|
Dua Syarikat Tempatan Turut Diserang Perisian Berniat Jahat 'WannaCry'
[Copy link]
|
|
Ye la. Bank pun kedekut upgrade Windows tu. 
|
|
|
|
|
|
|
|
insulin replied at 16-5-2017 01:13 PM
Hmmm.... Ruginya aku x create thread pasal malware WannaCry ni....
Hahaha..u boleh menyumbang komen dan updates perkembangan terkini.. |
|
|
|
|
|
|
|
Esmiria replied at 16-5-2017 01:18 PM
ye ke?????????
Better safe then sorry..
Since abg aku pun IT eng..so aku folo je apa yg dia suruh. |
|
|
|
|
|
|
|
Bos office abang kau kemut upgrade Windows ke atau office dia masih running legacy applications?  
|
|
|
|
|
|
|
|
insulin replied at 16-5-2017 01:26 PM
Bos office abang kau kemut upgrade Windows ke atau office dia masih running legacy applications? : ...
company dia aman2 aje yachh tpi compny client2 dia yg kena yachhh |
|
|
|
|
|
|
|
Kalau diikutkan Microsoft dah tak support dah pun Windows XP tapi terpaksa juga keluarkan patch untuk ransomware ni. Kes di NHS UK tu lagi teruk. Banyak PC masih pakai Windows XP. |
|
|
|
|
|
|
|
bab keselamatan it ni jurusan apa? sains komputer? yg aku taw hacker kebanyakan lulusan sains komputer |
|
|
|
|
|
|
|
Jangan terkejut. Sesetengah mesin ATM masih running Windows XP. Dulu saya pernah nampak desktop Windows keluar di mesin ATM. Mungkin sekarang bank di Malaysia sudah upgrade mesin ATM mereka. Tapi di luar negara mungkin masih ada yg pakai sistem lama ni.
|
|
|
|
|
|
|
|
insulin replied at 16-5-2017 01:34 PM
Huhh... Aku dah agak dah. Mesti company2 tu kemut taik hidung masin.
S ...
Entah mana aku tahu..aku tak tanya pun. |
|
|
|
|
|
|
|
AbukRokok replied at 16-5-2017 11:56 AM
xleh masuk dlm komputer selagi xbyar
hilang lah kertas kerja,,,movie...muzik..gambar
hilang tu s ...
Ohh mcm tu..keji sangat.. |
|
|
|
|
|
|
|
entah mcm pilih bulu juga..ada yg dapat balik data tapi tak lengkap ada yg x dpt langsung..senang cite bayar pun x guna..
sb tu klu big company yg kena x de nk bayar pun sb diaorg ada backup..
|
|
|
|
|
|
|
|
matchstick replied at 16-5-2017 01:00 PM
jgn lah kena kt laptop aku.. habislah citer korea yg aku gigih mendownload selama ini dgn kuota data ...
Samalah. Aku ada banyak simpan drama dan filem ni. |
|
|
|
|
|
|
|
insulin replied at 16-5-2017 01:16 PM
Errr.... Korang semua... Mohon upgrade Windows korang ye.. Janganlah kemut sangat sehinggakan masih ...
Kalau upgrade, tak akan kena virus tu ke? |
|
|
|
|
|
|
|
Kalau pakai Windows version baru, memang sudah ada security patch utk vulnerability itu pada bulan Mac lepas. User hanya perlu pastikan update itu telah diinstall di pc masing-masing. Untuk pengguna Windows XP, mereka sememangnya out of the loop dan hanya bergantung kepada third party antivirus software. Disebabkan severity serangan ini, mereka terpaksa juga release patch untuk Windows XP.
Today many of our customers around the world and the critical systems they depend on were victims of malicious “WannaCrypt” software. Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful. Microsoft worked throughout the day to ensure we understood the attack and were taking all possible actions to protect our customers. This blog spells out the steps every individual and business should take to stay protected. Additionally, we are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003. Customers running Windows 10 were not targeted by the attack today.
Details are below.
In March, we released a security update which addresses the vulnerability that these attacks are exploiting. Those who have Windows Update enabled are protected against attacks on this vulnerability. For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010.
For customers using Windows Defender, we released an update earlier today which detects this threat as Ransom:Win32/WannaCrypt. As an additional “defense-in-depth” measure, keep up-to-date anti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider, that they are protected.
This attack type may evolve over time, so any additional defense-in-depth strategies will provide additional protections. (For example, to further protect against SMBv1 attacks, customers should consider blocking legacy protocols on their networks).
We also know that some of our customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received the above mentioned Security Update released in March. Given the potential impact to customers and their businesses, we made the decision to make the Security Update for platforms in custom support only, Windows XP, Windows 8, and Windows Server 2003, broadly available for download (see links below).
Customers who are running supported versions of the operating system (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016) will have received the security update MS17-010 in March. If customers have automatic updates enabled or have installed the update, they are protected. For other customers, we encourage them to install the update as soon as possible.
|
|
|
|
|
|
|
|
busy gila pasal kes ransomware ni....hampeh betul....
just follow the guideline from SC(Security Commissioner) block IP and URL yg depa provide dalam load balancer N firewall...
block port SMB atau uninstall terus SMB 1.0 jika x d gunakan...
|
|
|
|
|
|
|
|
insulin replied at 16-5-2017 01:24 PM
Korang boleh lawat website ni untuk tengok berapa banyak PC yang kena infect oleh malware WannaCry n ...
Risau plak nk click link yg u bagi ni.. Fobia! |
|
|
|
|
|
|
|
kalaula kene kat stesyen LRT, semua pkai windows tu
mau jem semua satu KL |
|
|
|
|
|
|
| |
|