icon-cookie
The website uses cookies to optimize your user experience. Using this website grants us the permission to collect certain information essential to the provision of our services to you, but you may change the cookie settings within your browser any time you wish. Learn more
I agree
blank_error__heading
blank_error__body
Text direction?

Bloomberg

Need help? Contact us

We've detected unusual activity from your computer network

To continue, please click the box below to let us know you're not a robot.

Why did this happen?

Please make sure your browser supports JavaScript and cookies and that you are not blocking them from loading. For more information you can review our Terms of Service and Cookie Policy.

Need Help?

For inquiries related to this message please contact our support team and provide the reference ID below.

Block reference ID: undefined
Measure
Measure
Related Notes
Get a free MyMarkup account to save this article and view it later on any device.
Create account

End User License Agreement

Summary | 6 Annotations
hackers would probably launch a new round of attacks with many computers still vulnerable.
2017/05/14 08:02
48 organizations in the National Health Service were affected
2017/05/14 08:03
The malware, using a technique purportedly stolen from the U.S. National Security Agency
2017/05/14 08:03
The initial attack was stifled when a security researcher disabled a key mechanism used by the worm to spread, but experts said the hackers were likely to mount a second attack because so many users of personal computers with Microsoft Corp. operating systems couldn’t or didn’t download a security patch released in March that Microsoft had labeled “critical.”
2017/05/14 08:04
Last year an acute-care hospital in Hollywood paid $17,000 in bitcoin to an extortionist who hijacked its computer systems and forced doctors and staff to revert to pen and paper for record-keeping.
2017/05/14 08:05
Ransomware is a particularly stubborn problem because victims are often tricked into allowing the malicious software to run on their computers, and the encryption happens too fast for security software to catch it.
2017/05/14 08:07