Hospitals, oil companies, banks and other organisations have been affected around the world, with many fearing a repeat of the cyberattack chaos on Monday as people return to work. A coal port in New Zealand shut temporarily to upgrade its systems. "Many of those will be businesses including large corporations". This, security experts said, marked an unprecedented escalation in the risk of fresh attacks spreading in the coming days and weeks.
He said: "First of all we can not force people to join the army, we don't have conscription in this country, the army has to compete with other sectors in the economy".
A cyber-attack that hit 150 countries since Friday should be treated by governments around the world as a "wake-up call", Microsoft has said.
Among those hit were Russia's Interior Ministry and companies including Spain's Telefonica and FedEx Corp.in the U.S.
Security experts have vowed to track down the criminals behind an unprecedented worldwide cyber attack that wreaked havoc across the NHS.
"We are implementing remediation steps as quickly as possible", a statement said.
England's National Health Service said 47 organisations providing care had been hit and on Sunday afternoon seven hospitals were continuing to divert patients from the emergency room.
Sixteen National Health Service organizations in the United Kingdom were hit, and some of thosehospitals canceled outpatient appointments and told people to avoid emergency departments if possible.
"Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage", Smith wrote.
"This thing can not be brushed under the carpet", he said.
The Japan Computer Emergency Response Team Coordination Center, a nonprofit group, said 2,000 computers at 600 locations in Japan were affected. Nissan Motor Co. confirmed Monday, May 15, 2017, some units had been targeted, but there was no major impact on its business.
Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices. As Microsoft has already patched the issue, users are advised to update their systems to remain safe.
In Indonesia, the malware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays.
The malware program is called "WannaCry", and it was first uncovered in documents stolen from the U.S. National Security Agency, exposing a vulnerability to Microsoft's operating systems.
Ryan Kalember, senior vice president at Proofpoint Inc., said the version with no kill switch was able to spread but it contained a flaw that wouldn't allow it to take over a computer and demand ransom to unlock files. MalwareTech published a blog post early Saturday morning detailing how they stopped the spread of this ransomware.
Computers booting up to start the workweek might continue the spread of "WannaCry", a ransomware attack where hackers lock down a computer and threaten to delete all its data unless a ransom is paid.
Smith also stated that Microsoft had already released a security patch for the said vulnerability but users didn't update it for some reason or the other and now the tech giant is "working around the clock" to protect and help its affected customers.
The president of Microsoft laid some of the blame at the feet of the USA government.
Oliver Gower, of the National Crime Agency, said: "Cyber criminals may believe they are anonymous but we will use all the tools at our disposal to bring them to justice".
The cyberattack that spread malicious software around the world, shutting down networks at hospitals, banks and government agencies, was stemmed by a young British researcher and an low-cost domain registration, with help from another 20-something security engineer in the U.S.