Nice information sir..thank you..

On May 13, 2017 1:45 PM, "Gurumurthy K" <itfc.stfk...@gmail.com> wrote:

> Dear teachers,
>
> Please keep updating the security updates on your computer. See article
> below.
> On Ubuntu, upgrade to the latest version can also be done freely without
> any license fees .... Pls do
> (see http://karnatakaeducation.org.in/KOER/en/index.php/Kalpavriksha for
> information)
>
> regards,
> Guru
>
> source - http://money.cnn.com/2017/05/12/technology/ransomware-
> attack-nsa-microsoft/
>
> Massive ransomware attack hits 99 countries - May. 12, 2017
> ------------------------------
> Hospitals, major companies and government offices have been hit by a
> massive wave of cyberattacks across the globe that seize control of
> computers until the victims pay a ransom.
>
> Cybersecurity firm Avast said it tracked
> <https://slack-redir.net/link?url=https%3A%2F%2Fblog.avast.com%2Fransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today>
> more than 75,000 ransomware attacks in 99 countries on Friday.
>
> It said the majority of the attacks targeted Russia, Ukraine and Taiwan.
> But hospitals in the U.K., and global firms like Fedex (FDX
> <http://money.cnn.com/quote/quote.html?symb=FDX&source=story_quote_link>)
> also reported they had come under assault.
>
> *What is it?*
>
> *The ransomware locks down all the files on an infected computer and asks
> the computer's administrator to pay in order to regain control of them. *
>
> *The ransomware, called "WannaCry," is spread by taking advantage of a
> Windows vulnerability* that Microsoft (MSFT
> <http://money.cnn.com/quote/quote.html?symb=MSFT&source=story_quote_link>,
> Tech30 <http://money.cnn.com/technology/tech30/index.html?iid=EL>)
> released a security patch
> <http://money.cnn.com/2017/04/15/technology/microsoft-patch-shadow-brokers/index.html?iid=EL>
> for in March. But computers and networks that haven't updated their systems
> are at risk. The exploit was leaked last month as part of a trove of NSA
> spy tools
> <http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>.
>
>
> "Affected machines have six hours to pay up and every few hours the ransom
> goes up," said Kurt Baumgartner, the principal security researcher at
> security firm Kaspersky Lab. "Most folks that have paid up appear to have
> paid the initial $300 in the first few hours."
>
> Related: Microsoft quickly fixes 'crazy bad' Windows bug
> <http://money.cnn.com/2017/05/09/technology/microsoft-bug-remote-windows-patch/index.html?iid=EL>
>
> Sixteen National Health Service (NHS) organizations in the UK have been
> hit
> <http://www.cnn.com/2017/05/12/health/uk-nhs-cyber-attack/index.html?iid=EL>,
> and some of thosehospitals have canceled outpatient appointments and told
> people to avoid emergency departments if possible. Spanish telecom company
> Telefónica (TEF
> <http://money.cnn.com/quote/quote.html?symb=TEF&source=story_quote_link>)
> was also hit with the ransomware.
>
> Spanish authorities confirmed
> <https://www.ccn-cert.cni.es/seguridad-al-dia/comunicados-ccn-cert/4464-ataque-masivo-de-ransomware-que-afecta-a-un-elevado-numero-de-organizaciones-espanolas.html>
> the ransomware is spreading through the vulnerability, called
> "EternalBlue," and advised people to patch.
>
> "It is going to spread far and wide within the internal systems of
> organizations -- this is turning into the biggest cybersecurity incident
> I've ever seen," UK-based security architect Kevin Beaumont said.
>
> Fedex said it was "experiencing interference with some of our
> Windows-based systems caused by malware" and was trying to fix the problems
> as quickly as possible.
>
> Russia's Interior Ministry released a statement acknowledging a ransomware
> attack on its computers, adding that less than 1% of computers were
> affected, and that the virus is now "localized." The statement said
> antivirus systems are working to destroy it.
>
> Related: NSA's powerful Windows hacking tools leaked online
> <http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>
>
> Megafon, a Russian telecommunications company, was also hit by the attack.
> Spokesman Petr Lidov told CNN that it affected call centers but not the
> company's networks. He said the situation is now under control.
>
> The U.S. Department of Homeland Security, in a statement
> <https://www.dhs.gov/news/2017/05/12/dhs-statement-ongoing-ransomware-attacks>
> late Friday, encouraged people to update their operating systems. "We are
> actively sharing information related to this event and stand ready to lend
> technical support and assistance as needed to our partners, both in the
> United States and internationally," the department said.
>
> Kaspersky Lab says although the WannaCry ransomware can infect computers
> even without the vulnerability, EternalBlue is "the most significant
> factor" in the global outbreak.
>
> *How to prevent it*
>
> Beaumont examined a sample of the ransomware used to target NHS and
> confirmed it was the same used to target Telefónica. He said companies can
> apply the patch released in March to all systems to prevent WannaCry
> infections. Although it won't do any good for machines that have already
> been hit.
>
> He said it's likely the ransomware will spread to U.S. firms too. The
> ransomware is automatically scanning for computers it can infect whenever
> it loads itself onto a new machine. It can infect other computers on the
> same wireless network.
>
> "It has a 'hunter' module, which seeks out PCs on internal networks,"
> Beaumont said. "So, for example, if your laptop is infected and you went to
> a coffee shop, it would spread to PCs at the coffee shop. From there, to
> other companies."
>
> Related: How leaked NSA spy tools created a hacking free-for-all
> <http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/?iid=EL>
>
> According to Matthew Hickey, founder of the security firm Hacker House,
> Friday's attack is not surprising, and it shows many organizations do not
> apply updates in a timely fashion. When CNNTech first reported
> <http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>
> the Microsoft vulnerabilities leaked in April, Hickey said they were the
> "most damaging" he'd seen in several years, and warned that businesses
> would be most at risk.
>
> Consumers who have up-to-date software are protected from this ransomware.
> Here's how to turn automatic updates
> <https://support.microsoft.com/en-us/help/306525/how-to-configure-and-use-automatic-updates-in-windows>
> on.
>
> It's not the first time hackers have used the leaked NSA tools to infect
> computers. Soon after the leak, hackers infected thousands of vulnerable
> machines with a backdoor
> <http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/index.html?iid=EL>
> called DOUBLEPULSAR.
>
> *-- Jethro Mullen, Clare Sebastian and Livvy Doherty contributed to this
> report.*
>
> Guru
> IT for Change, Bengaluru
> www.ITforChange.net
>
> --
> -----------
> 1.ವಿಷಯ ಶಿಕ್ಷಕರ ವೇದಿಕೆಗೆ ಶಿಕ್ಷಕರನ್ನು ಸೇರಿಸಲು ಈ ಅರ್ಜಿಯನ್ನು ತುಂಬಿರಿ.
> -https://docs.google.com/forms/d/e/1FAIpQLSevqRdFngjbDtOF8YxgeXeL
> 8xF62rdXuLpGJIhK6qzMaJ_Dcw/viewform
> 2. ಇಮೇಲ್ ಕಳುಹಿಸುವಾಗ ಗಮನಿಸಬೇಕಾದ ಕೆಲವು ಮಾರ್ಗಸೂಚಿಗಳನ್ನು ಇಲ್ಲಿ ನೋಡಿ.
> -http://karnatakaeducation.org.in/KOER/index.php/ವಿಷಯಶಿಕ್
> ಷಕರವೇದಿಕೆ_ಸದಸ್ಯರ_ಇಮೇಲ್_ಮಾರ್ಗಸೂಚಿ
> 3. ಐ.ಸಿ.ಟಿ ಸಾಕ್ಷರತೆ ಬಗೆಗೆ ಯಾವುದೇ ರೀತಿಯ ಪ್ರಶ್ನೆಗಳಿದ್ದಲ್ಲಿ ಈ ಪುಟಕ್ಕೆ ಭೇಟಿ
> ನೀಡಿ -
> http://karnatakaeducation.org.in/KOER/en/index.php/Portal:ICT_Literacy
> 4.ನೀವು ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶ ಬಳಸುತ್ತಿದ್ದೀರಾ ? ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶದ ಬಗ್ಗೆ
> ತಿಳಿಯಲು -http://karnatakaeducation.org.in/KOER/en/index.php/
> Public_Software
> -----------
> ---
> You received this message because you are subscribed to the Google Groups
> "Maths & Science STF" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to mathssciencestf+unsubscr...@googlegroups.com.
> To post to this group, send email to mathssciencestf@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
-----------
1.ವಿಷಯ ಶಿಕ್ಷಕರ ವೇದಿಕೆಗೆ  ಶಿಕ್ಷಕರನ್ನು ಸೇರಿಸಲು ಈ  ಅರ್ಜಿಯನ್ನು ತುಂಬಿರಿ.
 
-https://docs.google.com/forms/d/e/1FAIpQLSevqRdFngjbDtOF8YxgeXeL8xF62rdXuLpGJIhK6qzMaJ_Dcw/viewform
2. ಇಮೇಲ್ ಕಳುಹಿಸುವಾಗ ಗಮನಿಸಬೇಕಾದ ಕೆಲವು ಮಾರ್ಗಸೂಚಿಗಳನ್ನು ಇಲ್ಲಿ ನೋಡಿ.
-http://karnatakaeducation.org.in/KOER/index.php/ವಿಷಯಶಿಕ್ಷಕರವೇದಿಕೆ_ಸದಸ್ಯರ_ಇಮೇಲ್_ಮಾರ್ಗಸೂಚಿ
3. ಐ.ಸಿ.ಟಿ ಸಾಕ್ಷರತೆ ಬಗೆಗೆ ಯಾವುದೇ ರೀತಿಯ ಪ್ರಶ್ನೆಗಳಿದ್ದಲ್ಲಿ ಈ ಪುಟಕ್ಕೆ ಭೇಟಿ ನೀಡಿ -
http://karnatakaeducation.org.in/KOER/en/index.php/Portal:ICT_Literacy
4.ನೀವು ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶ ಬಳಸುತ್ತಿದ್ದೀರಾ ? ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶದ ಬಗ್ಗೆ ತಿಳಿಯಲು 
-http://karnatakaeducation.org.in/KOER/en/index.php/Public_Software
-----------
--- 
You received this message because you are subscribed to the Google Groups 
"Maths & Science STF" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to mathssciencestf+unsubscr...@googlegroups.com.
To post to this group, send an email to mathssciencestf@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to