Another cyber attack, much bigger than the WannaCry Ransomware

Hackers

Hackers

The WannaCry attack has infected some 300,000 computers across the globe since Friday.

"The problem is that there are a lot of Windows computers out there that either don't have automatic updates enabled or are so outdated that Microsoft has stopped providing security updates altogether", Vox said. Despite the lack of cover, plenty of Microsoft's customers are still running older software that may still be vulnerable. "You've got to keep your systems updated".

Nash said he's glad he insisted his few dozen area clients upgrade their respective operating systems from Windows XP, including the last to do so about a year ago.

The worm exploits a Windows defenselessness that Microsoft released a security fix in March and PCs that hadn't refreshed were still at hazard.

Using antivirus software will at least protect you from the most basic, well-known viruses by scanning your system against the known fingerprints of these pests.

On Wednesday security firms Bitdefender and Proofpoint found hackers using the same exploit to spread cryptocurrency-mining malware called Adylkuzz.

The fact is that some sectors within South Africa are woefully unprepared to deal with cyber-attacks, the effect of which can be utterly devastating. But, Nather said, there's a prominent mindset that if the tech works just fine, there's no real need to update it.

On the other hand, instead of telling them to Microsoft to patch up those vulnerabilities, it could bring forth a tumultuous situation as far as online security is concerned.

The "ransomware" cyberattack on companies and governments around the world has yet to victimize anyone at the University of IL, mostly because the UI bans outdated versions of the Windows operating system targeted by the virus.

The ACLU, meanwhile, urged Congress to pass a law requiring the government to disclose vulnerabilities to companies "in a timely manner", so that they can patch them as soon as possible. The culprits are unknown and could take years to track down, if ever.

On Sunday, the US software giant called on intelligence services to strike a better balance between their desire to keep software flaws secret - in order to conduct espionage and cyber warfare - and sharing those flaws with technology companies to better secure the internet (http://reut.rs/2qAOdLm). The system has been set up in a way that it avoids paying too many Monero to a single address. Additionally, last year, then-OCR Director Jocelyn Samuels wrote "one of our biggest current threats to health information privacy is the serious compromise of the integrity and availability of data caused by malicious cyberattacks on electronic information systems, such as through ransomware".

"Anytime something like this happens, we wonder if this will be the tipping point".

Still, "My answer is, never pay the ransom", Abrams said. "[To] overcome that, it's going to have to be a critical mass of life-threatening situations with software, much more frequently".