23 May, 2017
As the first wave of WannaCry attacks struck computers across the world, Microsoft not only advised Windows users to patch their systems, but also upgrade their anti-virus software which acts as the first line of defence in detecting malware.
Microsoft has come out in defence of its role in Friday's on-going global cyber-attack, criticising the role of the US National Security Agency in creating tools that were subsequently leaked and then used in Friday's attacks. It locked down victim's computers and then threatened to delete the files if they didn't pay $300.
Microsoft Corp President Brad Smith sharply criticized the United States government on Sunday for "stockpiling" software flaws that it often can not protect, citing recent leaks of both NSA and Central Intelligence Agency hacking tools. And those running the company's 15-year-old Windows XP software were left unprotected, because Microsoft stopped issuing patches for XP in 2014. Still, he said Microsoft should accept some responsibility.
At least a dozen other NSA tools are now being discussed and worked on as the basis of potential new cyberweapons on hacking forums on the dark web - parts of the internet not accessible via normal search engines. "When a design flaw is discovered in a vehicle, manufacturers issue a recall".
"The use of bitcoin in this ransomware attack suggests. they don't know what they're doing", Heilman said. He notes that in February Microsoft called for a new "Digital Geneva Convention" to address these issues, "including a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them".
It should be noted that Microsoft makes it clear that when an older operating system reaches end-of-life, it no longer receives free support. There are around 2.25 lakh ATMs in country of which 60% run on the outdated Windows XP.
The technology behemoth said that on 14 March it had released a security update to patch vulnerability, however many computers globally remained unpatched. Many organizations without updated backups may decide that regaining access to critical files, such as customer data, and avoiding public embarrassment is worth the cost.
China's LeEco to cut jobs in US amidst cash crunch
The activist fund was more concerned with Jia's expansion into electric cars than his handling of the LeShi streaming service. Meanwhile, Yang Lijie, LeEco's CFO, has also announced that he will be resigning, to be replaced by Zhang Wei.
Chinese state media says US should take some blame for cyber attack
Meanwhile, there is at least one thing the government and security experts agree on: People who have seen the dreaded WannaCry screen should not pay the ransom.
Actor Reema Lagoo passes away
Today we made a decision to give a tribute to her stellar record in Bollywood by helping you relive some of her best performances. In an official statement, Tawde said, "She had played a variety of roles in Marathi and Hindi movies for a long tenure".
But cyber security experts still think this victory is short lived.
And the attack will lead to more non-U.S. companies buying cyber coverage, said Mr. Reagan of Marsh. Install all Windows updates. 5.
Microsoft is unlikely to face legal trouble over the ransomware attack, according to legal experts.
Microsoft has blamed the USA government for creating the software code that was used by hackers to launch the cyber-attacks. Moreover, in addition to Symantec, researchers at Google and Kaspersky Lab confirmed the coding similarities, the Times reports.
"WannaCry's propagation in those countries illustrate the dangers of using bootlegged software", Engadget wrote. Some security researchers speculated that if the perpetrators were North Korean, the goal may have been to cause a widespread internet outage to coincide with this weekend's latest missile test.
The Reserve Bank of India (RBI) also asked all banks to put in place a software update at ATMs to prevent their systems from a malware that has attacked payment systems across the world.
Smith said the malicious WannaCrypt software "were drawn from the exploits stolen from the National Security Agency". "Occasionally mistakes happen", he added.