SlideShare a Scribd company logo
How to prevent WannaCry Ransomware
By: Seminar Links
WannaCry Ransomware
A ransomware cyber-attack that may have originated from the theft of “cyber
weapons” linked to the US government has hobbled hospitals in England and
spread to countries across the world.
"Ransomware is a type of malware that encrypts a user’s data, then demands
payment in exchange for unlocking the data. This attack was caused by a bug
called “WanaCrypt0r 2.0” or WannaCry, that exploits a vulnerability in Windows.
Microsoft released a patch (a software update that fixes the problem) for the
flaw in March, but computers that have not installed the security update remain
vulnerable."
The worm is primarily affecting business & individuals
PCs running windows should still take a few precautions
The exploit code used by WannaCrypt was designed
to work only against unpatched & unsupported
version of Windows, including Windows XP, Vista,
Windows 8, Server 2003 and 2008 Editions.
STEPS TO PROTECT
• Backup all your important data into another Hard disk.
• Uninstall cracks or software patch if installed any.
• If you haven't updated your system do it now, regardless of whether you're
a business or consumer.
• Download security updates from microsoft after wannacrypt attacks.
• Link: https://blogs.Technet.Microsoft.Com/msrc/2017/05/12/customer-guidance-for-
wannacrypt-attacks
• Don’t click email attachments from unknown sender or companies you don't do
business with
• Beware of unknown or malicious file extension
• If you come across files such as worklog.doc.exe, or financial_statement.xls.scr,
do not open them as the files are most likely malicious
• Download and install microsoft security essentials & update it to latest version.
• Ensure you have smart screen (in internet explorer) turned on.
• Have a pop-up blocker running on your web browser
STAY PROTECTED
BE UPDATED

More Related Content

What's hot

Wannacry-A Ransomware Attack
Wannacry-A Ransomware AttackWannacry-A Ransomware Attack
Wannacry-A Ransomware Attack
MahimaVerma28
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
i-engage
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
Roberto Martelloni
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
Mikel Solabarrieta
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
Zoho Corporation
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry Ransomware
Kaspersky
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
Yash Diwakar
 
Ransomware
RansomwareRansomware
Ransomware
Nick Miller
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
Nick Miller
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
doiss delhi
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
Wannacry
WannacryWannacry
Wannacry
AravindVV
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Roger Hagedorn
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
Symantec Security Response
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
Datto
 

What's hot (20)

Wannacry-A Ransomware Attack
Wannacry-A Ransomware AttackWannacry-A Ransomware Attack
Wannacry-A Ransomware Attack
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry Ransomware
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Wannacry
WannacryWannacry
Wannacry
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 

Similar to How to prevent WannaCry Ransomware

WannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of RansomwarWannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of Ransomwar
David Smith
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
East West University
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
Aashiq Ahamed N
 
WannaCry Ransomware Attack
WannaCry Ransomware AttackWannaCry Ransomware Attack
WannaCry Ransomware Attack
Shehryar Khan
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
Malware
MalwareMalware
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
News Bytes
News BytesNews Bytes
News Bytes
Megha Sahu
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
Qualys
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
John Davis
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
The Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurThe Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by Raconteur
Gary Chambers
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
Vishalya Dulam
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Crucial wannacryoutbreaks
Crucial wannacryoutbreaksCrucial wannacryoutbreaks
Crucial wannacryoutbreaks
kevinmass30
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Black Duck by Synopsys
 

Similar to How to prevent WannaCry Ransomware (20)

WannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of RansomwarWannaCry: Autopsy of Ransomwar
WannaCry: Autopsy of Ransomwar
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
WannaCry Ransomware Attack
WannaCry Ransomware AttackWannaCry Ransomware Attack
WannaCry Ransomware Attack
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Malware
MalwareMalware
Malware
 
Ransomware
RansomwareRansomware
Ransomware
 
News Bytes
News BytesNews Bytes
News Bytes
 
Conficker
ConfickerConficker
Conficker
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
 
New microsoft application security problem
New microsoft application security problemNew microsoft application security problem
New microsoft application security problem
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
The Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurThe Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by Raconteur
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Crucial wannacryoutbreaks
Crucial wannacryoutbreaksCrucial wannacryoutbreaks
Crucial wannacryoutbreaks
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
 

More from Seminar Links

Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)
Seminar Links
 
Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)
Seminar Links
 
Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)
Seminar Links
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)
Seminar Links
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPT
Seminar Links
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
Seminar Links
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
Seminar Links
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
Seminar Links
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Seminar Links
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
Seminar Links
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
Seminar Links
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
Seminar Links
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
Seminar Links
 
Dams PPT
Dams PPTDams PPT
Dams PPT
Seminar Links
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
Seminar Links
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
Seminar Links
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
Seminar Links
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
Seminar Links
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
Seminar Links
 

More from Seminar Links (20)

Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)Artificial Intelligence (A.I.) in Schools (PPT)
Artificial Intelligence (A.I.) in Schools (PPT)
 
Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)Sustainable Materials Management (SMM)
Sustainable Materials Management (SMM)
 
Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)Are Top Grades Enough (PPT)
Are Top Grades Enough (PPT)
 
AI and Youth Employment (PPT)
AI and Youth Employment (PPT)AI and Youth Employment (PPT)
AI and Youth Employment (PPT)
 
Environmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPTEnvironmental Impacts of COVID-19 Pandemic: PPT
Environmental Impacts of COVID-19 Pandemic: PPT
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
 
Dams PPT
Dams PPTDams PPT
Dams PPT
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

How to prevent WannaCry Ransomware

  • 1. How to prevent WannaCry Ransomware By: Seminar Links
  • 2. WannaCry Ransomware A ransomware cyber-attack that may have originated from the theft of “cyber weapons” linked to the US government has hobbled hospitals in England and spread to countries across the world. "Ransomware is a type of malware that encrypts a user’s data, then demands payment in exchange for unlocking the data. This attack was caused by a bug called “WanaCrypt0r 2.0” or WannaCry, that exploits a vulnerability in Windows. Microsoft released a patch (a software update that fixes the problem) for the flaw in March, but computers that have not installed the security update remain vulnerable."
  • 3. The worm is primarily affecting business & individuals PCs running windows should still take a few precautions
  • 4. The exploit code used by WannaCrypt was designed to work only against unpatched & unsupported version of Windows, including Windows XP, Vista, Windows 8, Server 2003 and 2008 Editions.
  • 5. STEPS TO PROTECT • Backup all your important data into another Hard disk. • Uninstall cracks or software patch if installed any. • If you haven't updated your system do it now, regardless of whether you're a business or consumer. • Download security updates from microsoft after wannacrypt attacks. • Link: https://blogs.Technet.Microsoft.Com/msrc/2017/05/12/customer-guidance-for- wannacrypt-attacks
  • 6. • Don’t click email attachments from unknown sender or companies you don't do business with • Beware of unknown or malicious file extension • If you come across files such as worklog.doc.exe, or financial_statement.xls.scr, do not open them as the files are most likely malicious • Download and install microsoft security essentials & update it to latest version. • Ensure you have smart screen (in internet explorer) turned on. • Have a pop-up blocker running on your web browser