{"id":222638,"date":"2017-06-23T13:09:38","date_gmt":"2017-06-23T17:09:38","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/is-calling-out-the-nsa-npr-org.php"},"modified":"2017-06-23T13:09:38","modified_gmt":"2017-06-23T17:09:38","slug":"is-calling-out-the-nsa-npr-org","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/is-calling-out-the-nsa-npr-org.php","title":{"rendered":"is calling out the NSA &#8211; npr.org"},"content":{"rendered":"<p><p>            After the WannaCry cyberattack hit computer systems            worldwide, Microsoft says governments should report            software vulnerabilities instead of collecting them.            Here, a ransom window announces the encryption of data            on a transit display in eastern Germany on Friday.            AFP\/AFP\/Getty Images hide caption          <\/p>\n<p>          After the WannaCry cyberattack hit computer systems          worldwide, Microsoft says governments should report          software vulnerabilities instead of collecting them.          Here, a ransom window announces the encryption of data on          a transit display in eastern Germany on Friday.        <\/p>\n<p>    When the National Security Agency lost control of the software    behind the WannaCry cyberattack, it was like \"the U.S. military    having some of its Tomahawk missiles stolen,\" Microsoft    President Brad Smith says, in a message about the malicious    software that has created havoc on computer networks in more    than 150 countries since Friday.  <\/p>\n<p>    \"This is an emerging pattern in 2017,\"     Smith, who is also chief legal officer, says in a Microsoft    company blog post. \"We have seen vulnerabilities stored by the    CIA show up on WikiLeaks, and now this vulnerability stolen    from the NSA has affected customers around the world.    Repeatedly, exploits in the hands of governments have leaked    into the public domain and caused widespread damage.\"  <\/p>\n<p>    On affected computers, the WannaCry software encrypts files and    displays a ransom message demanding $300 in bitcoin. It has    attacked hundreds of thousands of computers, security experts    say, from     hospital systems in the U.K. and a telecom company in Spain    to universities and large companies in Asia. And the software    is already inspiring imitators, as the     Bleeping Computer site reports.  <\/p>\n<p>    The malware behind WannaCry (also called WannaCrypt, Wana    Decryptor or WCry) was reported to have been stolen from the    NSA in April. And while Microsoft said it had already released    a security update to patch the vulnerability one month earlier,    the sequence of events fed speculation that the NSA hadn't told    the U.S. tech giant about the security risk until after it had    been stolen.  <\/p>\n<p>    With his new statement, Smith seems to be confirming that    version of events.  <\/p>\n<p>    Two months after Microsoft issued its security patch, thousands    of computers remained vulnerable to the WannaCry attack. That    prompted the company to issue another patch on Friday for older    and unsupported operating systems such as Windows XP, allowing    users to secure their systems without requiring an upgrade to    the latest operating software.  <\/p>\n<p>    Urging businesses and computer users to keep their systems    current and updated, Smith says the WannaCry attack shows the    importance of collective action to fight cybercrime.  <\/p>\n<p>    But he aimed his sharpest criticisms at the U.S. and other    nations.  <\/p>\n<p>    The attack, Smith says, \"represents a completely unintended but    disconcerting link between the two most serious forms of    cybersecurity threats in the world today  nation-state action    and organized criminal action.\"  <\/p>\n<p>    International standards should compel countries not to    stockpile or exploit software vulnerabilities, Smith says. He    adds that governments should report vulnerabilities like the    one at the center of the WannaCry attack.  <\/p>\n<p>    Governments \"need to take a different approach and adhere in    cyberspace to the same rules applied to weapons in the physical    world,\" Smith says, urging agencies to \"consider the damage to    civilians that comes from hoarding these vulnerabilities and    the use of these exploits.\"  <\/p>\n<p>    Smith's blog post did not address another factor in the    ransomware's spread, one that hints at the difficulty of    uniting against a hacking attack: Users of pirated Microsoft    software are unable to download the security patch, forcing    them to fend for themselves or rely on a third-party source for    a solution.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.npr.org\/sections\/thetwo-way\/2017\/05\/15\/528439968\/wannacry-ransomware-microsoft-calls-out-nsa-for-stockpiling-vulnerabilities\" title=\"is calling out the NSA - npr.org\">is calling out the NSA - npr.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> After the WannaCry cyberattack hit computer systems worldwide, Microsoft says governments should report software vulnerabilities instead of collecting them.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/is-calling-out-the-nsa-npr-org.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-222638","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/222638"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=222638"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/222638\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=222638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=222638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=222638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}