Microsoft released an emergency patch to prevent ransomware from attacking
Microsoft has released an emergency patch for Windows versions to prevent further attacks by WannaCry ransomware (Microsoft flagged as Ransom: Win32 / WannaCrypt).
Windows XP, Windows 8, and Windows Server 2003 users can now download patches from Microsoft Update Catalog and are encouraged to update the system as soon as possible, because the number of attacks is increasing.
- A massive network attack using leaked NSA vulnerabilities, has affected 99 countries and is still spreading.
The infection from WannaCry was first discovered in Europe yesterday in organizations in many countries, including Britain and Spain. The UK NHS national health agency is seriously affected. At the end of Friday, it also began to spread to the United States.
The infection is based on the Windows vulnerability, which is owned by NSA and leaked this year by Shadow Brokers hacker group. Microsoft explained that Windows versions are still supported, including Windows 7, 8.1 and 10, with the latest updates of the Windows Defender antivirus software absolutely safe.
You can download emergency patches for Windows that are not supported here: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86 , Windows 8 x64.
Download Windows updates for all versions: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
In addition to updating the patch from Microsoft, you also need to close port 445 on Windows to ensure safety before WannaCry and WannaCry 2.0 - a much more dangerous variant of WannaCry.
Avoid opening emails from unreliable sources
On the other hand, Windows XP, Windows Server 2008 and Windows 8 are no longer supported . Because it no longer receives the latest Windows updates, Microsoft decided to release an emergency patch.
Windows XP no longer receives updates from April 2014
"We know that some customers running these versions of Windows no longer receive major support (mainstrean support). That means they do not receive Security Update security updates released in March. Due to the photos. Due to the attack on customers, we decided to release Security Update for users who did not receive automatic updates (only receive Custom Support), applied to Windows XP, Windows 8 and Windows Server 2003 ". Microsoft said. "This decision is based on an assessment of the situation, with our key principle of protecting the customer ecosystem first".
Microsoft also said the attack uses phishing techniques that include infected files, so users should avoid opening files from untrusted sources.
You should read it
- WannaCry remains one of the most dangerous global security threats
- Microsoft released an updated patch for 25 critical security holes
- Download and sell Windows patches for all versions to avoid being hit by a massive cyber attack, affecting 150 countries and still spreading
- All about WannaCry, Ransomware has been confusing for the past few days
- Microsoft blocked Windows 7 security updates without antivirus software
- Network security researcher claims to find a way to decode WannaCry
- Warning: There appears an email notification of Windows updates from a fake Microsoft that contains cyber ransomware
- Top 10 security improvements in Windows Server 2019
- If you are using Android, you may have been lied by your manufacturer about security updates
- How to protect the computer against Meltdown vulnerability on CPU?
- Microsoft released an emergency security patch for a serious vulnerability
- Microsoft released a patch for 75 critical vulnerabilities on Windows 7 / 8.1 / 10, asking users to install
Maybe you are interested
How to Open img Files on Windows or Mac Computer Facebook Messenger now has a COVID-19 information hub Worm can infect Windows system via PDF vulnerability Conficker worm still raging in TM Datacenter data center The spread of malware and how to prevent it 6 steps to plan harmful software counter-attacks