{"id":193571,"date":"2017-05-18T14:03:35","date_gmt":"2017-05-18T18:03:35","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-wannacry-malware-a-public-service-announcement\/"},"modified":"2017-05-18T14:03:35","modified_gmt":"2017-05-18T18:03:35","slug":"the-wannacry-malware-a-public-service-announcement","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-wannacry-malware-a-public-service-announcement\/","title":{"rendered":"The &#8216;WannaCry&#8217; malware: A public service announcement &#8230;"},"content":{"rendered":"<p><p>    The particularly nasty computer program dubbed WannaCry that    attacked hospitals, businesses and government agencies around    the world this past weekend was like a cybercrime highlight    reel, a compilation of by-now familiar elements     conscience-free cybercriminals, an obscure vulnerability in    Microsoft Windows, older and ill-maintained corporate computer    networks and computer users tricked into opening booby-trapped    email attachments  that played out on an epic scale.  <\/p>\n<p>    Whats different this time is that the hackers apparently had    considerable help from the U.S. government. They used a stolen    tool reportedly developed by the National Security Agency to    exploit a hidden weakness in the Windows operating system and    spread their ransomware far and wide. The tool was one of many    linked to the NSA that were leaked online last year, then    finally decrypted in April for use by anyone with the requisite    coding skills.  <\/p>\n<p>    Its tempting to howl at the NSA for not alerting companies    like Microsoft when its researchers find vulnerabilities in    their products. The reality, though, is that doing so would    reduce the effectiveness of cybertools that have become an    integral part of modern efforts by agencies like the NSA to    fight terrorism, international criminal organizations and rogue    states. Whats needed is a better effort to determine if and    when a vulnerability discovered by the feds represents too    great a threat to keep it secret from the potential victims.    Thats a difficult balance to strike, and the decision    shouldnt be made solely by the executive branch without the    input of independent experts and, potentially, lawmakers.  <\/p>\n<p>    The even more important lesson here is that years, even decades    of warnings from security experts simply arent getting through    to the public. WannaCry should not have reached disastrous    proportions  Microsoft released a patch that could close the    vulnerability in March, well before the NSAs tool was    decrypted. Yet tens of thousands of computers werent updated,    allowing the malware the room it needed to spread.  <\/p>\n<p>    The problem could easily get much, much worse as more routine    devices become smart, Internet-connected ones. Evidently we    need stronger incentives not just for companies to release more    secure products, but also for users to keep them updated and    protect their data with encryption and backups. Thats what the    lawmakers and federal officials should be focusing on  not on    trying to discourage consumers from using encryption on their    smartphones, or on building stockpiles of malware based on    vulnerabilities they alone have found.  <\/p>\n<p>    Follow the Opinion section on Twitter    @latimesopinion and    Facebook  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.latimes.com\/opinion\/editorials\/la-ed-wannacry-nsa-20170516-story.html\" title=\"The 'WannaCry' malware: A public service announcement ...\">The 'WannaCry' malware: A public service announcement ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The particularly nasty computer program dubbed WannaCry that attacked hospitals, businesses and government agencies around the world this past weekend was like a cybercrime highlight reel, a compilation of by-now familiar elements conscience-free cybercriminals, an obscure vulnerability in Microsoft Windows, older and ill-maintained corporate computer networks and computer users tricked into opening booby-trapped email attachments that played out on an epic scale. Whats different this time is that the hackers apparently had considerable help from the U.S. government <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-wannacry-malware-a-public-service-announcement\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-193571","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193571"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193571"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193571\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}