Appearing on the BBC's Andrew Marr Show yesterday, Defence Secretary Michael Fallon defended the government's decision not to fund updates for NHS computers, "appearing to deflect criticism on the health trusts themselves for the fact crucial files were left open for hackers to exploit", says The Independent.
"We have seen no spike in accounts, so that gives us some hope that when we turn on our computers in Australia we won't see a huge spike", Mr MacGibbon said.
FedEx: The company said it was "experiencing interference with some of our Windows-based systems caused by malware" and was trying to fix the problems as quickly as possible.
Computers around the globe were hacked beginning on Friday using a security flaw in Microsoft's Windows XP operating system, an older version that was no longer given mainstream tech support by the USA giant.
Will Bellows, director of IT solutions firm Netserve, said those anxious about being hit by ransomware should follow a three-step protection plan, including keeping anti-virus software up-to-date, installing cloud-based anti-spam, and creating a back up solution.
Asked why a £5 million contract with Microsoft to protect the XP machines had been terminated, the spokesman said £50 million had been made available to NHS bodies for cyber security in the 2015 spending review.
Chinese state media Xinhua meanwhile reported that 29,000 institutions across China had been infected by the cyber attack.
Universities and other educational institutions in China were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security, said Fang Xingdong, founder of ChinaLabs, an internet strategy think tank.
Energy giant PetroChina said payment systems at some of its petrol stations were hit, although it had been able to restore most of the systems.
The exploitation of EternalBlue, suspected to have been developed using a hacking method leaked from US National Security Agency, allows the malware to spread through file-sharing protocols set up across the internal networks of organisations, many of which criss-cross the globe, according to Financial Times.
Russian Central Bank: State media agency Tass reported the bank discovered malware bulk emails to banks but detected no compromise of resources.
Had it not been for a young British cybersecurity researcher's accidental discovery of a so-called "kill switch", the malicious software likely would have spread much farther and faster. Ransomware locks computers and encrypts the data stored on it and also prevents apps and software from running. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself".
Two months after Microsoft issued its security patch, thousands of computers remained vulnerable to the WannaCry attack.
The president of Microsoft laid some of the blame at the feet of the USA government.
Meanwhile Europol's chief told the BBC the ransomware was created to allow "infection of one computer to quickly spread across the networks", adding: "That's why we're seeing these numbers increasing all the time".
The virus disrupted the work of at least 2,000 computers at 600 locations in Japan on Saturday, Japan's Computer Emergency Response Team Coordination Center said, as cited by Nikkei newspaper. Brad Smith criticized USA intelligence agencies, including the CIA and National Security Agency, for "stockpiling" software code that can be used by hackers.
Earlier in the day, central transmission utility Power Grid said it has put sufficient firewalls to deal with the global cyber attack. "It's like after a robber enters your home".
Senior security staff held another meeting in the White House Situation Room on Saturday, and the Federal Bureau of Investigation and National Security Agency were trying to identify the perpetrators of the massive cyber attack, said the official, who spoke on condition of anonymity, stated Reuters. To get the system unlocked, you need to pay a ransom, now $300.