Home Blog Page 71224

Microsoft Renews Calls for “Digital Geneva Convention” After Widespread Cyber Attacks

0

The major story from last week was that malware, described in leaked NSA documents, crippled Windows computers worldwide. The WannaCry Ransomware virus is believed to have hit 200,000 victims in 150 countries, including UK hospitals, utilities in Spain, and Russia’s interior ministry.
The major story from last week was that malware, described in leaked NSA documents, crippled Windows computers worldwide. The WannaCry Ransomware virus is believed to have hit 200,000 victims in 150 countries, including UK hospitals, utilities in Spain, and Russia’s interior ministry. Renault shut down several French factories after the cyberattack, and one of Nissan’s UK factories was also impacted.
The scale of the attack prompted Microsoft to take the highly unusual step of releasing patches for unsupported operating systems, including Windows XP. If you have machines running Windows, needless to say, you should patch them as fast as you can.
Currently the “kill switch” discovered by MalwareTech appears to be holding, although it seems reasonable to assume that variants of the virus without the kill switch will begin circulating soon, and indeed Danish security firm Heimdal Security believes they already are .
In the wake of the news Microsoft’s president and chief legal officer Brad Smith took to the company’s website to give a post mortem of the attack citing lessons that need to be learned. Whilst accepting Microsoft’s share of the blame, Smith suggested that the bulk of the responsibility for the massive cyberhack lies at the feet of government agencies.
…this attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U. S. military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today – nation-state action and organized criminal action.
Smith goes on to renew Microsoft’s call in February for a new  » Digital Geneva Convention ”
to govern these issues, including a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them. And it’s why we’ ve pledged our support for defending every customer everywhere in the face of cyberattacks, regardless of their nationality.
In this context it’s perhaps worth remembering that last year Apple came under tremendous pressure to create a special version of iOS for the U. S. government, under the promise that it would never escape their safe hands and get into the wild. One of those people was presidential hopeful Donald Trump.
The malware seems to have not proved hugely profitable for its owners so far. The BBC reports that « analysis of three accounts linked to the ransom demands suggests only about $38,000 (£29,400) had been paid by Monday morning. »

© Source: https://www.infoq.com/news/2017/05/ms-digital-geneva-convention?utm_campaign=infoq_content&utm_source=infoq&utm_medium=feed&utm_term=global
All rights are reserved and belongs to a source media.

Nintendo is planning a Legend of Zelda mobile game

0

Following up on the massive success of Pokémon GO and the less massive success of Super Mario Run, Nintendo is reportedly planning a Legend of Zelda for..
Following up on the massive success of Pokémon GO and the, well, slightly less massive success of Super Mario Run, Nintendo is reportedly planning a Legend of Zelda for smartphones for release later this year, or so The Wall St Journal’s sources have it.
How exactly they expect to represent the expansive exploring, puzzling and battling that have defined the series heretofore is unclear. Super Mario Run took a minimalist approach to controls, essentially reducing the platformer to a one-button game.
That would be rather difficult with the vastly more complex Zelda series — doubly so considering the improbably well-received Breath of the Wild was so vast and unrestricted. Whether the company would repeat its pricing strategy for Mario is also unknown; sales weren’ t quite what it had hoped.
We’ ll likely know more soon; Super Mario Run was announced three months ahead of its release. But if the timing hinted at by the WSJ’s sources is correct, we’ ll hear about the Animal Crossing game first, though who knows when.

© Source: https://techcrunch.com/2017/05/15/nintendo-is-planning-a-legend-of-zelda-mobile-game/?ncid=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29
All rights are reserved and belongs to a source media.

Premier Szydło w Chinach: jest duże zainteresowanie współpracą z Polską

0

Wśród państw azjatyckich jest duże zainteresowanie współpracą z Polską, zarówno jeżeli chodzi o inwestycje, jak i wymianę handlową – powiedziała w poniedziałek w Pekinie premier Beata Szydło.
Wśród państw azjatyckich jest duże zainteresowanie współpracą z Polską, zarówno jeżeli chodzi o inwestycje, jak i wymianę handlową – powiedziała w poniedziałek w Pekinie premier Beata Szydło.
Szefowa rządu wzięła udział w międzynarodowym forum poświęconym chińskiej inicjatywie Pasa i Szlaku nawiązującej do historycznego Jedwabnego Szlaku.
Podczas wizyty w Chinach Szydło odbyła wiele spotkań z przywódcami państw Azji. « Jest duże zainteresowanie współpracą z Polską, zarówno jeżeli chodzi o inwestycje, jak i np. wymianę handlową. Mamy tutaj duże pole do zagospodarowania » – oświadczyła Szydło.
Premier dodała, że inicjatywa Pasa i Szlaku « jest inicjatywą, która będzie w najbliższych dekadach zapewne dyktowała warunki rozwoju gospodarczego w regionie ». « Będzie też przekładała się na to, co dzieje się w państwach, które będą chciały uczestniczyć w tych projektach » – oceniła.
Szydło poinformowała, że podczas wizyty w Chinach rozmawiała o możliwości współpracy dotyczącej inwestycji, turystyki, wymiany międzykulturowej, czy współpracy uniwersytetów. « Dla Polski najważniejsze jest to, aby ta współpraca przełożyła się na konkretne projekty prorozwojowe » – zaznaczyła.
Premier powiedziała też, że z punktu widzenia Polski forum w Pekinie było ważne, gdyż umożliwiło « rozmowy na temat współpracy gospodarczej z państwami, z którymi Polska nie ma na co dzień możliwości tak częstych kontaktów, jak podczas tego spotkania ». (PAP)
rbk/ mce/ ap/ je/

© Source: http://www.pap.pl/aktualnosci/news,934947,premier-szydlo-w-chinach-jest-duze-zainteresowanie-wspolpraca-z-polska-.html
All rights are reserved and belongs to a source media.

The WannaCrypt attack — what we know and how to protect yourself

0

What seemed to have begun as just another ransomware attack hit the headlines last Friday (May 12th) when it began to attack hospitals and healthcare services in the UK. It became clear pretty quickly that this was in fact something much bigger however, with problems reported…
What seemed to have begun as just another ransomware attack hit the headlines last Friday (May 12th) when it began to attack hospitals and healthcare services in the UK. It became clear pretty quickly that this was in fact something much bigger however, with problems reported at businesses and government bodies around the world.
Infections by the malware known as WannaCrypt or WannaCry, began in Spain with the Telefonica telecommunications giant one of the first to be hit. It then quickly spread to the United Kingdom, Russia, Japan, Taiwan, the United States, and many others. In total, over 150 countries have been affected by the ransomware since Friday, according to Europol.
Some of the highest profile victims were the UK’s National Health Service, the shipping firm FedEx in the US and car maker Renault in France. Microsoft responded by taking the unusual step of issuing patches for out of date operating systems to help users to secure their systems.
Details of the malware used have been released in a blog post by Recorded Future. This also notes the triggering of an in-built ‘kill switch’ by a security researcher going by the Twitter handle @MalwareTechBlog, by registering a domain name which the malware was set to check he was able to stop further infections. If the domain is present when WannaCrypt attacks it exits the system without damage.
Security experts have been quick to point out that this is a two-month old vulnerability and its impact has been down to organizations failing to keep their systems up to date. Ilia Kolochenko, CEO of web security company High-Tech Bridge says, « Many companies were infected because they failed to maintain a comprehensive inventory of their digital assets, and just forgot to patch some of their systems. Others, omitted or unreasonably delayed security patches. Last, but not least — malware’s capacity to self-propagate leveraged the lack of segregation and access control within corporate networks. »
Over the weekend new versions have emerged without the kill switch. Stu Sjouwerman, CEO of security awareness training provider KnowBe4 says, « This means the attackers resumed their campaign even though the MalwareTech security researcher accidentally cut off the original wave. WannaCry’s persistence is only the beginning. It is indicative of the sophistication of ransomware and its ability to severely impact critical infrastructures. »
KnowBe4 also offers recommendations for protecting against the attack. These include checking firewall configurations to make sure no criminal network traffic is allowed out, and disabling SMB1 (Server Message Block) on all machines.
Installing Secure Email Gateway (SEG) , to carry out URL filtering and make sure it’s tuned correctly is also recommended along with patch endpoint, OSes and 3rd-party applications regularly. Endpoints and web-gateways also need to have next-generation, frequently updated security layers.
If a machine is infected with WannaCrypt or other ransomware it needs to be wiped and re-imaged from bare metal.
This attack should also be a trigger for enterprises to review their security procedures. In particular they need to identify users that handle sensitive information and enforce higher-trust authentication such as 2FA. Policies and procedures should also be tightened, specifically those related to financial transactions, to prevent CEO fraud. Finally employees need to be aware of and able to spot social engineering attacks via multiple channels, not just email.
Moshe Ben-Simon, co-founder and vice president of deception technology firm TrapX Security says, « The solution to avoiding and defeating these attacks is increased visibility. They will get in your networks — but how will you know? You must be able to find these attacker tools in your network before they can encrypt and control your data. New best practices, especially in highly targeted industries such as healthcare, finance and manufacturing, suggest further movement towards technologies that can detect and then engage ransomware tools. »
Photo Credit: Carlos Amarillo / Shutterstock

© Source: https://betanews.com/2017/05/15/wannacrypt-what-we-know/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed+-+bn+-+BetaNews+Latest+News+Articles
All rights are reserved and belongs to a source media.

Vladimir Putin Shows Off His Musical Skills On A Piano In China

0

No tip jar?
We’ re guessing he didn’ t take requests.
Russian President Vladimir Putin showed off his piano skills in Beijing Sunday, playing a few tunes while waiting for Chinese President Xi Jinping at a state guesthouse, The New York Times reported.
Putin tickled the ivories with a pair of 1950s, Soviet-era tunes, Vasily Solovyov-Sedoi’s “Evening Song” and Tikhon Khrennikov’s “Moscow Windows, ” the Times noted.
Vladimir #Putin plays grand piano at Chinese leader’s residence https: //t.co/JGcA19PcQA pic.twitter.com/1RNbsFwvwU
He’s played the piano before  in public ― and his performance shouldn’ t be too surprising. The Russian leader isn’ t shy about displaying himself as a macho renaissance man, also participating in  judo, ice hockey  and horseback riding ― the latter sometimes shirtless.
Putin was in Beijing to discuss a $1 billion economic plan called “One Belt, One Road” that is intended to benefit dozens of countries, according to news outlets.
Twitter was amused by the president’s performance.
We should have known that Putin’s favourite thing to play on the piano is the Imperial March from Star Wars pic.twitter.com/J9NsN3Yi6Q
All villains should be accomplished, so here’s Russian dictator Vladimir Putin playing the piano https: //t.co/xUCJ1WRDDY pic.twitter.com/xBxpvmHfEq
@BBCWorld Putin plays piano as the US is discredited, Nero played the Fiddle as Rome Burnt, Trump will play golf as his Presidency goes up in flames

© Source: http://www.huffingtonpost.com/entry/vladimir-putin-plays-the-piano-in-china-because-hes-a-big-showoff_us_591988a7e4b0fe039b35eee2
All rights are reserved and belongs to a source media.

WannaCry ransomware cyber-attacks delayed though fears remain

0

A mechanism malware that has widespread opposite 150 countries appears to be negligence down, with few reports of uninformed attacks in Asia and Europe on Monday.
A mechanism malware that has widespread opposite 150 countries appears to be negligence down, with few reports of uninformed attacks in Asia and Europe on Monday.
However staff commencement a operative week have been told to be careful.
The WannaCry ransomware started holding over users’ files on Friday, perfectionist $300 (£230) to revive access.
Hundreds of thousands of computers have been influenced so far. Computer hulk Microsoft pronounced a conflict should offer as a wake-up call.
BBC research of 3 accounts related to a release final suggests usually about $38,000 (£29,400) had been paid by Monday morning.
Read more:
However, a ransomware warning pronounced that a cost would double after 3 days, so a payments might increase.
It threatens to undo files within 7 days if no remuneration is made.
Among a organisations targeted worldwide have been Germany’s rail network Deutsche Bahn, Spanish telecommunications user Telefonica, US logistics hulk FedEx and Russia’s interior ministry. How has Monday been so far?
Many firms employed experts over a weekend to try to forestall new infections.
The design now appears improved in Europe.
Senior orator for Europol, Jan Op Gen Oorth, told Agence France-Presse: “The series of victims appears not to have left adult and so distant a conditions seems fast in Europe, that is a success.
“It seems that a lot of internet confidence guys over a weekend did their task and ran a confidence program updates.”
UK Health Minister Jeremy Hunt reliable to a BBC that UK comprehension services had found no justification of a second call of attacks on Monday.
The UK’s National Crime Agency progressing tweeted: “We haven’ t seen a second spike in WannaCry ransomware attacks, though that doesn’ t meant there won’ t be one.”
The badly influenced National Health Service said 7 out of 47 trusts that were strike were still confronting vicious issues .
Carmaker Renault pronounced a plant in a northern city of Douai would not free on Monday as it dealt with a cyber-attack.
In Asia, a poignant negligence of a malware was also reported:
Banking systems opposite a segment were mostly unaffected. Who is behind a attack?
This won’ t take long. Nobody knows. Europol’s Jan Op Gen Oorth said: “A bit early to say… though we are operative on a decrypting tool”.
Associated Press quoted Tim Wellsmore, of US confidence organization FireEye, as saying: “We design this is a tiny operation… They only happened to strike a mom lode.”
Russian President Vladimir Putin said: “Russia has positively zero to do with it.” Should people pay?
Companies in Asia and Europe have been warning employees to be clever when clicking on attachments and links in their emails.
The summary from a UK’s National Crime Agency was “do not pay!” – there is no pledge that systems will be restored.
Michael Gazeley, of Network Box, a Hong Kong-based cyber-security firm, told Reuters there were still “many ‘landmines’ watchful in people’s inboxes”, adding that his organization had rescued a new chronicle that putrescent users directly around a antagonistic couple on hacked websites.
Becky Pinkard, from Digital Shadows, a UK-based cyber-security firm, also pronounced it would be easy for a initial enemy or “copy-cat authors” to change a pathogen formula so it is formidable to ensure against.
A UK confidence researcher famous as “MalwareTech”, who helped to extent a ransomware attack, expected “another one coming… utterly expected on Monday”.
MalwareTech, whose name was suggested in UK media to be 22-year-old Marcus Hutchins, was hailed as an “accidental hero” after induction a domain name to lane a widespread of a virus, that indeed finished adult crude it. What’s behind Microsoft’s ‘wake-up call’ warning?
The computing giant says a apparatus used in this stream conflict had been grown by a US National Security Agency and was stolen by hackers.
It is rarely vicious of a approach governments store information on program vulnerabilities.
Microsoft boss and arch authorised officer Brad Smith pronounced on Sunday: “We have seen vulnerabilities stored by a CIA uncover adult on Wikileaks, and now this disadvantage stolen from a NSA has influenced business around a world.
“An homogeneous unfolding with required weapons would be a US troops carrying some of a Tomahawk missiles stolen.”
The organization also pronounced that many organisations had unsuccessful to keep their systems adult to date, permitting a pathogen to spread.
Microsoft pronounced it had expelled a Windows confidence refurbish in Mar to tackle a problem concerned in a latest attack, though many users were nonetheless to run it. Analysis: Dave Lee, BBC North America record reporter
There are going to be some tough questions on Monday for those institutions that didn’ t do adequate to keep their networks secure, as good as a organisations that were best placed to stop it function in a initial place – a NSA and Microsoft.
The NSA keeps a chest of cyber-weapons to itself so it can strike targets, though Microsoft has prolonged argued that this is dangerous. If there is a smirch in Windows, a association said, certainly a safest thing to do is to let a group know true divided so it can be fixed.
But afterwards Microsoft also needs to cruise what requirement it has to refurbish all users – not only a ones who compensate additional for confidence on comparison systems.
Updating your mechanism if you’ re an particular is a square of cake, though for a network a distance of Britain’s National Health Service? Tough – time-consuming, costly and complex.
For a association like Microsoft to contend it won’ t keep those systems protected unless they bombard out some-more money, afterwards that in itself, we think, is something of a ransom.
Get news from a BBC in your inbox, any weekday morning

© Source: http://headlinenewstoday.net/wannacry-ransomware-cyber-attacks-slow-but-fears-remain.html
All rights are reserved and belongs to a source media.

Ransomware attack: Amidst the chaos, the blame game begins

0

WannaCry ransomware exploited a number of factors to cause much damage. Now comes the difficult task of preventing it happening again.
The first wave of the ransomware attack that engulfed businesses around the world last week has apparently now passed, although it’s quite possible more infections will occur.
But the post-mortem on how it happened — and how to stop it happening again — has only just begun.
With this one, there’s plenty of blame to go around.
Clearly most of the blame must go to the shadowy malware developers who created the ransomware in the first place. They have caused havoc worldwide, with the cruellest impact on the many patients who have had their treatments delayed and operations cancelled. For these people to be put at risk because of a squalid get-rich-quick scheme, which seems to have raised just a few tens of thousands of dollars, is utterly beneath contempt.
But there are a host of other factors that made it easier for WannaCry (a.k.a. WannaCrypt) to do as much damage as it did.
WannaCry would never had been as invasive had it not been turbocharged by the so-called EternalBlue exploit.
EternalBlue had been dumped online by the ShadowBrokers, a group that’s allegedly linked to Russian intelligence.
The ShadowBrokers had themselves stolen these tools from the US National Security Agency (NSA) , which presumably developed them for espionage purposes.
Dumping these tools online after they failed to sell them to the highest bidder was a hugely reckless act, probably designed to embarrass the NSA and be a nuisance. But once such dangerous software is made public, it’s impossible to know how it will be used — and now Russia is one of the countries worst hit by WannaCry.
Dumping the tools was clearly rash — but should the NSA have developed them in the first place? Intelligence agencies have a long history of spotting weaknesses in software, and while most are turned over to software vendors to fix, they keep a few back to make it easier to sneak into the computer systems of rival states. So flaws that could be fixed remain open.
As Microsoft’s president Brad Smith said, the WannaCrypt attack « provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem ». These exploits have a habit of leaking into the public domain and cause widespread damage, he said.
« An equivalent scenario with conventional weapons would be the U. S. military having some of its Tomahawk missiles stolen,  » he said, adding: « This most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today — nation-state action and organized criminal action. »
Former NSA-contactor-turned-whistleblower Edward Snowden was more succinct, tweeting: « Despite warnings, @NSAGov built dangerous attack tools that could target Western software. Today we see the cost. »
Others have made a similar point: « While GCHQ cannot be blamed for the NHS’s reliance on out of date software, the decision that the NSA and GCHQ have made in keeping this vulnerability secret, rather than trying to get it fixed, means they have a significant share of the blame for the current NHS ransom,  » said the Open Rights Group .
A fix for the software vulnerability made public by the ShadowBrokers had been available since March for modern versions of Windows, but it’s clear that not every organization had updated their systems to protect against it. Not everyone has the time to patch every vulnerability, and some take their time with updates in case a patch breaks something else.
But for older versions of Windows — like the venerable Windows XP — there was no patch, because Microsoft no longer provides security updates for it (Windows XP first went on sale in 2001) . As WannaCry spread, Microsoft did issue an emergency patch for XP and other out-of-support Windows versions, and the crisis will surely reopen questions about how long Microsoft should support old versions of its software.
It’s well known that the NHS and other organisations still have PCs running XP. Older operating systems become ever riskier to use when connected to the public internet, and the WannaCry episode is just one example.
Why do some organisations stick with XP? Some of these PCs may be running XP-specific software for a particular task; others may not be internet-connected and are therefore somewhat less vulnerable. But it’s often an issue of cost, with organisations unable to afford to upgrade hardware and software — especially in the healthcare sector, where there are always plenty of competing areas for funding.
In hindsight, such penny-pinching may not have been the wisest move. Already politicians are arguing over whether a lack of funding was to blame for the NHS being hit quite so hard by the ransomware.
Similar arguments will be taking place inside many organisations. Meanwhile, intelligence agencies need to reconsider how they use software vulnerabilities. Microsoft’s Brad Smith is right that this latest ransomware attack should be a wake-up call to governments and industry. Much now depends on how they respond.

© Source: http://www.zdnet.com/article/ransomware-attack-amidst-the-chaos-the-blame-game-begins/
All rights are reserved and belongs to a source media.

81-Jähriger deutscher Rechtsextremist bat in Ungarn um Asyl

0

Der verurteilte Holocaust-Leugner flüchtete vor einer neuerlichen Inhaftierung nach Ungarn und bittet den « Führer der ungarischen Nation » um Asyl. Er wurde verhaftet.
Der verurteilte Holocaust-Leugner und deutsche Rechtsextremist Horst Mahler ist einem Medienbericht zufolge in Ungarn festgenommen worden. Dies berichtete die Zeitung « taz » am Montag in ihrer Onlineausgabe unter Berufung auf die Staatsanwaltschaft München II. Die Festnahme sei « aktuell » erfolgt, zitierte die Zeitung einen Behördensprecher.
Mahler hat einem Bericht zufolge in Ungarn um politisches Asyl gebeten. Dies gehe aus einer Erklärung hervor, die der 81-Jährige im Internet veröffentlicht habe, berichtete die « Mitteldeutsche Zeitung » am Montag.
« Ich habe am 12. Mai 2017 den Führer der ungarischen Nation, Viktor Orban, ersucht, mir als politisch Verfolgtem Asyl in Ungarn zu gewähren », zitierte die Zeitung aus der Erklärung, die demnach mit den Worten endet: « Im Vertrauen auf den Freiheitssinn des Volks der Ungarn lege ich mein Schicksal in die Hände seiner Regierung. » Dann folge die handschriftliche Signatur Horst Mahler.
Die ungarische Botschaft in Berlin erteilte dem Ansinnen Mahlers umgehend eine Absage. Auf Facebook erklärte die Botschaft:  » Ungarn ist ein Rechtsstaat und Mitglied der EU, Deutschland ist ebenfalls ein Rechtsstaat und Mitglied der EU. » Ein solches Ersuchen « entbehrt daher jeder Grundlage ».
Der ehemalige Anwalt hatte sich zuvor seiner neuerlichen Inhaftierung durch Flucht entzogen. In einem am 9. April online veröffentlichten Video sagte er, die Haftaufforderung sei eine « politische Verfolgung ohne rechtliche Grundlage ». Er werde nun politisches Asyl in einem « aufnahmebereiten, souveränen Staat » erbitten.
Mahler verbüßte seit 2009 eine Gesamtfreiheitsstrafe von knapp zehn Jahren wegen Volksverhetzung und Leugnung des Holocaust. In München und Potsdam waren entsprechende Urteile gegen ihn ergangen. Im Sommer 2015 erhielt er wegen einer schweren Erkrankung Haftverschonung.
Ende vergangenen Jahres hob das Oberlandesgericht Brandenburg die Aussetzung der Reststrafe zur Bewährung allerdings auf. Der einstige Linksradikale, der sich zum Rechtsradikalen wandelte und als unbelehrbar gilt, hatte sich anhaltend antisemitisch geäußert.
Mahler gehörte zur ersten Generation der linksterroristischen Rote Armee Fraktion (RAF) um Andreas Baader und Ulrike Meinhof. Er verbüßte wegen Straftaten im Zusammenhang mit der RAF von 1970 bis 1980 eine Haftstrafe.
In den 90er-Jahren sorgte der Rechtsanwalt dann mit rechtsextremen Äußerungen für Aufsehen und vertrat die NPD als Anwalt vor dem Bundesverfassungsgericht im ersten Verbotsverfahren. Dieses scheiterte 2003.
(APA/AFP)

© Source: http://diepresse.com/home/ausland/aussenpolitik/5218182/81Jaehriger-deutscher-Rechtsextremist-bat-in-Ungarn-um-Asyl?from=rss
All rights are reserved and belongs to a source media.

Windows ransomware: WannaCrypt shows why NSA shouldn't stockpile exploits, says Microsoft

0

Microsoft’s president and chief legal counsel has renewed a call for a digital Geneva convention following Friday’s WannaCrypt ransomware attacks.
Microsoft president and chief legal officer Brad Smith has called for « urgent collective action » in response to Friday’s WannaCrypt ransomware attack on Windows machines that didn’t have Microsoft’s March patch for a flaw in the Windows Server Message Block (SMB) protocol.
Governments, in particular intelligence agencies such as the National Security Agency (NSA) , need to rethink the practice of stockpiling cyberweapons, Smith said in a blogpost on Sunday detailing how Microsoft, governments, and industry can prevent a repeat of Friday’s devastating and widespread WannaCrypt ransomware attack.
While improvements can be made by all groups, as Smith emphasized, the WannaCrypt exploit that caused Friday’s chaos was « drawn from the exploits stolen from the National Security Agency ». In other words, had the NSA reported the flaw to Microsoft instead of keeping it and eventually leaking it, Friday’s attack might not have been so widespread.
The WannaCrypt attacks hit Europe first, crippling around 45 UK hospital groups among others, before being accidentally contained by security researchers at MalwareTech, minimizing the impact on US organizations.
The specific NSA exploit that WannaCrypt adopted as a replicating mechanism was called EternalBlue, which targeted a flaw in Windows SMB and was leaked by the mystery hacker group, Shadow Brokers, in April.
Microsoft fortunately released a patch for the flaw in the MS17-010 bulletin in March, but as Friday’s attacks revealed, many organizations don’t or can’t apply patches within two months, even for critical, highly publicized flaws.
« This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,  » said Smith, comparing the exploit’s theft to stolen missiles .
« We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage,  » he wrote.
« An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen. And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today — nation-state action and organized criminal action. »
Smith highlighted Microsoft’s decision on Friday to release a patch for unsupported Windows XP, Windows 8, and Windows Server 2003, as evidence of the priority it places on security, alongside updates in Windows Defender and its Advanced Threat Protection service.
And while he reminded users that « there is simply no way for customers to protect themselves against threats unless they update their systems », Smith does concede that some organizations face a « formidable » challenge in applying patches immediately.
Exactly how Microsoft plans to make it easier for organizations to patch their systems without breaking operational equipment remains to be seen. However, Smith said Microsoft is « dedicated to developing further steps to help ensure security updates are applied immediately to all IT environments ».
Finally, Smith believes the WannaCrypt attack illustrates why it makes sense governments for to agree to Microsoft’s proposal for a ‘digital Geneva convention’, which would require governments to report vulnerabilities to vendors, rather than stockpile or buy and sell them.
« We should take from this recent attack a renewed determination for more urgent collective action. We need the tech sector, customers, and governments to work together to protect against cybersecurity attacks. More action is needed, and it’s needed now. In this sense, the WannaCrypt attack is a wake-up call for all of us. We recognize our responsibility to help answer this call, and Microsoft is committed to doing its part,  » Smith finished.
According to Reuters, Russian president Vladimir Putin agrees with Microsoft on this issue.
« I believe that the leadership of Microsoft have announced this plainly, that the initial source of the virus is the US intelligence services,  » Putin said.
« Once they’re let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators,  » he added.
« So this question should be discussed immediately on a serious political level, and a defense needs to be worked out from such phenomena. »

© Source: http://www.zdnet.com/article/windows-ransomware-wannacrypt-shows-why-nsa-shouldnt-stockpile-exploits-says-microsoft/
All rights are reserved and belongs to a source media.

Mnóstwo niepokojących pytań o chiński szlak. Media: może być próbą ekspansji

0

Kraje członkowskie UE nie podpiszą oświadczeń podsumowujących kończący się w poniedziałek w Pekinie szczyt Pasa i Szlaku – powiedział wiceprzewodniczący…
Kraje członkowskie UE nie podpiszą oświadczeń podsumowujących kończący się w poniedziałek w Pekinie szczyt Pasa i Szlaku – powiedział wiceprzewodniczący Komisji Europejskiej Jyrki Katainen, cytowany przez agencję Reutera. Europejskie media piszą o wadach projektu. – Jako Komisja Europejska, która ma mandat, która ma zdolność negocjowania w imieniu państw członkowskich w sprawach handlowych, nie dostaliśmy możliwości negocjowania tekstu – oświadczył Katainen agencji Reuters. Wiceszef KE dodał jednocześnie, że nie jest to problemem. Wydarzenie, które zorganizowały chińskie władze oraz wzajemne zrozumienie tego, co powinno zostać zrobione ocenił pozytywnie. Reuters zauważa, że niektórzy zachodni dyplomaci wyrażali obawy odnośnie tego, że szczyt i inicjatywa Pasa i Szlaku jest próbą promowania chińskich wpływów na świecie. Wyrażano także obawy co do poziomu transparencji i dostępu do planu dla zagranicznych firm. Władze Chin prezentują swój projekt przede wszystkim jako bodziec dla handlu w świecie, który boryka się z umiarkowanym wzrostem gospodarczym i wolumenami handlu, które przestały rosnąć. « Niższe bariery handlowe i harmonizacja przepisów słusznie wymieniane są obok rozwoju infrastruktury jako główne cele, a wiele krajów, które odczułyby skutki tego projektu, potrzebuje lepszej infrastruktury i ściślejszych powiązań handlowych » – czytamy w dzisiejszym « Financial Times ». Jak przypomina dziennik w poniedziałkowym komentarzu redakcyjnym, w ramach tej inicjatywy przewiduje się wybudowanie dróg, tras kolejowych, portów, rurociągów i innej infrastruktury mającej połączyć szlakami morskimi i lądowymi Chiny z Azją Środkową, Europą i Afryką. Koszt związanych z tym inwestycji, szacowany na ok. 900 miliardów dolarów, mają pokryć chińskie i wspierane przez Chiny banki i fundusze kredytowe. Dziennik wskazuje jednak na obawy, że koncepcja ta doprowadzi do eksportu najgorszych aspektów chińskiej gospodarki oraz zwiększy presję na i tak już obciążony system finansowy tego kraju. « FT » przypomina, że Chiny zmagają się z « nieefektywną alokacją środków (…) oraz wynikającymi z tego nadwyżkami w mocach produkcyjnych wielu branż » i wobec tego « mogą być zainteresowane przede wszystkim przekierowaniem nadwyżki oszczędności, eksportem nadprodukcji i zapewnieniem zagranicznych zleceń krajowym firmom budowlanym ». Zdaniem gazety, kredyty udzielone na realizację tych inwestycji mogą nie zostać spłacone, « prowadząc do obniżenia ratingu kredytowego tego kraju i zapychając chiński system finansowy złymi aktywami » « Jeśli tanie kredyty to zapłata za poddanie się politycznemu przywództwu Chin w regionie, tym mniejsza będzie szansa, że zostaną dobrze wykorzystane. Ponadto wiele krajów może odmówić przyjęcia pieniędzy (…) , jeśli wiązałoby się to ze zbyt wieloma warunkami » – dodaje dziennik. Projekty w ramach inicjatywy Pasa i Szlaku powinny być budowane z udziałem miejscowych i światowych, a nie tylko chińskich firm, a później powinny być wykorzystywane w dobry sposób. « Jeśli te warunki nie zostaną spełnione, będzie to wskazówka, że Chiny, zamiast przyczyniać się do globalnego ożywienia gospodarczego, usiłują eksportować własne nierówności gospodarcze i kupować przywództwo w regionie » – konkluduje « Financial Times ». « Czas pokaże, czy ambitny chiński projekt Pasa i Szlaku przyczyni się do ożywienia globalnej gospodarki i handlu, czy też Pekin wykorzysta go jako instrument ekspansji w regionie, eksportując przy okazji słabości własnej gospodarki » – podsumowuje « Financial Times ».

© Source: http://tvn24bis.pl/ze-swiata,75/projekt-nowego-jedwabnego-szlaku-komentarz-ft,739964.html
All rights are reserved and belongs to a source media.

Timeline words data