By JIM KERSTETTER
Security researchers have found striking similarities in the code used in the global attack to that used in previous breaches attributed to North Koreans.
Published: May 16, 2017 at 07:00PM
from NYT Technology http://ift.tt/2pLybRU
via IFTTT