a savvy 22-year-old britain -based researcher for finding the viruses so call, kill switch. stopping the spread of the attack before did more damage in the u.s. cyber security experts at ibm are working overtime to restore data, assess the damage, and shore up defenses for their clients. i think will learn a lot over the next 48 hours in terms of the spread of the attack, but also will be required to recover the systems. one thing we don t know the cases what percentage of the systems that were impacted the people have backups? with able to restore? that will be the second chapter of the story. the recovery. reporter: hackers used to microsoft windows flaw which was secretly used as a cyber weapon by the u.s. national security agency before it was leaked online. hackers exploited it when ransom where and spam e-mail attachment. it locks your computer and
in it after his wedding. exproriate. reporter: they hope they can slow hugo chavez down and find someone to run against him in 2012. jon: taking private property on live television, what a country. reporter: it s pretty amazing what he can do. he changed the name of the country, the name of the clocks, he can point to a building and take it over. jon: thanks. jenna: a shark aeu t-bgs a teenage surfer and he lives to tell the tail. we ll talk to this young man and hear his amazing survival story. also a cyber eye tack at iran s nuclear power station weeks before the facility is set to go online. jennifer griffin told us a little bit about it. what a dangerous cyber weapon could mean forte ran and the rest of us coming up next.