Say the words genuine software to any Sri Lankan and the chances are you’ll get the classic head-to-toe, toe-to-head look. This is because, as Sri Lankans, we have grown accustomed to free goodies, be it food, travel or in this case software. While there are people who would use free and open source software (FOSS), there are a majority of people who still use illegal pirated software (commonly referred to as “cracked” software).
On one hand it makes sense. Sri Lanka is still a developing country and the thought of paying around LKR10,000-15,000/- for genuine software is not really within the common man’s budget. So they would do what anyone faced in this situation would do: they turn to the internet or their friends to get a so called cracked copy of whatever genuine software they want to use. This is where the problem starts.
According to a survey carried out by the International Data Corporation in the year 2013:
While these numbers may not seem like much, this was 4 years ago and since then, new threats have raised their ugly head. Take for example, the Wannacry and Petya ransomwares. These ransomware affected over 100 countries within a few days. Once infected with the ransomware, the infected computer’s files will be locked and encrypted. The only way one could gain access again would be to pay the ransom asked (hence the name).
Exactly how much was the ransom? Well the demand was $300 in bitcoin. Once affected, a pop-up window would appear with instructions on how to make the payment. This pop-up also features 2 clocks. One clock would display the 3-day deadline to pay the ransom. If payment wasn’t made in 3 days, the ransom amount would double. The second clock was more deadly as it showed a countdown. As the countdown reached zero, the infected PC’s filed would be deleted forever.
If you didn’t have $300 in bitcoins to pay, an alternative method would have been to format the PC yourself and reinstall everything from scratch. If you had by mistake kept important files in your primary partition or your desktop, then those would be deleted too. Overall, this ransomware indeed would make a person “wannacry”.
(Un)surprisingly, the number one reason for PCs to get infected by these ransomware was that they were running outdated version of Microsoft Windows. This was the perfect opportunity for the ransomware to strike. Because these PCs weren’t updated with the latest security updates, they were left vulnerable to attack. This also goes to show you the disasters that are waiting to happen if you’re not running genuine software. Because the software is pirated, they cannot authenticate themselves online to receive the latest updates. Hence they are susceptible to attack.
While the attacks seemed to be only targeting Microsoft based systems, there were a few reports of Linux systems getting attacked as well. Overall, if you were running any version of Microsoft Windows prior to the Windows 10 Creators Update, you were at risk and any similar systems connected were at risk as well.
Well, for starters, you should refrain from downloading or installing unrecognized files. Ransomware often spreads via an executable file attached to an email, advertisements on torrent sites or is even downloaded when using peer-to-peer networks such as torrents.
Probably the most important thing you can do to protect yourself is to ensure that you’re installing genuine software. In addition to providing an extra level of security, you are also eligible for frequent security updates and patches, which you don’t get with unlicensed software. Furthermore, apart from installing genuine software, you should obviously also keep it updated. There’s no point running a genuine version of a 5-year-old software application when you can update it to the latest version. This includes keeping your web browser, operating system, and even your antivirus software updated.
As newer and more complex threats rear their ugly heads, it’s of the essence to stay updated, both in terms of your own knowledge and the security of your systems. If you hear about a threat, go online and search for it. Online forums are a veritable goldmine for information such as this and can help you stay safe.
Always ensure you’re running genuine applications and that they’re always up to date. Remember the golden rule: “An ounce of prevention is worth more than a pound of cure”.
Subscribe to our mailing list and get interesting stuff and updates to your email inbox.
thank you for subscribing 🙂
awww something went wrong 🙁
We respect your privacy and take protecting it seriously
What kicked off in 2011 as a friendly gaming event has now developed into a fully-fledged gaming tournament. With the goal of promoting team building, leadership, and planning, the Virtusa
What kicked off in 2011 as a friendly gaming event has now developed into a fully-fledged gaming tournament. With the goal of promoting team building, leadership, and planning, the Virtusa LAN Challenge 2018 is happening.
Semi-Finals of the internal tournament will take place on the 22nd and 23rd of January 2018 at Virtusa premises.
january 22 (Monday) - 23 (Tuesday)
Virtusa Pvt. Ltd. 752, Dr Danister De Silva Mawatha, Colombo 09
The main purpose of the workshop is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use
The main purpose of the workshop is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning and big data.
Module 1: Introduction to Machine Learning
This module introduces machine learning and discussed how algorithms and languages are used.
· What is machine learning?
· Introduction to machine learning algorithms
· Introduction to machine learning languages
Module 2: Introduction to Azure Machine Learning
Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio.
· Azure machine learning overview
· Introduction to Azure machine learning studio
· Developing and hosting Azure machine learning applications
Module 3: Managing Datasets
At the end of this module the student will be able to explore various types of data in Azure machine learning.
· Categorizing your data
· Importing data to Azure machine learning
· Exploring and transforming data in Azure machine learning
Module 4: Building Azure Machine Learning Models
This module describes how to use regression algorithms and neural networks with Azure machine learning.
· Azure machine learning workflows
· Using regression algorithms
· Using neural networks
Module 5: Using Azure Machine Learning Models
This module explores how to provide end users with Azure machine learning services, and how to share data generated from Azure machine learning models.
· Deploying and publishing models
· Consuming Experiments
Module 6: Using Cognitive Services
This module introduces the cognitive services APIs for text and image processing to create a recommendation application, and describes the use of neural networks with Azure machine learning.
· Cognitive services overview
· Processing language
· Processing images and video
· Recommending products
Feel free to contact us for any inquiries
uditha bandara – 0716092918
All Day (Wednesday)
ANC education ,310 R A De Mel Mw, Colombo 03 00300
Blue Chip Training0716092918
Startup Weekend is a global phenomenon - 54 hours of fast and furious prototype development through to exploring potential markets and pitching. It’s an unparalleled opportunity to build lasting relationships
Startup Weekend is a global phenomenon – 54 hours of fast and furious prototype development through to exploring potential markets and pitching. It’s an unparalleled opportunity to build lasting relationships with co-founders; mentors, and investors.
The real value comes from taking an idea from concept through to execution using Lean tactics and working under high pressure with the best startups.
26 (Friday) 5:00 pm - 28 (Sunday) 8:00 pm
Oak Ray Regency Kandy
Oak Ray Regency Kandy, No 9, Devani Rajasinghe Mawatha,, 20000 Kandy