Nice information sir..thank you.. On May 13, 2017 1:45 PM, "Gurumurthy K" <itfc.stfk...@gmail.com> wrote:
> Dear teachers, > > Please keep updating the security updates on your computer. See article > below. > On Ubuntu, upgrade to the latest version can also be done freely without > any license fees .... Pls do > (see http://karnatakaeducation.org.in/KOER/en/index.php/Kalpavriksha for > information) > > regards, > Guru > > source - http://money.cnn.com/2017/05/12/technology/ransomware- > attack-nsa-microsoft/ > > Massive ransomware attack hits 99 countries - May. 12, 2017 > ------------------------------ > Hospitals, major companies and government offices have been hit by a > massive wave of cyberattacks across the globe that seize control of > computers until the victims pay a ransom. > > Cybersecurity firm Avast said it tracked > <https://slack-redir.net/link?url=https%3A%2F%2Fblog.avast.com%2Fransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today> > more than 75,000 ransomware attacks in 99 countries on Friday. > > It said the majority of the attacks targeted Russia, Ukraine and Taiwan. > But hospitals in the U.K., and global firms like Fedex (FDX > <http://money.cnn.com/quote/quote.html?symb=FDX&source=story_quote_link>) > also reported they had come under assault. > > *What is it?* > > *The ransomware locks down all the files on an infected computer and asks > the computer's administrator to pay in order to regain control of them. * > > *The ransomware, called "WannaCry," is spread by taking advantage of a > Windows vulnerability* that Microsoft (MSFT > <http://money.cnn.com/quote/quote.html?symb=MSFT&source=story_quote_link>, > Tech30 <http://money.cnn.com/technology/tech30/index.html?iid=EL>) > released a security patch > <http://money.cnn.com/2017/04/15/technology/microsoft-patch-shadow-brokers/index.html?iid=EL> > for in March. But computers and networks that haven't updated their systems > are at risk. The exploit was leaked last month as part of a trove of NSA > spy tools > <http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>. > > > "Affected machines have six hours to pay up and every few hours the ransom > goes up," said Kurt Baumgartner, the principal security researcher at > security firm Kaspersky Lab. "Most folks that have paid up appear to have > paid the initial $300 in the first few hours." > > Related: Microsoft quickly fixes 'crazy bad' Windows bug > <http://money.cnn.com/2017/05/09/technology/microsoft-bug-remote-windows-patch/index.html?iid=EL> > > Sixteen National Health Service (NHS) organizations in the UK have been > hit > <http://www.cnn.com/2017/05/12/health/uk-nhs-cyber-attack/index.html?iid=EL>, > and some of thosehospitals have canceled outpatient appointments and told > people to avoid emergency departments if possible. Spanish telecom company > Telefónica (TEF > <http://money.cnn.com/quote/quote.html?symb=TEF&source=story_quote_link>) > was also hit with the ransomware. > > Spanish authorities confirmed > <https://www.ccn-cert.cni.es/seguridad-al-dia/comunicados-ccn-cert/4464-ataque-masivo-de-ransomware-que-afecta-a-un-elevado-numero-de-organizaciones-espanolas.html> > the ransomware is spreading through the vulnerability, called > "EternalBlue," and advised people to patch. > > "It is going to spread far and wide within the internal systems of > organizations -- this is turning into the biggest cybersecurity incident > I've ever seen," UK-based security architect Kevin Beaumont said. > > Fedex said it was "experiencing interference with some of our > Windows-based systems caused by malware" and was trying to fix the problems > as quickly as possible. > > Russia's Interior Ministry released a statement acknowledging a ransomware > attack on its computers, adding that less than 1% of computers were > affected, and that the virus is now "localized." The statement said > antivirus systems are working to destroy it. > > Related: NSA's powerful Windows hacking tools leaked online > <http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL> > > Megafon, a Russian telecommunications company, was also hit by the attack. > Spokesman Petr Lidov told CNN that it affected call centers but not the > company's networks. He said the situation is now under control. > > The U.S. Department of Homeland Security, in a statement > <https://www.dhs.gov/news/2017/05/12/dhs-statement-ongoing-ransomware-attacks> > late Friday, encouraged people to update their operating systems. "We are > actively sharing information related to this event and stand ready to lend > technical support and assistance as needed to our partners, both in the > United States and internationally," the department said. > > Kaspersky Lab says although the WannaCry ransomware can infect computers > even without the vulnerability, EternalBlue is "the most significant > factor" in the global outbreak. > > *How to prevent it* > > Beaumont examined a sample of the ransomware used to target NHS and > confirmed it was the same used to target Telefónica. He said companies can > apply the patch released in March to all systems to prevent WannaCry > infections. Although it won't do any good for machines that have already > been hit. > > He said it's likely the ransomware will spread to U.S. firms too. The > ransomware is automatically scanning for computers it can infect whenever > it loads itself onto a new machine. It can infect other computers on the > same wireless network. > > "It has a 'hunter' module, which seeks out PCs on internal networks," > Beaumont said. "So, for example, if your laptop is infected and you went to > a coffee shop, it would spread to PCs at the coffee shop. From there, to > other companies." > > Related: How leaked NSA spy tools created a hacking free-for-all > <http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/?iid=EL> > > According to Matthew Hickey, founder of the security firm Hacker House, > Friday's attack is not surprising, and it shows many organizations do not > apply updates in a timely fashion. When CNNTech first reported > <http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL> > the Microsoft vulnerabilities leaked in April, Hickey said they were the > "most damaging" he'd seen in several years, and warned that businesses > would be most at risk. > > Consumers who have up-to-date software are protected from this ransomware. > Here's how to turn automatic updates > <https://support.microsoft.com/en-us/help/306525/how-to-configure-and-use-automatic-updates-in-windows> > on. > > It's not the first time hackers have used the leaked NSA tools to infect > computers. Soon after the leak, hackers infected thousands of vulnerable > machines with a backdoor > <http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/index.html?iid=EL> > called DOUBLEPULSAR. > > *-- Jethro Mullen, Clare Sebastian and Livvy Doherty contributed to this > report.* > > Guru > IT for Change, Bengaluru > www.ITforChange.net > > -- > ----------- > 1.ವಿಷಯ ಶಿಕ್ಷಕರ ವೇದಿಕೆಗೆ ಶಿಕ್ಷಕರನ್ನು ಸೇರಿಸಲು ಈ ಅರ್ಜಿಯನ್ನು ತುಂಬಿರಿ. > -https://docs.google.com/forms/d/e/1FAIpQLSevqRdFngjbDtOF8YxgeXeL > 8xF62rdXuLpGJIhK6qzMaJ_Dcw/viewform > 2. ಇಮೇಲ್ ಕಳುಹಿಸುವಾಗ ಗಮನಿಸಬೇಕಾದ ಕೆಲವು ಮಾರ್ಗಸೂಚಿಗಳನ್ನು ಇಲ್ಲಿ ನೋಡಿ. > -http://karnatakaeducation.org.in/KOER/index.php/ವಿಷಯಶಿಕ್ > ಷಕರವೇದಿಕೆ_ಸದಸ್ಯರ_ಇಮೇಲ್_ಮಾರ್ಗಸೂಚಿ > 3. ಐ.ಸಿ.ಟಿ ಸಾಕ್ಷರತೆ ಬಗೆಗೆ ಯಾವುದೇ ರೀತಿಯ ಪ್ರಶ್ನೆಗಳಿದ್ದಲ್ಲಿ ಈ ಪುಟಕ್ಕೆ ಭೇಟಿ > ನೀಡಿ - > http://karnatakaeducation.org.in/KOER/en/index.php/Portal:ICT_Literacy > 4.ನೀವು ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶ ಬಳಸುತ್ತಿದ್ದೀರಾ ? ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶದ ಬಗ್ಗೆ > ತಿಳಿಯಲು -http://karnatakaeducation.org.in/KOER/en/index.php/ > Public_Software > ----------- > --- > You received this message because you are subscribed to the Google Groups > "Maths & Science STF" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to mathssciencestf+unsubscr...@googlegroups.com. > To post to this group, send email to mathssciencestf@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- ----------- 1.ವಿಷಯ ಶಿಕ್ಷಕರ ವೇದಿಕೆಗೆ ಶಿಕ್ಷಕರನ್ನು ಸೇರಿಸಲು ಈ ಅರ್ಜಿಯನ್ನು ತುಂಬಿರಿ. -https://docs.google.com/forms/d/e/1FAIpQLSevqRdFngjbDtOF8YxgeXeL8xF62rdXuLpGJIhK6qzMaJ_Dcw/viewform 2. ಇಮೇಲ್ ಕಳುಹಿಸುವಾಗ ಗಮನಿಸಬೇಕಾದ ಕೆಲವು ಮಾರ್ಗಸೂಚಿಗಳನ್ನು ಇಲ್ಲಿ ನೋಡಿ. -http://karnatakaeducation.org.in/KOER/index.php/ವಿಷಯಶಿಕ್ಷಕರವೇದಿಕೆ_ಸದಸ್ಯರ_ಇಮೇಲ್_ಮಾರ್ಗಸೂಚಿ 3. ಐ.ಸಿ.ಟಿ ಸಾಕ್ಷರತೆ ಬಗೆಗೆ ಯಾವುದೇ ರೀತಿಯ ಪ್ರಶ್ನೆಗಳಿದ್ದಲ್ಲಿ ಈ ಪುಟಕ್ಕೆ ಭೇಟಿ ನೀಡಿ - http://karnatakaeducation.org.in/KOER/en/index.php/Portal:ICT_Literacy 4.ನೀವು ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶ ಬಳಸುತ್ತಿದ್ದೀರಾ ? ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶದ ಬಗ್ಗೆ ತಿಳಿಯಲು -http://karnatakaeducation.org.in/KOER/en/index.php/Public_Software ----------- --- You received this message because you are subscribed to the Google Groups "Maths & Science STF" group. To unsubscribe from this group and stop receiving emails from it, send an email to mathssciencestf+unsubscr...@googlegroups.com. To post to this group, send an email to mathssciencestf@googlegroups.com. For more options, visit https://groups.google.com/d/optout.