Cyber attack 'wake-up call for governments — Microsoft chief

UK Working to Restore Hospital Systems After Cyberattack

It encrypted users' computer files and displayed a message demanding $300 to $600 worth of the digital currency bitcoin to release them; failure to pay would leave the data scrambled and likely beyond fix. Europol, the European Union's police agency, said the onslaught was at "an unprecedented level and will require a complex global investigation to identify the culprits".

Use a reputable security software to prevent attacks in the future.

But the agency added that some infections may not yet have been detected, and that existing infections can spread within networks.

Security experts are advising victims to wait before paying the ransom.

At least two security firms-a FOX-IT here and CrowdStrike here-said spam that sent fake invoices to end users provided the crucial initial vector to seed the self-replicating attack, but none of the three companies have produced copies.

"A number of NHS organizations have reported that they have suffered from a ransomware attack", U.K. Prime Minister Theresa May told reporters. Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services were also said to be affected.

In a blog post Friday night, Microsoft also said it had produced a "signature" that allows its Windows Defender antivirus engine to provide "defense-in-depth" protection. All sectors of the economy were vulnerable and organizations could take lessons from the banking industry, which appeared to have largely escaped the global attack. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful.

Cyber bad guys have spread ransomware, known as WannaCry, to computers around the world.

Don't grumble when your system administrator at work takes the network down periodically to update systems, which usually includes installing new and often critical software patches.

"We have to be vigilant every day with security, so making sure you're running the latest version of your operating system and making sure that you ran all the updates that are available for your computer, using an appropriate firewall or updated router for your home computer that can block these types of things or attempt to filter them".

The patches won't do any good for machines that have already been hit.

'Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators, ' he said.

Security agencies have so far not been able to identify who was behind the attack. Europol said Monday that "very few" people have paid the ransom.

WannaCry has already caused massive disruption around the globe.

A spokesman for Barts Health NHS Trust in London said it was experiencing "major IT disruption" and delays at all four of its hospitals.

It comes after more than 200,000 victims in around 150 countries were infected by the ransomware which originated in the United Kingdom and Spain on Friday before spreading around the world.

This includes whitelisting certain websites and software so only approved programs can run on a computer, or disabling administrative privileges on a company's machines so that only the IT department can download programs. Among those hit were Russia's Interior Ministry and companies including Spain's Telefonica and FedEx the U.S.

Microsoft patched the flaws in March when it issued MS17-010, one of its last-ever security bulletins. Courts have consistently upheld those agreements, he said.Alex Abdo, a staff attorney at the Knight First Amendment Institute at Columbia University, said Microsoft and other software companies have strategically settled lawsuits that could lead to court rulings weakening their licensing agreements. That way even if you're hit with ransomware you've got all your files protected elsewhere. Here's how to turn automatic updates on.

The security holes it exploits were disclosed weeks ago by TheShadowBrokers, a mysterious group that published what it said are hacking tools used by the NSA.



Otras noticias