Patch Issued By Microsoft To Stop Ransomware Attack

Finally A Patch Issues By Microsoft To Stop Ransomware Attack In Future.

Just after the WannaCry Ransomware Hit all across the globe , Microsoft released a patch for the users to safeguard themselves from this deadly virus.
The User can download and Install the patch from the official Microsoft site because if not done then it gets very easy for the ransomware to attack and infect the system of users and ask for the ransom amount to give them back the whole access of their system.

Microsoft officials worked throughout the day just after the infection attacked all the versions of Microsoft windows that were below windows 10 and after to ensure the safety of their customers system they on immediate basis released a new patch version which will safeguard the user system If running on windows XP, Windows 8 and Windows server 2003. Customers working on windows 10 are not attacked till now.



  1. For the users using windows defender, Microsoft released a patch which will detect the wannacry threat immediately and will clean it before it could start infecting the system.
    The detected threat will look like Ransom:Win32/WannaCrypt.
  2. This patch was an update for the previous version of patch and was released to help their customers and to save them from getting attacked by this ransomware again.

Note: to download the patch and to know more about it visit –> Microsoft Official Site.

All the users running their system on Windows 8, Windows 8.1, Windows Vista, Windows server 2003, Windows server 2008, Windows 7 are prone to this ransomware and therefore Microsoft advised the users to download and install this latest version of patch to safeguard their systems.

This Virus was observed to spread through E-Mails , Malicious Links and other infectious attachments.
Microsoft always advise its users to use antivirus or vigilance when opening any anonymous mail or link so that they can protect the user from getting infected by some virus or threat or Browser Hijacker.

Leave a Reply

Your email address will not be published. Required fields are marked *