• Теги
    • избранные теги
    • Компании167
      • Показать ещё
      Страны / Регионы57
      • Показать ещё
      Разное21
      • Показать ещё
      Издания4
      Показатели3
      Люди7
      • Показать ещё
      Международные организации4
Portugal Telecom
16 мая, 16:30

The Zacks Analyst Blog Highlights: FedEx, Telefonica, PureFunds ISE Cyber Security ETF, First Trust Nasdaq Cybersecurity ETF and Direxion Daily Cyber Security & IT Bull Shares

The Zacks Analyst Blog Highlights: FedEx, Telefonica, PureFunds ISE Cyber Security ETF, First Trust Nasdaq Cybersecurity ETF and Direxion Daily Cyber Security & IT Bull Shares

15 мая, 17:45

Cybersecurity ETFs Set to Rally After a Global Cyberattack

The whole world was infected by a massive wave of cyberattacks on Friday and the malaise is expected to aggravate this week.

13 мая, 22:54

Global Cyber Attack Eases Due To One Researcher's Quick Thinking

function onPlayerReadyVidible(e){'undefined'!=typeof HPTrack&&HPTrack.Vid.Vidible_track(e)}!function(e,i){if(e.vdb_Player){if('object'==typeof commercial_video){var a='',o='m.fwsitesection='+commercial_video.site_and_category;if(a+=o,commercial_video['package']){var c='&m.fwkeyvalues=sponsorship%3D'+commercial_video['package'];a+=c}e.setAttribute('vdb_params',a)}i(e.vdb_Player)}else{var t=arguments.callee;setTimeout(function(){t(e,i)},0)}}(document.getElementById('vidible_1'),onPlayerReadyVidible); A global cyber attack forced a European carmaker to halt some production lines, hit Russian computers with more than half of suspected infections, struck schools in China and hospitals in Indonesia, though it appeared to be dying down on Saturday. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, the cyber assault launched on Friday has infected tens of thousands of computers in 104 countries, with Britain’s health system suffering the worst known disruptions. Researchers with Czech Republic-based security software maker Avast said they had observed more than 126,000 ransomware infections, with 60 percent of infected computers located in Russia, followed by Ukraine and Taiwan. Cyber extortionists tricked victims into opening malicious malware attachments to spam emails that seemed to contain invoices, job offers, security warnings and other legitimate files. Once inside the targeted network, so-called ransomware made use of recently revealed spy tools to silently infect other out-of-date machines without any human intervention. This, security experts said, marked an unprecedented escalation in the risk of fresh attacks spreading in the coming days and weeks. The ransomware encrypted data on the computers, demanding payments of $300 to $600 to restore access. Researchers observed some victims paying via the digital currency bitcoin, though no one knows how much may have been transferred to extortionists because of the largely anonymous nature of such transactions. The hackers, who have not come forward to claim responsibility or otherwise been identified, took advantage of a worm, or self-spreading malware, by exploiting a piece of NSA spy code known as “Eternal Blue” that was released last month by a hackers group known as the Shadow Brokers, according to researchers with several private cyber security firms. Renault said it had halted auto production at several sites including Sandouville in northwestern France and plants of Renault-owned Dacia of Romania on Saturday to prevent the spread of ransomware in its systems. Nissan’s manufacturing plant in Sunderland, northeast England, was also affected by the cyber assault though “there has been no major impact on our business”, a spokesman for the Japanese carmaker said.German rail operator Deutsche Bahn [DBN.UL] said some electronic signs at stations announcing arrivals and departures were infected, with travelers posting pictures showing some bearing a message demanding a cash payment to restore access.   “UNPRECEDENTED” ATTACK EASES Europol’s European Cybercrime Centre said it was working closely with country investigators and private security firms to combat the threat and help victims. “The recent attack is at an unprecedented level and will require a complex international investigation to identify the culprits,” it said in a statement. Some experts said the threat had receded for now, in part because a British-based researcher, who declined to give his name, registered a domain that he noticed the malware was trying to connect to, and so limited the worm’s spread. “We are on a downward slope, the infections are extremely few, because the malware is not able to connect to the registered domain,” Vikram Thakur, principal research manager at Symantec, said as the threat subsided. Researchers are racing against the clock to try to decrypt infected computers and recover access to victims’ files before the malicious code’s ransom deadline expires in two days. But so far several said they have found no way to break the encryption. The attackers may yet tweak the code and restart the cycle. The researcher in Britain widely credited with foiling the ransomware’s proliferation told Reuters he had not seen any such tweaks yet, “but they will (happen).” Finance ministers and central bank governors of seven leading world economies meeting for a G7 conference in Italy on Saturday will pledge stronger cooperation against cyber crime, a draft communique showed.   HOSPITALS IN FIRING LINE In Asia, some hospitals, schools, universities and other institutions were affected, though the full extent of the damage is not yet known. “I believe many companies have not yet noticed,” said William Saito, a cyber security adviser to Japan’s government. “Things could likely emerge on Monday” as staff return to work. China’s information security watchdog said “a portion” of Windows systems users in the country were infected, according to a notice posted on the official Weibo page of the Beijing branch of the Public Security Bureau on Saturday. Xinhua state news agency said some secondary schools and universities were hit. The most disruptive attacks were reported in Britain, where hospitals and clinics were forced to turn away patients after losing access to computers on Friday. The health system has largely recovered from the disruption, interior minister Amber Rudd said on Saturday after a meeting of the government crisis response committee. International shipper FedEx Corp said some of its Windows computers were also breached. “We are implementing remediation steps as quickly as possible,” a statement said. Telecommunications company Telefonica was among many targets in Spain. Portugal Telecom and Telefonica Argentina both said they were also targeted. The hackers appear to have begun the campaign on targets in Europe, said Thakur, so by the time they turned their attention to the United States, spam filters had identified the new threat, diminishing the impact.   MICROSOFT BOLSTERS WINDOWS DEFENSES Private security firms identified the ransomware as a new variant of “WannaCry” that could spread across large networks by exploiting a known bug in Microsoft’s Windows operating system. “This is one of the largest global ransomware attacks the cyber community has ever seen,” said Rich Barger, director of threat research with Splunk, one of the firms that linked WannaCry to the NSA. The Shadow Brokers released Eternal Blue as part of a trove of hacking tools that they said belonged to the U.S. spy agency. The attack targeted Windows computers that had not installed patches released by Microsoft in March, or older machines running software that Microsoft no longer supports, including the 16-year-old Windows XP system, researchers said. Microsoft said it had pushed out automatic Windows updates to defend existing clients from WannaCry. It had issued a patch on March 14 to protect them from Eternal Blue. Late on Friday, Microsoft also released patches for a range of long discontinued software, including Windows XP and Windows Server 2003.   POLITICALLY SENSITIVE TIMING The spread of the ransomware capped a week of cyber turmoil in Europe that began when hackers posted a trove of campaign documents tied to French candidate Emmanuel Macron just before a run-off vote in which he was elected president of France. The hack happened four weeks before a British general election in which national security and the management of the state-run National Health Service are important issues. Authorities in Britain have been braced for cyber attacks in the run-up to the election, as happened during last year’s U.S. election and on the eve of the French run-off vote on May 7. But those attacks - blamed on Russia, which has repeatedly denied them - followed a different modus operandi involving penetrating the accounts of individuals and political organizations and then releasing hacked material online. On Friday, Russia’s interior and emergencies ministries, as well as its biggest bank, Sberbank, said they were targeted by ransomware. The interior ministry said about 1,000 computers had been infected but it had localized the virus.  (Additional reporting by Kiyoshi Takenaka, Jim Finkle, Eric Auchard, Jose Rodriguez, Alistair Smout, Andrea Shalal, Jack Stubbs, Antonella Cinelli, Dustin Volz, Kate Holton, Andy Bruce, Michael Holden, David Milliken, Rosalba O’Brien, Julien Toyer, Tim Hepher, Luiza Ilie, Patricia Rua, Axel Bugge, Sabine Siebold and Eric Walsh, Engen Tham, Fransiska Nangoy, Soyoung Kim, Mai Nguyen; editing by Mark Heinrich and Ros Russell) -- This feed and its contents are the property of The Huffington Post, and use is subject to our terms. It may be used for personal consumption, but may not be distributed on a website.

13 мая, 09:34

Вирус-вымогатель WannaCry атаковал компьютеры в 74 странах

Вирус WannaCry, шифрующий информацию на жестком диске компьютера, атаковал пользователей в 74 странах мира, в наибольшей степени заражению подверглась Россия. Об этом «Интерфаксу» сообщил производитель антивирусных программ «Лаборатория Касперского». По данным производителя антивируса Avast, вирус затронул пользователей в 99 странах мира. Атака произошла 12 мая. Программа, по предварительным данным, атаковала компьютеры в МВД и СК России. При этом в самом СК опровергли проникновение вируса на компьютеры ведомства. Всего, по информации «Лаборатории Касперского», было произведено около 45 тысяч атак. Avast сообщает о 50 тысячах. Вирус блокирует компьютер пользователя и требует за разблокировку перевести 300 долларов в биткоинах. Атаке, в частности, подверглись компьютеры компании «Мегафон». «К 21:00 была восстановлена работоспособность центров поддержки абонентов, в работе которой в течение нескольких часов были сбои из-за проблем с компьютерами сотрудников. Ситуация под контролем, правоохранительные органы были проинформированы в установленном порядке», — говорится в пресс-релизе компании. Также атака была зафиксирована в Минздраве России. Как заявил в твиттере помощник главы Минздрава Никита Одинцов, министерство «оперативно отразило начавшиеся атаки и закрыло уязвимости». Сообщаю, что @MINZDRAV_RF оперативно отразил начавшиеся атаки и закрыл уязвимости. https://t.co/zUg401FicC — Никита Одинцов (@NikitaOdintsov) 12 мая 2017 г. В Сбербанке сообщили агентству, что попытка вторжения вируса была зафиксирована и отражена. «Сеть банка предусматривает защиту от подобных атак. Проникновений вирусов в систему не произошло», — заявили в кредитной организации. Хакерской атаке также подверглась испанская телекоммуникационная компания Telefonica, американская компания доставки FedEx, португальский провайдер телекоммуникационных услуг Portugal Telecom, больницы Великбритании. Британский премьер-министр Тереза Мэй заявила, что угрозы утечки персональных данных пациентов медицинских учреждений нет.