Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Mac malware Apple

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

security code big data cyberespionage DDoS

A vigilante hacker may have built a computer worm to protect smart devices

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

karm

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175.

botnet bots

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security researchers.

microsoft windows 10 sign

Microsoft: Previous Windows patches fixed newly leaked NSA exploits

Microsoft said its already patched vulnerabilities revealed in Friday’s high-profile leak of suspected U.S. National Security Agency spying tools, meaning customers will be protected if they’ve updated their software to latest version.

nsa aerial

Leaked NSA exploits plant a bull's-eye on Windows Server

Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.

NSA headquarters

New NSA leak may expose its bank spying, Windows exploits

A hacking group has released suspected U.S. government files that show the National Security Agency may have spied on banks across the Middle East.

future car

How will future cars stay up-to-date? Make them open like a PC

The future may seem bright for the car. A whole host of technologies -- including self-driving systems – is set to reinvent the vehicle, and make it more computerized than ever.

img 20170412 103417

Microsoft Word exploit linked to cyberspying in Ukraine conflict

A severe Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.

23922454810 2a21da142a o

Lawsuits claims Yahoo squandered trust fund for Chinese dissidents

A pledge Yahoo made 10 years ago to help Chinese political dissidents has resulted in millions of dollars squandered, according to a new lawsuit filed on Tuesday.

botnet bots

US dismantles Kelihos botnet after Russian hacker's arrest

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.

cia

Suspected CIA spying tools linked to hacks in 16 countries

The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.

iCloud

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.

21394517746 9a77570fae o

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.