Y
Yoni Heisler
Guest
A little more than a week ago, a particularly nasty piece of ransomware dubbed "WannaCry" began spreading at an impressive clip all across the globe. Targeting Windows machines -- and based off of a leaked NSA exploit -- impacted users found that all of their computer files had been encrypted and could only be recovered by making a $300 payment in Bitcoin.
With the ransomware showing no signs of slowing down, an enterprising researcher named Marcus Hutchins managed to effectively stop WannaCry dead in its tracks by inadvertently enabling a kill-switch. As we noted last week, WannaCry at the point of infection attempts to communicate with a domain name consisting of a long string of nonsensical characters. If the domain is registered, WannaCry will stop spreading. If the domain is not registered, WannaCry will go on about its havoc-wreaking business.
Continue reading...
Trending right now:
- Android O’s most exciting new feature is a total game-changer
- You won’t have to wait until November to buy Apple’s next-gen iPhone 8
- The hottest new Nintendo Switch game that isn’t Mario Kart is $20 off on Amazon
Via BRG - Boy Genius Report