NHS computer systems hacked!?

Irrelevant. MS still provide patches for some businesses. I don't know for sure if the NHS are one of those but I heard something earlier today which suggests they are.
Apart from which, this is affecting other versions of Windows as well, even those fully patched. It's not just the NHS running XP who are victims.
it was patched back in march, so if you have a fully patched system then you will be fine, what OS' that's patched on I don't know.
edit - patched all the way back to vista, so just xp and before are vulnerable, unless the update wasn't applied.
 
how a I doing that, I'm well aware it takes ages and costs a lot, hence I said it would take like a decade. but we need to start. It is not acceptable in this daty and age that companies are allowed to do it because of historic penny pinching. Bad now, Imagine in a decade when pretty much everything is automated/computer controlled.

The reality of what you are suggesting could easily bankrupt many a company, especially in current economic circumstances, unless the government was to step in and provide some resources/money :s while I'm sure there is some penny pinching many genuinely do have constraints as to when the money is available for it.
 
This is just the tip of the iceberg compared to what the whole snooper's charter thing could unleash :|

A backdoor in this case would allow you to get back into the files - so actually a good thing in this case (although a bad thing overall in regard to privacy)
 
Usual windows 10 fanboys trying to use this story to big up windows 10.

This virus would have done the same thing on any operating system. No? Windows 10 doesnt magically stop people opening email attachments.

Also, windows 10 is a virus itself its not surprising smarter corporate customers who want to maintain full data and security integrity want nothing to do with windows 10. Just look at that recent win10 backdoor that got exposed which didn't even affect win7.
 
But once you start and it takes 10 years - the initial apps developed will be 10 years old when you get back round to sorting them out again
no, because companies would keep it upto date as there is now a law which punishes them. Its only when you spend no money for many years and you lose the expertise and things become multi generations out of date there is an issue.
 
Apart from which, this is affecting other versions of Windows as well, even those fully patched.

Where are you hearing that from? Everything I've seen that is analysing this attack is saying that the vector is the SMBv1 exploit patched in MS17-010.
 
Where are you hearing that from? Everything I've seen that is analysing this attack is saying that the vector is the SMBv1 exploit patched in MS17-010.
If that's definitely the case then I apologise - I was sure I read something earlier where someone said they had a Windows 10 box, fully patched and up to date that had this on. I can't find it though.
 
A backdoor in this case would allow you to get back into the files - so actually a good thing in this case (although a bad thing overall in regard to privacy)

If the whole snooper's charter goes ahead in anything like the form its being pushed there are going to be some hard lessons learnt unfortunately a lot of innocent people will probably suffer first - today's events should give some insight but unfortunately it will likely also be ignored.
 
Where are you hearing that from? Everything I've seen that is analysing this attack is saying that the vector is the SMBv1 exploit patched in MS17-010.

but knowing IT Operational departments - they arent always bang up to date patching wise - for some theres a whole testing cycle before actually being deployed to live kit and this one still might be queued so some out there if it was only March
 
but knowing IT Operational departments - they arent always bang up to date patching wise - for some theres a whole testing cycle before actually being deployed to live kit and this one still might be queued so some out there if it was only March
but again, risk assed. Should have been pushed to top of the que and rushed. But they don't seem to risk asses anything, we haven't implemented patches straight away for ever and we haven't been prosecuted so carry on. Its no wonder that it is a huge issue and is growing rapidly. Laws and companies need to catch up.

this was classed as a critical update. It was a know explot out in the wild, As NSA hacking software used the exploit and that software was leaked.
 
but knowing IT Operational departments - they arent always bang up to date patching wise - for some theres a whole testing cycle before actually being deployed to live kit and this one still might be queued so some out there if it was only March

Microsoft don't exactly make patching easy or reliable for internal networks either.
 
If the whole snooper's charter goes ahead in anything like the form its being pushed there are going to be some hard lessons learnt unfortunately a lot of innocent people will probably suffer first - today's events should give some insight but unfortunately it will likely also be ignored.

But todays event proves the power of encryption which is the opposite of what worse case snoopers charter would be?
Just fire up a VPN
 
But todays event proves the power of encryption which is the opposite of what worse case snoopers charter would be?
Just fire up a VPN

If they weaken encryption attacks like this would be even easier. If you make a backdoor in to anything, anyone can use it.
 
Hang on!! So this has come up because they are all still using XP??? Well...that says it all then.

They have been warned over time to upgrade their system and unfortunately it takes something like this for them to realize how vulnerable they are using XP in 2017.
 
Back
Top Bottom