Published: Fri, May 19, 2017
Sci-tech | By Carrie Guzman

No substantial impact of WannaCry ransomware on Indian systems: IT Secy

In a total of 150 nations throughout the world has been affected by the devastation of WannaCry cyber-attack.

It's hard to blame Microsoft, Litan said, since it issued fixes and generally did what it should.

This time, though, Microsoft believes others should share responsibility for the attack, an assault that targeted flaws in the Windows operating system.

To the editor: If Microsoft were a vehicle company and released a defective product, there would be mandatory recalls of almost 20-year-old systems and millions of dollars in fines.

According to the FT, the cost of updating older Windows versions "went from US$200 (RM865.50) per device in 2014, when regular support for XP ended, to US$400 the following year", while some clients were asked to pay heftier fees.

"Not only individuals, but even governments and big companies with so much to lose fail to secure their systems and train their employees about necessary security practices", said Mr Marty P Kamden, a marketing executive for the private network service provider NordVPN.

Lastly there are, of course, the attackers, who kidnapped precious data and demanded ransom be paid.

President Trump Denies Asking Comey To Scuttle Flynn Investigation
Today marked the first time since the appointment of a special counsel that Trump publicly addressed Comey's firing and the subsequent news of a memo written by the ex-FBI director.

While Microsoft finally did make the patch available free of charge to Windows XP machines last Friday, damage had already been done.

However, commentators state that the NSA "got lucky", as The Shadow Brokers appeared to have the exploit months before Microsoft was able to patch it.

The precedent may impact other software sellers too.

"We don't expect this to be a sophisticated group", said Wellsmore. A researcher from Google posted on Twitter that an early version of WannaCry from February shared some of the same programming code as malicious software used by the Lazarus Group, the alleged North Korean government hackers behind the destructive attack on Sony in 2014 and the theft of $81 million from a Bangladesh central bank account at the New York Fed past year. On its own, the shared code is little more than an intriguing lead.

"WannaCry's propagation in those countries illustrate the dangers of using bootlegged software", Engadget wrote. Low-end criminals take advantage of less-savvy users with such known viruses, even though malware is constantly changing and antivirus is frequently days behind detecting it. Some security researchers speculated that if the perpetrators were North Korean, the goal may have been to cause a widespread internet outage to coincide with this weekend's latest missile test. As GCHQ and NSA routinely share their tools and methods, this raises the significant possibility that the agency was aware of the vulnerability used to attack the NHS.

"If GCHQ develop malware to exploit weaknesses in operating systems, they should also develop an antidote that can be administered immediately if it gets into the wrong hands". There were many reports came in that several hackers were lending their so-called help in unencrypted many user's system data, but with the exchange of currency, and as per many experts this is also called as extortion, through the virtual world.

Like this: