Last week I told you about bug fixes announced by Android as part of its May security bulletin. Well, over the weekend Samsung began releasing fixes for 27 vulnerabilities. Twenty-one of those are labeled as high severity. Handsets affected are the S9, Note 8 and S8 phones. Make sure you get them installed. Those of […]
Well, the WannaCry virus/worm came, caused havoc and left. Or has it?
If you don’t know what this is all about, you have either been living on another planet or a commune without a TV set.
Last week, NHS ( National Hospital Service ) in the UK along with a few airports amongst 30,000+ others were hit by a ransomware piece of software that aggressively spread itself and cause 30,000 people to register for bitCoin accounts in order to pay these anonymous hackers.
The information for the hack was in the NSA files and was uncovered sometime early this year or late last year by a hack group who later made the information public.
The russians blamed the NSA for creating the backdoor which Microsoft has closed now, though some said perhaps MS might have moved more quickly when it was discovered.
If you are running Windows 7 or 8, we know Microsoft said they wouldn’t update these anymore, but apparently they made an exception and made an update available to retroactively patch this hole there too.
Anyway, if you have Windows 10, don’t walk, run go get the patch. The global hack was somewhat inadvertently stopped by a bright UK researcher who was offered a job at the UK’s spy agency the following day.
However, the following day, Kaspersky the Russian anti-virus, who are amongst the best in the world, reported that new variations were now wandering around that were not being stopped by the purchase of the dummy domain that the UK researcher purchased in order to sink last week’s attacks.
Patch your windows stuff or buy a Mac.
Keep computing but do it safely.
… Still yet more information on WannaCry from the nytimes …
The source of the attack is a delicate issue for the United States because the vulnerability on which the malicious software is based was published by a group called the Shadow Brokers, which last summer began publishing cybertools developed by the National Security Agency.
Government investigators, while not publicly acknowledging that the computer code was developed by American intelligence agencies as part of the country’s growing arsenal of cyberweapons, say they are still investigating how the code got out. There are many theories, but increasingly it looks as though the initial breach came from an insider, perhaps a government contractor.
Copycat variants of the malicious software behind the attacks have begun to proliferate, according to experts who were on guard for new attacks. “We are in the second wave,” said Matthieu Suiche of Comae Technologies, a cybersecurity company based in the United Arab Emirates. “As expected, the attackers have released new variants of the malware.