Dear teachers,

For Installing or upgrading Ubuntu in you computer, just go through this link and do it.

http://karnatakaeducation.org.in/KOER/en/index.php/Install_ubuntu

and let me know for any help.

Regards

Rakesh B

------------------------------------------------------------------------

Project Associate-IT
IT for Change <http://www.ITforChange.net/>
In special consultative status with the United Nations ECOSOC
M: 97315 22202 | T: 080 2653 6890


On Monday 15 May 2017 07:33 PM, Gurumurthy K wrote:
Although it doesn't affect gnu/linux machines, in any case, if you are
using wine(windows emulator) on ubuntu please don't use it to open mails or
browse the web without updating it to latest version.

If you are using Windows for any purpose, make sure you have applied
MS17-010 patch released from Microsoft -
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx


IT for Change, Bengaluru
www.ITforChange.net <http://www.ITforChange.net>

On Sat, May 13, 2017 at 1:45 PM, Gurumurthy K <itfc.stfk...@gmail.com <mailto:itfc.stfk...@gmail.com>> wrote:

    Dear teachers,

    Please keep updating the security updates on your computer. See
    article below.
    On Ubuntu, upgrade to the latest version can also be done freely
    without any license fees .... Pls do
    (see
    http://karnatakaeducation.org.in/KOER/en/index.php/Kalpavriksha
    <http://karnatakaeducation.org.in/KOER/en/index.php/Kalpavriksha>
    for information)

    regards,
    Guru

    source -
    http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/
    
<http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/>


      Massive ransomware attack hits 99 countries - May. 12, 2017

    ------------------------------------------------------------------------


        Hospitals, major companies and government offices have been
        hit by a massive wave of cyberattacks across the globe that
        seize control of computers until the victims pay a ransom.

    Cybersecurity firm Avast said it tracked
    
<https://slack-redir.net/link?url=https%3A%2F%2Fblog.avast.com%2Fransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today>
    more than 75,000 ransomware attacks in 99 countries on Friday.

    It said the majority of the attacks targeted Russia, Ukraine and
    Taiwan. But hospitals in the U.K., and global firms like Fedex
    (FDX
    <http://money.cnn.com/quote/quote.html?symb=FDX&source=story_quote_link>)
    also reported they had come under assault.

    *What is it?*

    *The ransomware locks down all the files on an infected computer
    and asks the computer's administrator to pay in order to regain
    control of them. *

    *The ransomware, called "WannaCry," is spread by taking advantage
    of a Windows vulnerability* that Microsoft (MSFT
    <http://money.cnn.com/quote/quote.html?symb=MSFT&source=story_quote_link>,
    Tech30 <http://money.cnn.com/technology/tech30/index.html?iid=EL>)
    released a security patch
    
<http://money.cnn.com/2017/04/15/technology/microsoft-patch-shadow-brokers/index.html?iid=EL>
    for in March. But computers and networks that haven't updated
    their systems are at risk. The exploit was leaked last month as
    part of a trove ofNSA spy tools
    
<http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>.


    "Affected machines have six hours to pay up and every few hours
    the ransom goes up," said Kurt Baumgartner, the principal security
    researcher at security firm Kaspersky Lab. "Most folks that have
    paid up appear to have paid the initial $300 in the first few hours."

    Related: Microsoft quickly fixes 'crazy bad' Windows bug
    
<http://money.cnn.com/2017/05/09/technology/microsoft-bug-remote-windows-patch/index.html?iid=EL>


    Sixteen National Health Service (NHS) organizations in the UK have
    been hit
    
<http://www.cnn.com/2017/05/12/health/uk-nhs-cyber-attack/index.html?iid=EL>,
    and some of thosehospitals have canceled outpatient appointments
    and told people to avoid emergency departments if possible.
    Spanish telecom company Telefónica (TEF
    <http://money.cnn.com/quote/quote.html?symb=TEF&source=story_quote_link>)
    was also hit with the ransomware.

    Spanish authorities confirmed
    
<https://www.ccn-cert.cni.es/seguridad-al-dia/comunicados-ccn-cert/4464-ataque-masivo-de-ransomware-que-afecta-a-un-elevado-numero-de-organizaciones-espanolas.html>
    the ransomware is spreading through the vulnerability, called
    "EternalBlue," and advised people to patch.

    "It is going to spread far and wide within the internal systems of
    organizations -- this is turning into the biggest cybersecurity
    incident I've ever seen," UK-based security architect Kevin
    Beaumont said.

    Fedex said it was "experiencing interference with some of our
    Windows-based systems caused by malware" and was trying to fix the
    problems as quickly as possible.

    Russia's Interior Ministry released a statement acknowledging a
    ransomware attack on its computers, adding that less than 1% of
    computers were affected, and that the virus is now "localized."
    The statement said antivirus systems are working to destroy it.

    Related: NSA's powerful Windows hacking tools leaked online
    
<http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>


    Megafon, a Russian telecommunications company, was also hit by the
    attack. Spokesman Petr Lidov told CNN that it affected call
    centers but not the company's networks. He said the situation is
    now under control.

    The U.S. Department of Homeland Security, in a statement
    
<https://www.dhs.gov/news/2017/05/12/dhs-statement-ongoing-ransomware-attacks>
    late Friday, encouraged people to update their operating systems.
    "We are actively sharing information related to this event and
    stand ready to lend technical support and assistance as needed to
    our partners, both in the United States and internationally," the
    department said.

    Kaspersky Lab says although the WannaCry ransomware can infect
    computers even without the vulnerability, EternalBlue is "the most
    significant factor" in the global outbreak.

    *How to prevent it*

    Beaumont examined a sample of the ransomware used to target NHS
    and confirmed it was the same used to target Telefónica. He said
    companies can apply the patch released in March to all systems to
    prevent WannaCry infections. Although it won't do any good for
    machines that have already been hit.

    He said it's likely the ransomware will spread to U.S. firms too.
    The ransomware is automatically scanning for computers it can
    infect whenever it loads itself onto a new machine. It can infect
    other computers on the same wireless network.

    "It has a 'hunter' module, which seeks out PCs on internal
    networks," Beaumont said. "So, for example, if your laptop is
    infected and you went to a coffee shop, it would spread to PCs at
    the coffee shop. From there, to other companies."

    Related: How leaked NSA spy tools created a hacking free-for-all
    
<http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/?iid=EL>


    According to Matthew Hickey, founder of the security firm Hacker
    House, Friday's attack is not surprising, and it shows many
    organizations do not apply updates in a timely fashion. When
    CNNTech first reported
    
<http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>
    the Microsoft vulnerabilities leaked in April, Hickey said they
    were the "most damaging" he'd seen in several years, and warned
    that businesses would be most at risk.

    Consumers who have up-to-date software are protected from this
    ransomware. Here's how to turn automatic updates
    
<https://support.microsoft.com/en-us/help/306525/how-to-configure-and-use-automatic-updates-in-windows>
    on.

    It's not the first time hackers have used the leaked NSA tools to
    infect computers. Soon after the leak, hackers infected thousands
    of vulnerable machines with a backdoor
    
<http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/index.html?iid=EL>
    called DOUBLEPULSAR.

    /-- Jethro Mullen, Clare Sebastian and Livvy Doherty contributed
    to this report./

    [Mail The Page] [Print The Page] [Reader Options] [Exit Reader]
    Guru
    IT for Change, Bengaluru
    www.ITforChange.net <http://www.ITforChange.net>


--
You received this message because you are subscribed to the Google Groups "APMathsteachers" group. To unsubscribe from this group and stop receiving emails from it, send an email to apmathsteachers+unsubscr...@googlegroups.com <mailto:apmathsteachers+unsubscr...@googlegroups.com>. To post to this group, send email to apmathsteach...@googlegroups.com <mailto:apmathsteach...@googlegroups.com>. To view this discussion on the web visit https://groups.google.com/d/msgid/apmathsteachers/CANJf2f-qAORt8_tan%2B35q-Np%3DQGsQ%3Da6-nS-hTsnQ4WzQc33gg%40mail.gmail.com <https://groups.google.com/d/msgid/apmathsteachers/CANJf2f-qAORt8_tan%2B35q-Np%3DQGsQ%3Da6-nS-hTsnQ4WzQc33gg%40mail.gmail.com?utm_medium=email&utm_source=footer>.
For more options, visit https://groups.google.com/d/optout.

--
-----------
1.ವಿಷಯ ಶಿಕ್ಷಕರ ವೇದಿಕೆಗೆ  ಶಿಕ್ಷಕರನ್ನು ಸೇರಿಸಲು ಈ  ಅರ್ಜಿಯನ್ನು ತುಂಬಿರಿ.
-https://docs.google.com/forms/d/e/1FAIpQLSevqRdFngjbDtOF8YxgeXeL8xF62rdXuLpGJIhK6qzMaJ_Dcw/viewform
2. ಇಮೇಲ್ ಕಳುಹಿಸುವಾಗ ಗಮನಿಸಬೇಕಾದ ಕೆಲವು ಮಾರ್ಗಸೂಚಿಗಳನ್ನು ಇಲ್ಲಿ ನೋಡಿ.
-http://karnatakaeducation.org.in/KOER/index.php/ವಿಷಯಶಿಕ್ಷಕರವೇದಿಕೆ_ಸದಸ್ಯರ_ಇಮೇಲ್_ಮಾರ್ಗಸೂಚಿ
3. ಐ.ಸಿ.ಟಿ ಸಾಕ್ಷರತೆ ಬಗೆಗೆ ಯಾವುದೇ ರೀತಿಯ ಪ್ರಶ್ನೆಗಳಿದ್ದಲ್ಲಿ ಈ ಪುಟಕ್ಕೆ ಭೇಟಿ ನೀಡಿ -
http://karnatakaeducation.org.in/KOER/en/index.php/Portal:ICT_Literacy
4.ನೀವು ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶ ಬಳಸುತ್ತಿದ್ದೀರಾ ? ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶದ ಬಗ್ಗೆ ತಿಳಿಯಲು 
-http://karnatakaeducation.org.in/KOER/en/index.php/Public_Software
-----------
--- You received this message because you are subscribed to the Google Groups "KannadaSTF - ಕನ್ನಡ ಭಾಷಾ ಶಿಕ್ಷಕರ ವೇದಿಕೆ" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to kannadastf+unsubscr...@googlegroups.com.
To post to this group, send an email to kannadastf@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to