Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

nsa aerial

Leaked NSA exploits plant a bull's-eye on Windows Server

Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.

NSA headquarters

New NSA leak may expose its bank spying, Windows exploits

A hacking group has released suspected U.S. government files that show the National Security Agency may have spied on banks across the Middle East.

future car

How will future cars stay up-to-date? Make them open like a PC

The future may seem bright for the car. A whole host of technologies -- including self-driving systems – is set to reinvent the vehicle, and make it more computerized than ever.

img 20170412 103417

Microsoft Word exploit linked to cyberspying in Ukraine conflict

A severe Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.

23922454810 2a21da142a o

Lawsuits claims Yahoo squandered trust fund for Chinese dissidents

A pledge Yahoo made 10 years ago to help Chinese political dissidents has resulted in millions of dollars squandered, according to a new lawsuit filed on Tuesday.

botnet bots

US dismantles Kelihos botnet after Russian hacker's arrest

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.

cia

Suspected CIA spying tools linked to hacks in 16 countries

The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.

iCloud

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.

21394517746 9a77570fae o

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.

150901 virgin atlantic london heathrow

U.S. says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops on board certain flights from the Middle East.

Amazon app store screen

Amazon will refund $70 million of in-app purchases made by kids

Amazon could have to hand out more than $70 million in refunds to parents whose kids ran up in-app purchase bills, according to the FTC.

hacking cybercrime cybersecurity internet coding programming code

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.

Android Google marshmallow

Notorious iOS spyware has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

020511 pyongyang 1

Banking hackers left a clue that may link them to North Korea

The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers.

21394517746 9a77570fae o

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.