp.in the USA and French carmaker Renault all reporting disruptions. That is why WannaCry worked the way it did. Find us on Facebook too!

The reproduction of the story/photograph in any form will be liable for legal action.

Leave Your Comment

Leave Your Comment


Latest News

Breaking News



Recommended