Welcome to the forums!

Our encouraging community is a dedicated resource for innovators everywhere.

Learn about industry trends, common questions,
and stay informed of the latest happenings at Edison Nation.

Keeping your important work computer away from the Internet

sunto's Avatar

Dose any one else feel it's time to separate the two I have had big problems with my main computer and I am not sure what has coursed my problems Windows updates or dodgy malware .

I post this from my phone. 

posted    Report this topic
countofmontecristo's Avatar


I'm afraid we are fighting a losing battle. The more we rely on technology, the more enslaved we become. Even though this latest 'ransomware' attack worm spread across the globe in a few hours, it was only a 'test run'. Researchers have determined that the attack was only a test run, as evidenced by a built-in 'kill switch'. When they really want to take everything down, no such switch will be included.  Another big issue- if variants of this worm directly target infrastructure like nuclear power plants, hydroelectric systems or the grid itself.  You can also expect smart phones and devices to be targets very soon.

There has been some good news: an ingenious discovery appears to have halted the spread of the virus for now.

As part of the digital attack, the hackers included a way of disabling the malware in case they wanted to shut down their activities, Ars Technica reported. To do so, the assailants included code in the ransomware that would stop it from spreading if the virus sent an online request to a website created by the attackers. The kill switch would stop the malware from spreading as soon as the website went online and communicated with the spreading digital virus.

A British-based researcher, who declined to give his name, registered a
domain that he noticed the malware was trying to connect to, limiting
the worm's spread. When the 22-year-old British researcher, whose Twitter handle is @MalwareTechBlog, confirmed his involvement but insisted on anonymity because he did not want the public scrutiny, saw that the kill switch’s domain name — a long and complicated set of letters — had yet to be registered, he bought it himself. By making the site go live, the researcher shut down the hacking attack before it could fully spread to the United States.

However, this temporary workaround will only last for a few days if not hours.

“I will confess that I was unaware registering the domain would stop the malware until after I registered it, so initially it was accidental,” wrote the @MalwareTechBlog researcher. “So long as the domain isn’t revoked, this particular strain will no longer cause harm, but patch your systems ASAP as they will try again.”

posted    Report this post
sunto's Avatar

Thanks for the input Ralph got my desk top back now all the pain of reinstalling all my 

programs real pain just reinstated solidworks and my thumb nails are showing as symbols. Just google like mad a fix I think it's a windows 7 update that has caused the problem real pain.

Posted from I pad 

posted    Report this post
countofmontecristo's Avatar

Ouch. I hate being right all the time. : (

However, new variants of the rapidly replicating malware were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware's spread Friday by diverting it to a dead end on the internet.

As Bloomberg reports that Matt Suiche, founder of United Arab Emirates-based cyber security firm Comae Technologies warns a new version of the ransomware may have also been spreading over the weekend.

About 50% of machines that would have spread the infection by the second variation of the malware have Russian I.P. addresses, according to Suiche.

Over 40,000 machines appear to have been infected by the second variation of the malware already.

Ryan Kalember, senior vice president at Proofpoint Inc., which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up.

"We haven't fully dodged this bullet at all until we're patched against the vulnerability itself," Kalember said.

posted    Report this post