A ransomware malicious program called WannaCry attacks by exploiting vulnerabilities in Windows operating system made by Microsoft.
Ransomware is quite dangerous and has spread so quickly to the world, including Indonesia. This spread occurs from one computer to another via an internet connection.
As summarized KompasTekno from Microsoft Technet page, Sunday (5/14/2017), WannaCry potentially attacking old Windows to the latest.
Microsoft itself has released a deterrent as well as a list of Windows vulnerable to WannaCry attack. In total there are eight series of Windows and 29 editions expressed prone.
The series are Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016.
Given the vast impact of WannaCry attacks, Microsoft did not hesitate to release antidotes for older operating systems, namely Windows XP, Windows 8 and Windows Server 2003.
The antidote for this legacy operating system is contained in the March 2017 edition of security updates. This update should have been sent to the computer that set Windows Update to run automatically.
Ransoware WannaCry logs into Windows systems by exploiting vulnerabilities in Windows Server Message Block (SMB) protocol. SMB is one feature that allows fellow computers to share data.
The cyber security group Talon said that the initial start of WannaCry's ransomware deployment was an e-mail containing false information (pishing). This information is for example disguised in the form of bank transfer notification.
Users can prevent the occurrence of WannaCry infection by being more careful in opening e-mail, especially the unclear origin and contents. Another way is to activate Windows Defender or other antivirus products.
Ransomware is quite dangerous and has spread so quickly to the world, including Indonesia. This spread occurs from one computer to another via an internet connection.
As summarized KompasTekno from Microsoft Technet page, Sunday (5/14/2017), WannaCry potentially attacking old Windows to the latest.
Microsoft itself has released a deterrent as well as a list of Windows vulnerable to WannaCry attack. In total there are eight series of Windows and 29 editions expressed prone.
The series are Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016.
Given the vast impact of WannaCry attacks, Microsoft did not hesitate to release antidotes for older operating systems, namely Windows XP, Windows 8 and Windows Server 2003.
The antidote for this legacy operating system is contained in the March 2017 edition of security updates. This update should have been sent to the computer that set Windows Update to run automatically.
Ransoware WannaCry logs into Windows systems by exploiting vulnerabilities in Windows Server Message Block (SMB) protocol. SMB is one feature that allows fellow computers to share data.
The cyber security group Talon said that the initial start of WannaCry's ransomware deployment was an e-mail containing false information (pishing). This information is for example disguised in the form of bank transfer notification.
Users can prevent the occurrence of WannaCry infection by being more careful in opening e-mail, especially the unclear origin and contents. Another way is to activate Windows Defender or other antivirus products.
No comments:
Post a Comment