World’s Biggest Cyber-Attack - WannaCry
![]() |
World’s Biggest Cyber-Attack - WannaCry |
![]() |
Bangkok impacted by #WannaCry |
Pirates of The Caribbean 5 - WannaCry
If you are Not a an IT Guy and don't know much about these cyber attacks and terminologies don't worry we got you covered. lets have a look.

Once the virus has made its way into the computer it blocks access to all data. Instead screen pops up wherein the user is instructed to pay money.
The price usually increases with time with a corresponding countdown.
![]() |
#WannaCry screen grab. |
Once your computer is infected there is no way to secure access to the data except of paying the ones holding it hostage.
Mac users can chill however since WannaCry only attacks Windows operating system.
What can you do to stay safe from ransomware cyber attack?
While Pakistan has surprisingly not been affected that crazily yet, it’s good to take some precautionary measures so you don’t get affected by such things in the future.According to Washington Post, this attack is particularly targeting Windows based devices, especially those that are still running Windows XP. Apple computers and Android devices appear not to be affected by WannaCry, but that does not mean that Macs or iPhones are immune to malware in general. Androids, especially, are susceptible if they’re running an older version of the Operating System.
- So the first thing you need to do is, make your device software and operating systems are UP TO DATE.
In addition, you can:
- Create backups of your most important files, either by downloading them to an external hard drive or by storing them in a cloud-based storage service.
- Use a password manager to create and keep track of unique, hard-to-remember (and thus hard-to-break) passwords for each of your services. It’s a little counter-intuitive, but experts say it’s much more secure than the alternative, which is reusing the same password across multiple websites.
- Check your medical and credit reports for evidence of fraudulent activity.
- At work, check with your IT administrator to make sure your organization’s devices are protected from WannaCry.
- Remember to treat unexpected emails with caution, and read up on phishing — one of the most common types of social engineering attacks used by attackers to compromise machines.
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.