Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

botnet bots

US dismantles Kelihos botnet after Russian hacker's arrest

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.

cia

Suspected CIA spying tools linked to hacks in 16 countries

The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.

iCloud

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.

21394517746 9a77570fae o

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.

150901 virgin atlantic london heathrow

U.S. says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East.

dsc06104

Amazon will refund $70 million of in-app purchases made by kids

Amazon could have to hand out more than $70 million in refunds to parents whose kids ran up in-app purchase bills, according to the FTC.

hacking cybercrime cybersecurity internet coding programming code

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.

Android Google marshmallow

Notorious iOS spyware has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

020511 pyongyang 1

Banking hackers left a clue that may link them to North Korea

The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers.

21394517746 9a77570fae o

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.

img 20170330 152140

In mining user data, U.S. ISPs must weigh cash vs. privacy

U.S. internet service providers are about to face temptation. Now that the broadband privacy rule repeal is almost certain, will they sell their customers' data to marketers, or will they keep it private?

170323 broadband

Congress to US citizens: Want online privacy? Pay up!

Tuesday’s congressional vote to repeal U.S. restrictions on broadband providers doesn’t mean that online privacy isn’t dead. U.S. consumers will just have to pay for it.

US Capitol

Congress dismantles Internet privacy rules, allowing ISPs to sell your web history

The U.S. House of Representatives has voted to repeal privacy rules that can prevent broadband providers from selling customers’ internet-browsing histories and other data without their permission.

12973123 10106415969507493 6982208931759200481 o

China devotes $22 billion to domestic chip industry expansion

China is pouring more money into its semiconductor ambitions. The state-backed Tsinghua Unigroup, which has building up the country’s chip industry, received a 150 billion yuan (US$22 billion) investment on Tuesday.

Beijing Apple Store

Apple wins China patent battle over iPhone 6 design

Apple has fended off a lawsuit in China that claimed the iPhone 6’s design had infringed a design patent from a little-known local vendor.