The eTree takes root: Radical artificial plant could bring wifi to cities, charge your phone


A solar tree with giant square leaves that convert sunlight into electricity was unveiled in the central French town of Nevers on Monday, allowing passers-by to charge their phones, surf the internet...or just enjoy the shade.
The town of 37,000 on the Loire river is the first in Europe to experiment with the technology developed by Israeli company Sol-logic.
Inspired by the acacia tree found in the Israeli desert and African savanna, the futuristic-looking 'eTree' also supplies water and street lighting.

The eTree's 'leaves' are solar panels that power it. Solar panels are devices that convert light into electricity
The eTree's 'leaves' are solar panels that power it. Solar panels are devices that convert light into electricity
The tree has seating, USB charging and a water fountain, with a separate water trough for pets.
It's also provides a source of light at night and free WiFi, as well as an integrated LCD screen. 
Its 'leaves' are solar panels that power the eTree. 

The first prototype was unveiled in Israel in 2014. A year later the first operational model was presented at the COP 21 climate conference in Paris, and it's that same tree that was re-planted in Nevers, France
The first prototype was unveiled in Israel in 2014. A year later the first operational model was presented at the COP 21 climate conference in Paris, and it's that same tree that was re-planted in Nevers, France

It was created in a partnership between French firm JCDecaux, the town of Nevers and Israeli entrepreneurs with Sol-logic.
The first prototype was unveiled in Israel in 2014. 
A year later the first operational model was presented at the COP 21 climate conference in Paris, and it's that same tree that was re-planted in Nevers

Solar trees have been planted in around 10 cities in Israel and in the US in North Carolina and California. Pictured is a man using one Sologics' eTree's in Ramat Hanadiv, a nature park and garden in Northern Israel 
Since then solar trees have been planted in around 10 cities in Israel and in the US in North Carolina and California. 

The mayor of Nevers, Denis Thuriot, told franceinfo that the eTree was a symbol of the town's digital engagement since 2014. 
He said that the tree will be planted in twenty or so other places, including New York City. 

S-400 Triumph (SA-21 Growler) Air Defense System



S-400




S-300 In Live Fire Action





North Korea New-Type Anti-Aircraft Guided Weapon System 






DJI - Introducing Spark



DJI - Introducing Spark
Meet Spark, DJI’s first ever mini drone. Signature technologies, new gesture control, and unbelievable portability make your aerials more fun and intuitive than ever before. With five different colors, there’s a Spark for everyone.
This is DJI's smallest drone so far, only $499.

[​IMG]
Michael Perry, director of strategic partnerships of DJI, demonstrates the palm-sized drone Spark during an event in New York.

Shenzhen-based group SZ DJI Technology Co, the world's biggest consumer drone maker, launched its new product, Spark, in New York on Wednesday, with key innovations it hopes will see the device take off in the burgeoning market.

DJI said Spark is an easy-to-use camera drone that can lift off from the palm of a hand.
It is also the first drone that users can control with hand gestures alone, removing the barriers between the user and the camera in the sky.

Michael Perry, director of strategic partnerships at DJI, introduced Spark to around 200 people at a launch event at Grand Central Station.

"Controlling a camera drone with hand movements alone is a major step toward making aerial technology an intuitive part of everyone's daily life, from work and adventure to moments with friends and family," said Paul Pan, senior product manager at DJI.

"Spark's revolutionary new interface lets you effortlessly extend your point of view to the air, making it easier than ever to capture and share the world from new perspectives," Pan added.
Aside from being user-friendly, DJI's drones are also known for being small and lightweight.

Wired magazine wrote on Wednesday: "Isn't DJI's new drone just the cutest little thing? A one-pound drone just seven or eight inches across is something you can toss into your backpack without a second thought."

"By far the coolest Spark feature is its gesture-controlled flight mode, allowing you to send the drone overhead to take an aerial photo of you and your buds with just simple hand movements."

DJI claims to account for 70 percent of the global consumer drone market.

According to The Economist, the company is at the forefront of the civilian-drone industry. "A Chinese firm has taken the lead in a promising market," it wrote in 2015, comparing DJI to what Boeing Co did with commercial airliners in the 1930s.

"DJI is today leading the charge in transforming civilian-drone manufacturing from something for hobbyists into a proper business," the magazine wrote.

The founder of DJI, Wang Tao created the world's leading drone company from his hobby, launching DJI from his dorm at Hong Kong University of Science & Technology in 2006 when he was 26.

56da6893-2375-4af1-8e7f-7daa02a92a11.jpg

3ca7d934-0d6f-4695-a343-5ae1b5d2e0de.jpg






New Ka-62 helicopter conducts 1st flight

Newest Russian helicopter takes to the sky for 1st time (VIDEO)

Footage of the newest Russian multi-purpose Ka-62 helicopter in flight has been released, showing the prototype passing its very first flight test. 
 
The prototype Ka-62 helicopter successfully completed its first test flight on Thursday. The flight lasted 15 minutes at a speed of 110 km/h and marked a significant milestone in the model’s development, showing that the prototype has undergone all the necessary revisions, the Russian Helicopters company said in a statement. Before the flight, the prototype had only undergone short hovering tests.

Russian Vice PM Rogozin posted the footage of the Ka-62 test flight on Twitter, congratulating the engineers and test pilots.
The Ka-62 is a multipurpose helicopter based on an experimental military model, the Ka-60. The helicopter is designed to carry up to 15 passengers or 2.5 tons of cargo. It can be flown in harsh conditions, namely at sea and in the mountains, as well as in hot and wet climates.
Modern polymer materials amount to 60 percent of the helicopter’s mass, which makes it lighter, faster, more maneuverable and durable, as well as reduces fuel usage.
Serial production of the Ka-62 is expected to start in 2020.



A prototype communication complex C-404 was flight-tested alongside the Ka-62.

“It’s a next-generation, entirely digital communication complex. It provides a constant link between pilots and ground services at multiple frequencies, as well as constant emergency signal reception,” a Roselectronica representative told reporters at the HeliRussia-2017 exhibition on Friday.

The Ka-62 helicopter might also get a specialized sea variant to be used on helicopter-carrying vessels. The full-scale mockup of this variant has a folding propeller blades and tail section to fit into the tightest hangars on a sea vessel, according to the director general of the Kamov rotorcraft manufacturing company, Sergey Miheev.

“We created a completely unique helicopter, capable to fill a vast niche [on the market], capable to be used both in military and civil operations,” Miheev told reporters.

Saab has camouflage that works against infrared and radar for vehicles


Saab’s Barracuda Mobile Camouflage System (MCS), provides constant protection to vehicles when stationary, while on the move, and during combat operations.

The MCS provides wheeled-vehicle and combat vehicle platforms with multi-spectral signature management properties that enable the platform to blend in with environmental surroundings. It significantly reduces the probability of detection visually and by sensors such as Near Infrared (NIR), Short-wave Infrared (SWIR), Long-wave Infrared (LWIR), Mid-wave Infrared (MWIR) and radar. Each system is engineered to fit like a second skin to the vehicle and not interfere with operations, vehicle performance or maintenance.

The U.S. Army´s 2nd Cavalry Regiment, stationed in Vilsek, Germany, is now evaluating Saab’s Barracuda Mobile Camouflage System (MCS) on their Stryker fighting vehicles. This is the first field evaluation of the MCS conducted by the U.S. Army, during its operational training in Hohenfels, Germany. This training and evaluation, conducted alongside other NATO Allies is in support of Operation Atlantic Resolve and the Enhanced Forward Presence missions.

“Mobile camouflage and signature management is more important now than at any time in the last 15 years, especially in the European theatre. The fact that our systems are now being evaluated by the U.S. Army in Europe is a testament to Saab’s dedication to support the soldier and continued cooperation with the U.S. military”, says Scott Caldwell, director of marketing and sales at Saab business unit Barracuda.

“Current efforts to support U.S. Army Europe with MCS are ongoing and could eliminate field-improvised vehicle camouflage and negate the need to re-paint vehicles to match operational environments. The general feedback from U.S. Army soldiers was that the MCS successfully reduces the overall signature of their vehicles, is very durable and easy to use. They also stated they enjoyed working hand-in-hand with Saab to develop a signature management system given it helps to increase survivability”, says Scott Caldwell.

Plasma jet engine breakthrough heralds beginning of new era in space travel

    Photo of transient atmospheric nanosecond pulse discharges for internal MPC excitation. iopscience.iop.org

A major new breakthrough in jet propulsion technology could revolutionize the aerospace industry, paving the way for plasma jet engines that could carry a craft to the edge of space using only air and electricity. 
Berkant Göksel, the lead researcher in a new study by the Technical University of Berlin, says his team have successfully completed tests on plasma engines that could take future aircrafts to altitudes of 30 miles (50km) and beyond.

The challenge was to develop an air-breathing plasma propulsion engine that could be used for take-off as well as high-altitude flying.

The team used a rapid stream of nanosecond-long electric discharges to fire up the propulsion mixture. A similar technique is used in pulse detonation combustion engines, making them more efficient than standard fuel-powered engines.

* Plasma propulsion was proved on an airship in 2005
* this is a pathway to far more powerful and effective plasma propulsion
* this could enable propulsion beyond the height of existing planes
* nearterm it could be for routine airships at 50-100 km
* it could eventually be used to get to orbit and transform aviation and space access

While studies into plasma jet engines has largely focused on their ability to manoeuvre small satellites in the vacuum of space, Göksel told the New Scientist that his research concentrated on testing the engine in a normal atmosphere.

It’s the first time anyone has applied pulse detonation to plasma thrusters. Jason Cassibry at the University of Alabama in Huntsville is impressed. “It could greatly extend the range of any aircraft and lower the operational cost,” he says.

But there are several hurdles to overcome before the technology can propel an actual plane. For a start, the team tested mini thrusters 80 millimetres long, and a commercial airliner would need some 10,000 of them to fly, which makes the current design too complex for aircraft of that size. Göksel’s team plans to target smaller planes and airships for now. Between 100 and 1000 thrusters would be enough for a small plane, which the team thinks is feasible.





A real flight demonstration is the next milestone goal for the project.
The team used 80mm-long mini-thrusters in their experiments – 10,000 of which would be needed to support a commercial airliner. However, Göksel believes the team could test their work on a small plane using between 100 and 1,000 thrusters.



Plans are underway to develop a mobile power generator for use in the first flight demonstration onboard the b-Ionic Airfish. In 2005, the craft became the world’s first airship to be propelled by plasma engines.
 It is hoped this experiment helps overcome the project’s major obstacle, which is the huge amount of electricity required to generate and sustain the plasma.

Plasma jet engine breakthrough heralds beginning of new era in space travel - study
b-Ionic Airfish. iopscience.iop.org

“An array of thrusters would require a small electrical power plant, which would be impossible to mount on an aircraft with today’s technology,”  Dan Lev from the Technion-Israel Institute of Technology told the New Scientist.
Göksel is hopeful of working around this with solar panels or potentially beaming power wirelessly to the engines.

© SolarStratos
Sun-powered ‘space plane’

DJI drone: Mavic Pro and Phantom 4 Pro




DJI Mavic Pro seems affordable?  999 dollars.









DJI – Introducing Phantom 4 Pro
The DJI Phantom 4 Pro redefines the iconic Phantom series, bringing imaging and intelligence to new heights. Its new camera equipped with a larger 1-inch sensor and the ability to capture 4K video at 60fps and while its FlightAutonomy system adds dual rear vision sensors and two infrared sensors for a total of 5 directions of obstacle sensing and greater protection. Creators are also further empowered with a new suite of ActiveTrack and TapFly functions that makes complicated shots easier than ever.
What has caught experts' attention is that the drone has a "Tap-by-Use" feature, which allows users to tap on an individual in a crowd on his screen and allowing the drone to lock and track the person.







Flying Phantom 3 at K2


Free WannaCry decryption tools released online

Don’t cry for me: Free WannaCry decryption tools released online

The private cybersecurity industry has faced a series of unprecedented global crises so far in 2017, including WannaCry and Adylkuzz malware attacks. In the face of such rampant digital crime, a viable open source counter-hacking community is emerging.
Adrien Guinet, a French security researcher from Quarkslab, discovered a method for finding the ransomware’s decryption key.
WannaCry encryption creates two keys – “public” and “private” – that are based on prime numbers and are responsible for encrypting and decrypting the system’s files respectively.
However, WannaCry "does not erase the prime numbers from memory before freeing the associated memory," Guinet said, as cited by The Hacker News.
The aptly-named “WannaKey” tool is available for free here but only functions on computers running the Windows XP operating system.

Given the very specific way in which the tool works, it only functions if the infected computer has not been rebooted since the WannaCry ransomware and the associated memory has not been allocated and erased by another process.
In yet another win for open source online collaboration by private cybersecurity firms and researchers, another tool was quickly developed based on Guinet’s findings that has broader applications.

Benjamin Delpy developed the WanaKiwi tool, available for free download here, which simplifies the decryption process somewhat and is applicable to infected computers that run the Windows XP, Windows 7, Windows Vista, Windows Server 2003 and 2008 operating systems.



Comae Technologies founder and CEO Matt Suiche has also provided a series of blogs and demonstrations on how to use WanaKiwi to decrypt your files.

While both WannaKey and WanaKiwi are limited in what they can accomplish for victims of the cyberattack that affected hundreds of thousands of computers across the globe, this can still be seen as a major win for open source counter-hacking.


Star Trek: Discovery - First Look Trailer



Star Trek Discovery is set ten years before the first Kirk and Spock space mission. The CBS All Access Original Series arrives this Fall.
Set roughly ten years before the events of the original Star Trek, the series follows the crew of the USS Discovery as they discover new worlds and civilizations, while exploring the franchise’s signature contemporary themes. The season-long storyline revolves around “an incident and an event in Star Trek history that’s been talked about but never been explored



From Emmy Award-winning executive producer and creator Seth MacFarlane (FAMILY GUY, “Ted”) and directed by Jon Favreau (“The Jungle Book,” “Iron Man”), THE ORVILLE is a one-hour science fiction series set 400 years in the future that follows the adventures of the U.S.S. Orville, a mid-level exploratory vessel. Its crew, both human and alien, faces the wonders and dangers of outer space, while also dealing with the familiar, often humorous problems of regular people in a workplace…even though some of those people are from other planets, and the workplace is a faster-than-light spaceship.

In the 25th century, Earth is part of the Planetary Union, a far-reaching, advanced and mostly peaceful civilization with a fleet of 3,000 ships. Down on his luck after a bitter divorce, Planetary Union officer ED MERCER (MacFarlane) finally gets his chance to command one of these ships: the U.S.S. Orville. Determined to prove his worth and write a new chapter in his life, Ed finds that task all the more difficult when the First Officer assigned to his ship is his ex-wife, KELLY GRAYSON (Adrianne Palicki, “Agents of S.H.I.E.L.D.,” “Friday Night Lights”).

As the new commander, Ed assembles a qualified, but eccentric crew, including his best friend, GORDON MALLOY (Scott Grimes, “ER,” “Justified”), who has problems with authority, but is the best helmsman in the fleet; DR. CLAIRE FINN (Penny Johnson Jerald, “24,” “The Larry Sanders Show”), one of the Union’s most accomplished physicians; BORTUS (Peter Macon, “Shameless,” “Bosch”), an alien from a single-sex species; ISAAC (Mark Jackson, “That Royal Today”), an artificial life-form from a machine society that thinks biological life-forms are inferior; navigator JOHN LAMARR (J. Lee, FAMILY GUY, “The Cleveland Show”), whose casual humor cuts through even the most dire situations; ALARA KITAN (Halston Sage, “Neighbors,” “Goosebumps”), a young, inexperienced security officer whose home planet’s high gravity gives her superior physical strength; and YAPHIT, a gelatinous creature voiced by comedian Norm Macdonald (“The Middle,” “Saturday Night Live”).

Somehow, Ed and Kelly must put the past behind them and, with the help of the crew, navigate fascinating and sometimes dangerous adventures in outer space, as well as the tumultuous and captivating day-to-day personal relationships with their colleagues.



WannaCry XXL? 2nd even bigger global cyber attack already underway

    A US official on Tuesday put the number of computers infected by WannaCry at over 300,000.

The Shadow Brokers hacking group is responsible for the release of the National Security Agency’s (NSA) hacking exploits which highlighted a Windows vulnerability used by hackers in the recent WannaCry global ransomware attack.

The worm, known variously as WannaCry, WanaCryptor, and WannaCrypt, targets computers running Microsoft operating systems. It is built on an exploit named EternalBlue, one of many NSA “cyber-weapons” released by a group known as the Shadow Brokers, who first started leaking NSA tools late last summer. 

It isn’t clear where the Shadow Brokers got the NSA hacking tools, but the arrest of former NSA contractor Harold T. Martin III last August for stealing a massive amount of data has made him the most likely suspect.

Former NSA officials have claimed the Shadow Brokers’ tools are “identical” to those taken by Martin, reports The Washington Post.
The US government said it seized 50 terabytes of confidential data from Martin’s home which was stolen from the NSA and other intelligence agencies. A veteran contractor, Martin had access to classified information as part of his work in the intelligence-gathering division of the NSA named Tailored Access Operations.
He has been in custody since his arrest and is facing espionage charges. Another NSA employee was also arrested in 2015, but no information has been released about the individual.

The EternalBlue code formed the basis of the WannaCry ransomware, which struck networks on Friday in one of the biggest cyberattacks ever recorded
The EternalBlue code formed the basis of the WannaCry ransomware, which struck networks on Friday in one of the biggest cyberattacks ever recorded

It spread without exploiting user interactions.
Unlike phishing or spearphishing attacks, where a computer is compromised because a user clicks a link in a targeted email, WannaCry works without exploiting any human error.

Kaspersky Lab, a well-known cybersecurity company, wrote in a richly detailed FAQ about the attack that “Perhaps the main reason why Wannacry was so successful is the fact that the EternalBlue exploit works over the Internet without requiring any user interaction." Because it strikes over networks, it can still wreak havoc inside a local network even with the killswitch active, as the killswitch needs the internet to work.

Kaspersky recommendations:
  • Install the MS Security Bulletin patches for MS17-010. Please note that Microsoft also released an emergency patch for Windows XP, which is out of support!
  • Disable SMBv1.
  • Backup your data on a regular basis and be sure to store the backups offline.
  • Limit administrative privileges in the network.
  • Segment your network.
  • Make sure all nodes have security software installed and updated.
  • Kaspersky users: make sure System Watcher is enabled and the software updated. System watcher will ensure rollback of any encrypted files.
  • For those who do not use Kaspersky Lab solutions, we suggest installing the free Kaspersky Anti-Ransomware Tool for business (KART).
  • WannaCry is also targeting embedded systems. We recommend ensuring that dedicated security solutions for embedded systems are installed, and that they have both anti-malware protection and Default Deny functionality enabled.

An Evil Lair?
Unlikely the attackers will be able to do anything with the bitcoins. Even though the wallet owners are anonymous, the transactions are visible to everybody and can be tracked. Once the bitcoins reach a payment point, where the attackers use them to purchase something in the real world, that payment can be tracked to shipment details, services, or other IPs, effectively, increasing the chances of getting caught.

Adylkuzz cyberattack dwarfs WannaCry

As the world reels from the WannaCry ransomware attack, it’s now emerged that a second, potentially larger attack, is already under way. It seems the widespread proliferation of military-grade cyberweapons has ushered in a new era of digital crime.
Cyber bandits have again deployed both the EternalBlue and DoublePulsar exploits developed and used by the NSA which were released by the ShadowBrokers hackers back in April.

“Initial statistics suggest that this attack may be larger in scale than WannaCry, affecting hundreds of thousands of PCs and servers worldwide: because this attack shuts down SMB networking to prevent further infections with other malware (including the WannaCry worm) via that same vulnerability, it may have in fact limited the spread of last week's WannaCry infection,” wrote a security researcher who goes by the alias Kafeine at cybersecurity company Proofpoint.

This latest attack uses the two exploits to install the cryptocurrency miner Adylkuzz over corporate Local Area and wireless networks but, rather curiously, may actually have helped slow the spread of WannaCry.

However, in an apparent case of “picking your poison,” the Adylkuzz miner dramatically slows PC and server performance as it extracts cryptocurrency but it does not lock users out of their machines and data, as WannaCry did.

Researchers at Proofpoint estimate that the Adylkuzz attack may have begun as early as April 24 but was subsequently overshadowed in the hysteria that followed the WannaCry ransomware attacks.
The attack is launched from multiple virtual private servers which scour the internet for vulnerabilities to install the Adylkuzz miner.


Adylkuzz is believed to have infected more computers than WannaCry, using the same vulnerabilities
Adylkuzz is believed to have infected more computers than
WannaCry, using the same vulnerabilities.

The malware infection occurs as follows:
The EternalBlue exploit opens the door for infection with DoublePulsar on a target machine. DoublePulsar then downloads and runs Adylkuzz on the computer.
Adylkuzz then stops any preexisting versions of itself on a target machine, while also blocking SMB network communications with other machines to prevent any further malware infections from disrupting its operations. It initially prevents cybersecurity professionals from identifying that there is a problem.
Once the door has been held open and detection risks have been minimized, Adylkuzz then downloads mining instructions, the cryptocurrency miner itself and a variety of cleanup tools to mask its activities.
While the term cryptocurrency is typically associated with Bitcoin, Adylkuzz actually mines Monero, a similar but more heavily encrypted digital currency. Monero recently saw a significant uptick in usage after it was adopted in the AlphaBay market on the Dark Web.
As with other cryptocurrencies, Monero expands in market cap through self-proliferation via digital mining. One monero is roughly equivalent to $27 at current exchange rates.
During its research, Proofpoint identified three addresses which had already generated $7,000, $14,000 and $22,000 respectively, before being shut down.

To cover their tracks, whoever is behind the attack regularly changes the online payment address to avoid attracting too much attention.
As in the case of the WannaCry attack, hackers have leveraged the NSA’s weaponized exploits of legacy Microsoft operating systems to infect hundreds of thousands of machines worldwide with malware. Since the Shadow Brokers’ leak of these NSA exploits there have been two high profile attacks with many more expected in the future.

WannaCry hackers have not withdrawn any ransom bitcoin, surveillance shows

   © Silas Stein / Global Look Press

Hackers collecting bitcoin following Friday’s cyberattack have not yet withdrawn any of the digital currency from their accounts, and could have a hard time doing so without getting caught, experts say.
With the help of leaked software developed by the National Security Agency (NSA), malicious ransomware called the Wanna Decryptor – or WannaCry – spread to 150 countries until Mei, 15.

The malware instructs people to pay up to £460 to one of three bitcoin addresses in order to retain their files, and also displays a countdown clock giving a deadline for the payments.
The hackers, who have locked files on 200,000 computers worldwide, have only made around $500,000 so far, despite the magnitude of the attack. Britain’s National Crime Agency (NCA) is urging victims not to pay the ransom.
Nothing has yet been withdrawn from any of the bitcoin accounts, and law enforcement agencies watching them say the perpetrators could be difficult to trace until they access some of the ransom money.


 

Ransomware bounties are usually paid in bitcoin, a digital currency that keeps its users anonymous. Bitcoin is also traceable, however, as every transaction is tied to publicly-accessible accounts, typically called wallets. The wallets show each payment that victims have sent in hopes of regaining access to their files.
New payments are coming in regularly, according to Ransom Tracker, a Twitter bot that is sending out automated messages and posting every time a payment is made to one of the three bitcoin addresses.
Oliver Gower, the deputy director of the NCA’s national cybercrime unit, has vowed to track down the hackers.
“Cybercriminals may believe they are anonymous but we will use all the tools at our disposal to bring them to justice,” he told the Times.

Rob Wainwright, the director of Europol, told the newspaper that security officials believe the hack is the work of criminals, rather than a state-sponsored attack.
“Our working assumption, as with every other major ransomware attack, is that this is a cybercriminal attack. Unless we have something definitive to point us in another direction that’s our assumption at the moment. As in any investigation, we keep our mind open.”

Public awareness is “absolutely critical for preventing cyberattacks,” Neil Walsh, the head of the Global Program on Cybercrime launched by the UN Office on Drugs and Crime (UNODC), told. “Such threats could theoretically be averted if the public is aware of what a cyberattack looks like and is [cautious] with opening emails and especially emails with attachments that they were not expecting to get,” he said.
At the same time, he warned that the WannaCry ransomware could potentially “propagate further” as people around the world got back to work Monday.
“A challenge with any ransomware or cyberattack is that when people come back to work they turn on potentially insecure systems, which are not updated with the latest security patches. Perhaps, they are unaware of how this threat arises through email or opening attachments,” Walsh said.
He went on to call on all countries to join their efforts in combating cyberthreats “irrespective of politics and politicizing.” He also urged the governments to “use law enforcement channels such as Interpol, Europol and bilateral cooperation as well as to work together politically to help to mitigate these threats.”

On Sunday, Europol Director Rob Wainwright told the ITV network that the cyberattack that began on Friday has hit some 200,000 victims in over 150 countries so far.
“The global reach is unprecedented. The latest count is over 200,000 victims in at least 150 countries, and those victims, many of those will be businesses, including large corporations,” he said.
“At the moment, we are in the face of an escalating threat. The numbers are going up; I am worried about how the numbers will continue to grow when people go to work and turn [on] their machines on Monday morning,” he added.


WannaCry 2.0 arrives with no kill switch


Tech giant Microsoft recently lashed out at NSA for the role it played in the chain of events that led to the recent WannaCry epidemic.
“We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world,” Microsoft President and Chief Legal Officer Brad Smith said in a blog post on Sunday.
“This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem.”



Mysterious hacking collective called 'The Shadow Brokers' stole NSA superweapon and caused global cyber attack that is causing chaos in 74 countries

   Several computers at a university in Italy were also randomly targeted in the cyber attack

A global cyber attack using hacking tools widely believed to have been developed by the US National Security Agency and leaked online by a group called the Shadow Brokers has caused chaos around the world.
British hospitals, the Russian government, German railways and big companies like FedEx were among those affected on Friday when they were crippled by the 'ransomware' that rapidly spread across the globe and infected tens of thousands of computers in 74 countries.
Security experts say the malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was identified by the US National Security Agency for its own intelligence-gathering purposes.
The NSA documents were stolen and then released to the world last month by a mysterious group known as the Shadow Brokers.
The hackers, who have not come forward to claim responsibility, likely made it a 'worm', or self spread malware, by exploiting a piece of NSA code known as Eternal Blue, according to several security experts.
The Shadow Brokers released Eternal Blue last month as part of a trove of hacking tools that they said belonged to the US spy agency. It has stoked fears that the spy agency's powerful cyber weapons had been stolen and repurposed by hackers with nefarious goals.
The malicious software was blocking access to computers and demanding payments of as much as $600 to restore access and scrambling data. It is thought to have impacted at least 57,000 computers, including machines in the Russian government. 

The NHS has been hit by a major cyber attack hitting computers, phones and emergency bleepers in hospitals and GP surgeries - and pop-ups like this one have appeared demanding a ransom
The NHS has been hit by a major cyber attack hitting computers, phones and emergency bleepers in hospitals and GP surgeries - and pop-ups like this one have appeared demanding a ransom

The technological meltdown began earlier on Friday afternoon in Britain when more than 40 NHS organisations including hospitals and GP surgeries were hit by the virus.
But with the virus spreading at a rate of five million emails per hour, tens of thousands of victims have now been reported in more than 74 countries including the US, Australia, Belgium, France, Germany, Italy and Mexico.
Russia is thought to have been among the worst hit by the ransomware amid reports that 1,000 computers in the country's Interior Ministry were affected, but sources say no information was leaked.
Ministry spokeswoman Irina Volk told Russian news agencies it had 'recorded a virus attack on the ministry's personal computers controlled by a Windows operating system.' 
 

RANSOMWARE: THE CYBER ATTACK THAT CRIPPLED THE WORLD

What is ransomware? 
Ransomware is a type of malicious software that criminals use to attack computer systems.
Hackers often demand the victim to pay ransom money to access their files or remove harmful programs.
The aggressive attacks dupe users into clicking on a fake link – whether it's in an email or on a fake website, causing an infection to corrupt the computer.
In some instances, adverts for pornographic website will repeatedly appear on your screen, while in others, a pop-up will state that a piece of your data will be destroyed if you don't pay.
In the case of the NHS attack, the ransomware used was called Wanna Decryptor or 'WannaCry' Virus. 

What is the WannaCry virus? 
The WannaCry virus targets Microsoft's widely used Windows operating system.
The virus encrypts certain files on the computer and then blackmails the user for money in exchange for the access to the files.
It leaves the user with only two files: Instructions on what to do next and the Wanna Decryptor program itself.
When opened the software tells users that their files have been encrypted and gives them a few days to pay up or their files will be deleted.
It can quickly spread through an entire network of computers in a business or hospital, encrypting files on every PC.
How to protect yourself from ransomware 
Thankfully, there are ways to avoid ransomware attacks, and Norton Antivirus has compiled a list of prevention methods:
1. Use reputable antivirus software and a firewall
2. Back up your computer often
3. Set up a popup blocker
4. Be cautious about clicking links inside emails or on suspicious websites
5. If you do receive a ransom note, disconnect from the Internet
6. Alert authorities 
 
Leading international shipper FedEx Corp was among the companies whose Microsoft Corp Windows systems were affected. They said they were 'implementing remediation steps'.
The German rail system was also experiencing issues due to the ransomware. Photos surfaced on social media appeared to show ticketing computers at train stations having been affected by the cyber attack.  
In Spain, the Telefonica mobile phone network, power firm Iberdrola and utility provider Gas Natural all suffered from the virus. 
Some big firms in Spain took pre-emptive steps to thwart ransomware attacks following a warning from the National Cryptology Centre of 'a massive ransomware attack'.
Iberdrola and Gas Natural, along with Vodafone's unit in Spain, asked staff to turn off computers or cut off internet access in case they had been compromised.
Security teams at large financial services firms and businesses were reviewing plans for defending like Telefonica get hit is going to get everybody worried.against cyber attacks, according to executives with private cyber security firms.Chris Wysopal, chief technology officer with cyber security firm Veracode, said: 'Seeing a large telco
'Now ransomware is affecting larger companies with more sophisticated security operations.'  

The German rail system was also experiencing issues due to the ransomware. Photos surfaced on social media showing ticket machines at train stations having been affected
The German rail system was also experiencing issues due to the ransomware. Photos surfaced on social media showing ticket machines at train stations having been affected. dailymail

Computer expert Lauri Love, who is facing extradition to the US over the alleged theft of data from government computers, said the attack is being powered by a 'top of the range cyber weapon' used by spies in the US. 
'It appears the cyber attack affected so many computers in the UK in the NHS and in Spain by taking advantage of a very nasty vulnerability in Microsoft Windows, which was dumped by hacking group Shadow Brokers who obtained it from the NSA in America.'

WHO HAS BEEN AFFECTED BY CYBER ATTACK?

The UK's National Health Service: British hospitals and clinics were forced to send patients away and cancel appointments.
Russia: The country was believed to be among the worst hit when computers in the interior ministry were hit. Megafon - Russia's second largest phone network - had also been affected.
German railway stations: Photos surfaced on social media appeared to show ticketing computers at train stations having been affected by the cyber attack.
Spanish companies: Telecoms giant Telefonica, power firm Iberdrola and utility provider Gas Natural all suffered from the virus.
FedEx: The shipping company confirmed they were affected and were implementing remediation steps.
In December last year it was revealed about 90 per cent of NHS Trusts were still running Windows XP, two and a half years after Microsoft stopped supporting the system.
Citrix, an American software company, sent a Freedom of Information request to 63 NHS Trusts, 42 of which responded. It revealed that 24 Trusts were unsure when they would even upgrade, The Inquirer reported.
Windows XP was released more than 15 years ago and is now particularly vulnerable to viruses. Microsoft stopped providing virus warnings for the ageing Windows XP in 2015.

A number of UK hospitals continue to run the outdated software, including East Sussex, Sheffield's Children's hospital and Guy's and St Thomas' NHS Trust.
Hours after news of the cyber attacks broke, a Microsoft spokesman revealed that customers who were running the company's free antivirus software and who had enabled Windows updates were 'protected' from the attack.
It raises questions about why NHS computers using the operating system were not shielded from the ransomware.
The spokesman said: 'Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt.

'In March, we provided a security update which provides additional protections against this potential attack.
'Those who are running our free antivirus software and have Windows updates enabled, are protected.
'We are working with customers to provide additional assistance.'
One message circulated online claims the hackers demand 300 US dollars (£230) in the virtual currency bitcoins to relinquish control of their IT systems.
The pop-up contains a countdown clock with a deadline of next Friday. At least 10 payments of around USD$ 300 have been made to Bitcoin accounts that the hackers have asked to be paid on Friday.
But, although all Bitcoin transactions are public, we cannot see who made the payments so cannot know if they have been made by anyone in the NHS. 
'Non urgent' appointments and operations were postponed across the UK and some hospitals diverted ambulances to neighbouring ones to ensure patient safety.

Computer systems were switched off or immobilised and key services including the bleeper system for doctors were also believed to be down.
In the minutes after the attack one doctor in the UK tweeted: 'Massive NHS hack cyber attack today. Hospital in shut down. Thanks for delaying emergency patient care & endangering lives. A******s'.
NHS Digital, which is responsible for the health service's cyber security, says computer systems are believed to have been hit by a ransomware cyber attack using malware called 'Wanna Decryptor'.  Three hospitals in America were hit in the same way last year.

Ransomware: How do hackers take your data hostage?
Ransomware: How do hackers take your data hostage?

The National Cyber Security Centre is investigating and is working with Britain's FBI - the National Crime Agency. 
GP surgeries hit in the attack say their phones went down and patients should avoid calling unless 'absolutely necessary' and doctors were back to using pen and paper in some areas.
Explaining the fallout, one doctor said in a message shared on Twitter: 'So our hospital is down. We got a message saying your computers are now under their control and pay a certain amount of money. And now everything is gone.'  
A screenshot obtained by the Health Service Journal (HSJ) purported to show the pop-up that appeared on at least one of the computers affected.

It said: 'Your important files are encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time.
'Nobody can recover your files without our decryption service.'
It goes on to demand payment, otherwise the files will be deleted. It gives a deadline of next Friday afternoon, May 19, to pay.
The HSJ said services affected were thought include archiving systems for X-rays, pathology test results, phone and bleep systems, and patient admin systems.  
Blackpool Victoria Hospital is one of many across the country hit - operations have been cancelled and ambulances diverted 
Blackpool Victoria Hospital is one of many across the country hit - operations have been cancelled and ambulances diverted. dailymail

Barts NHS Trust in east London said they are treating it as a 'major incident' to ensure they can 'maintain the safety and welfare of patients'.
A spokesman said: 'We are experiencing a major IT disruption and there are delays at all of our hospitals. 
'Ambulances are being diverted to neighbouring hospitals. The problem is also affecting the switchboard at Newham hospital but direct line phones are working. All our staff are working hard to minimise the impact and we will post regular updates on the website'. 
Fylde and Wyre NHS Trust and Blackpool Hospitals in Lancashire, East and North Hertfordshire NHS Trust and Derbyshire Community Health Services NHS Trust have admitted having problems. Colchester University Hospitals Trust is also a victim as is neighbouring Chelmsford in Essex.
York Teaching Hospital NHS Foundation Trust which runs York and Scarborough hospitals has confirmed its computers have been affected by the widespread attack. 
They have urged people to be patient and avoid calling GP surgeries and hospitals unless 'absolutely necessary'. 
NHS Merseyside said: 'Following a suspected national cyber attack we are taking all precautionary measures possible to protect our local NHS systems and services'. dailymail