And Washington had no trustworthy proofs to sustain prohibitions on Chinese tech companies in the United States of America after the WannaCry ransomware attack. In light of the recent WannaCry ransomware attacks on a few Maharashtra government office computers, the state has come up with helpline numbers for a few days to guide organisations and institutions prevent and remedy such such cyber attacks, if any.
The "ransomware" cyberattack on companies and governments around the world has yet to victimize anyone at the University of IL, mostly because the UI bans outdated versions of the Windows operating system targeted by the virus. In the UK's National Health Service, which was particularly badly hit, at least 47 organisations were affected.
For many years cyber security has been one of the major frictions in bilateral relations between China and the U.S., with Washington often pointing an accusing finger at Beijing, claiming it is engaged in state-sponsored cyber espionage, although it has offered no credible evidence to support its accusation.
In a blog post on Sunday, Brad Smith, president and chief legal officer at Microsoft, noted that as cyberattacks have grown in sophistication, the government practice of hoarding malicious tools has done more harm than good. "They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world".
Alexander's big pitch was for government and industry to work together to try to de-risk these intelligence agency "tools" - i.e.to patch up and firefight critical scenarios whereby an intelligence agency exploit has been leaked and is in the hands of cyber criminals.More news: Brazil crisis deepens with probe of president, top senator
More news: Swansea still interested in Terry signing
More news: Roger Ailes, fired Fox News chairman and political strategist, dies at 77
"Technology companies owe their customers a reliable process for patching security vulnerabilities", he said.
It should be noted that Microsoft makes it clear that when an older operating system reaches end-of-life, it no longer receives free support.
"We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith.
Since increasing numbers of systems running older versions of Windows were affected, Microsoft had chose to push an emergency patch for Windows XP and Windows Server 2003, urging users to deploy the patch as soon as possible to limit the impact of WannaCry.
Windows 8, Windows XP, and Windows Server 2003.