United States should not stockpile cyber weapons, Microsoft says

As of Sunday morning, more than 100,000 organizations in at least 150 countries had been affected, according to Europol, the European Union's police agency.

A former head of Britain's communications agency GCHQ has come out fighting following assertions by Microsoft that it was not wholly to blame for a widespread cyber attack which disrupted much of the NHS over the weekend.

It should be noted the WannaCry ransomware, which exploits the EternalBlue vulnerability in Microsoft's Windows OS, doesn't impact devices running on Linux or Apple's MacOS.

Since the attack has already been deployed and affected extensively, it is important that Windows PC users take precautionary measures to stay protected from the ransomware.

The patch to fix the Microsoft networking vulnerability the ransomware used to break into computers, though, was sent out by the software giant in February, Forbes said. It asked for a ransom payment of $300 in bitcoin to unlock the computer.

While the NSA has not commented on either the WannaCry attack or Microsoft's response, Tom Bossert, President Trump's Homeland Security advisor discussed at Monday's daily White House press briefing that the infection rate has been relatively low in the us compared to overseas infection rates, and that no federal systems have been compromised. Here's a quick look.

Trump denies that he requested Comey end investigation into Flynn
In a written statement, Trump insisted anew there were no nefarious ties between his campaign and Russian Federation . Lawmakers said Rosenstein was careful in his wording, in part because of the potential scope of Mueller's probe.


Microsoft released a security patch for the vulnerabilities in March.

You may want to consider turning on automatic updates from Microsoft Windows.

Microsoft also had something to say to governments that make attacks like the WannaCrypt outbreak possible. If the website is up and running, the attack stops spreading. There are also a lot of computers in use that simply couldn't install Microsoft's update. This threat is detected as "Ransom:Win32/WannaCrypt". Questions have been raised over Trident's vulnerability to potential cyber attacks, as the system is believed to use ageing Window's XP software - the same operating system targeted by the global ransomware attack. In case of WannaCry, it is relying on some common phishing tactics as well, and you might get a mail with a malicious attachment.

"This attack is a powerful reminder that information technology basics like keeping computers current and patched are a high responsibility for everyone, and it's something every top executive should support", explained Smith.

Experts fear the WannaCry cyberattack is just the beginning.

Latest News