Monday marked the fourth day a cyber attack known as "WannaCry" held hostage hundreds of thousands of computers all over the world with the intent of collecting money in exchange for retrieving files and data that become locked and inaccessible, supposedly unless a ransom is paid.
MalwareTech, who wants to remain anonymous, was hailed as an "accidental hero" after registering a domain name to track the spread of the virus, which actually ended up halting it.
Read the entire article here, The BIG Ransomware Attack that Could Have Been Avoided!
Windows XP's worldwide share was about 7% in April, said USA analytics vendor Net Applications earlier this month, about one-fourth the share of Windows 10 and a seventh the share of Windows 7.
In Japan, a spokesman for Hitachi said the conglomerate discovered problems on Monday morning and its computer networks were "unstable".
Microsoft had released a patch in March to counter WannaCrypt ransomware, the company also issued a prompt update on Friday to Windows Defender to detect the WannaCrypt attack. The same goes for cloud services, though they can be helpful. He added that ransomware attacks were normally criminal rather than political in nature.
"It had a countdown clock ticking down, stating that all data would be deleted unless a payment was received within that timeframe", he said.
WannaCry has already caused massive disruption around the globe.
The WannaCry ransomware appears to only attack unpatched computers running Windows. Others affected include Nissan Motors, FedEx, China National Petroleum, Renault SA, Deutsche Bahn, Russian bank Sberbank, the Yancheng police department in China, the Russian Interior Ministry, and Hitachi to name a few.
Once your system has ransomware, your choices are limited: pay or don't pay.
Professor Clark said more information on protecting your computer was available via the IT security company Sophos and the National Cyber Security Centre, among other sources.
Apple is not invulnerable to ransomware attacks, "a common misconception", one expert tells CNBC. It said less than 1 percent of computers were affected, and that the virus was now "localized" and being destroyed.
Britain's National Crime Agency (NCA) also said it had seen no evidence of a "second spike in WannaCry ransomware attacks" by midday, but warned that another attack could still happen.
The original attack lost momentum late on Friday after a security researcher took control of a server connected to the outbreak, which crippled a feature that caused the malware to rapidly spread across infected networks.
"An equivalent scenario with conventional weapons would be the USA military having some of its Tomahawk missiles stolen, he wrote, adding that governments should "report vulnerabilities" that they discover to software companies, "rather than stockpile, sell, or exploit them".
Consumers who have up-to-date software are protected from this ransomware. "We have been in touch with Microsoft and others.even they have not got any reports", PTI quoted Sanjay Bahl, Indian Computer Emergency Response Team (CERT-In), director general.