Microsoft and McAfee Headline Newly-Formed 'Ransomware Task Force' (zdnet.com) 28
A group made up of 19 security firms, tech companies, and non-profits, headlined by big names such as Microsoft and McAfee, have announced on Monday plans to form a new coalition to deal with the rising threat of ransomware. From a report: Named the Ransomware Task Force (RTF), the new group will focus on assessing existing technical solutions that provide protections during a ransomware attack. The RTF will commission expert papers on the topic, engage stakeholders across industries, identify gaps in current solutions, and then work on a common roadmap to have issues addressed among all members. The end result should be a standardized framework for dealing with ransomware attacks across verticals, one based on an industry consensus rather than individual advice received from lone contractors.
Microsoft AND McAfee (Score:5, Funny)
Re: (Score:1)
Thank-you. I don't have mod points today, please accept my mod-point-in-spirit.
Re: (Score:2)
Re: (Score:2)
This would be MUCH more interesting if it was the founder!
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Sounds like PEBKAC to me (Score:3)
ransomware hits users, not the OS (Score:2)
While this is all good advice, it will not stop ransomware. If I e-mal you a Microsoft Word document with macros, and you open it, those macros will execute. They are not signed by a trusted party, and if you get a popup that asks if you are sure, you will of course say yes.
Those macros will send me all of the computer data you can read, and encrypt all of the computer data you can write, without running any privileged code or subborning the operating system. They will also send themselves to everyone in
Re: (Score:3)
Re: (Score:1)
Re: (Score:2)
... I still say PEBKAC because the issues have been dealt with and the security is there, it just cannot be enabled by default to avoid upsetting suits,
Why can it not be enabled? Is the inconvenience to the suits greater than the threat of ransomware? Is that still true after a successful ransomware attack?
There is an anonymous anecdote parallel to this reply in which the writer had to bypass security to do his job. Is that what you mean?
Re: (Score:2)
Re: (Score:2)
Reading your post I am reminded of a story I heard about Shell Oil years ago. It seems that they had written some analysis software for the IBM 704. When they got their IBM 7090, they re-wrote the software, making it more accurate. However, the exploration people trusted the old software so they ran it on the 7090 in 704 emulation mode. When they got their IBM 360 model 65, they ran the 7090 emulator so they could run the 704 emulator under it, so they could continue running the old applicaion.
If "the s
Re: (Score:2)
Please do not give my employer's IT department any ideas. I really like having PortableApps, Anaconda Python, and a MinGW C compiler on my company-issued laptop without having to jump through hoops only to get ancient versions installed - and still not being able to install python packages that come with DLLs.
Or do you mean that only the plebs (i.e. other people than yourself) should suffer from fully locked-down computers? Or that people who need to write code are immune to social-engineering attacks?
Microsoft and McAfee together (Score:4, Funny)
A dream team, indeed.
McAfee? (Score:5, Funny)
So, you mean to tell me that all this time the McAfee stuff on my PC wasn't ransomware?
Re: (Score:2)
So ... (Score:2)
If any companies know about malware (Score:3)
Isn't it something already covered extensively? (Score:1)
The targets hit by ransomware attacks have in common the following:
- Microsoft Windows OSes.
- lax set-up of their systems and networking.
This RTF is like an excuse for their shortcomings on security. It is like if they were saying: "Oh! shit! this is something completely new, we have caught unguarded." When in reality is the same old thing just this time the bad people behaved reall
New Managerial Position (Score:3)
Will the new manager of this group abbreviate their position as RTFM?