• Re: Did Kaspersky step in dog-doo? (was: Massive attack of ransomware)

    From Shadow@1:396/4 to All on Sun May 14 04:41:04 2017
    From: Shadow <[email protected]>

    On Sun, 14 May 2017 13:29:42 +0000 (UTC), Jamey Caterwauler
    <<[email protected]>> wrote:

    No.

    You are new here, nice to meet you. Let me guess. Norton ?
    McAfee ? Malwarebytes ? TLAs ?
    []'s
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    --- NewsGate v1.0 gamma 2
    * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
  • From CRNG@1:396/4 to All on Sun May 14 21:10:52 2017
    From: CRNG <[email protected]>

    On Sun, 14 May 2017 13:29:42 +0000 (UTC), Jamey Caterwauler
    <<[email protected]>> wrote in <of9m46$1a7t$[email protected]>

    "Would any one of you be
    comfortable with Kaspersky Lab's software on your computers?" To
    a man, all replied that they would opt not to have Kaspersky
    Lab's software on their computers.

    So what would be a good alternative?
    --
    Web based forums are like subscribing to 10 different newspapers
    and having to visit 10 different news stands to pickup each one.
    Email list-server groups and USENET are like having all of those
    newspapers delivered to your door every morning.
    --- NewsGate v1.0 gamma 2
    * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
  • From FredW@1:396/4 to All on Mon May 15 11:26:16 2017
    From: FredW <[email protected]d>

    On Mon, 15 May 2017 08:10:53 -0500, CRNG <[email protected]>
    wrote:
    On Sun, 14 May 2017 13:29:42 +0000 (UTC), Jamey Caterwauler
    <<[email protected]>> wrote in <of9m46$1a7t$[email protected]>

    "Would any one of you be
    comfortable with Kaspersky Lab's software on your computers?" To
    a man, all replied that they would opt not to have Kaspersky
    Lab's software on their computers.

    So what would be a good alternative?

    belony!

    - Kaspersky

    - Eset

    All those that replied have clearly no idea whatsoever of IT-matters.
    They give only politically desirable answers (they think).

    And this massive attack of ransomware was caused by the NSA and the USA. (responsible are those people that replied).

    https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/
    The WannaCrypt exploits used in the attack were drawn from the exploits
    stolen from the National Security Agency, or NSA, in the United States.
    That theft was publicly reported earlier this year. A month prior, on
    March 14, Microsoft had released a security update to patch this
    vulnerability and protect our customers.

    --
    Fred W. (NLD)
    --- NewsGate v1.0 gamma 2
    * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
  • From Ant@1:396/4 to All on Mon May 15 15:52:06 2017
    From: "Ant" <[email protected]>

    "FredW" wrote:
    All those that replied have clearly no idea whatsoever of IT-matters.
    They give only politically desirable answers (they think).

    Neither do the people running the affected networks and systems,
    apparently. They should be fired.

    And this massive attack of ransomware was caused by the NSA and the USA.

    Not really. People (amd Microsoft) should have woken up in 2003 when
    the Sever Mesage Block (SMB) software listening on port 445 was first
    exploited by the Blaster worm. There is no reason for SMB to be
    listening for incoming internet connections and no excuse for not
    firewalling this port.


    --- NewsGate v1.0 gamma 2
    * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
  • From FredW@1:396/4 to All on Mon May 15 18:17:28 2017
    From: FredW <[email protected]d>

    On Mon, 15 May 2017 20:52:07 +0100, "Ant" <[email protected]> wrote:

    "FredW" wrote:
    All those that replied have clearly no idea whatsoever of IT-matters.
    They give only politically desirable answers (they think).

    Neither do the people running the affected networks and systems,
    apparently. They should be fired.

    And this massive attack of ransomware was caused by the NSA and the USA.

    Not really. People (amd Microsoft) should have woken up in 2003 when
    the Sever Mesage Block (SMB) software listening on port 445 was first >exploited by the Blaster worm. There is no reason for SMB to be
    listening for incoming internet connections and no excuse for not
    firewalling this port.

    Further reading showed me you are right.

    (ever more facts are appearing how this originated.)

    --
    Fred W. (NLD)
    --- NewsGate v1.0 gamma 2
    * Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)