Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

img 20160625 202609

Researchers prove that a hard drive's LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.

RSA

Here’s how the US government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet.

dsc05783

The best cybersecurity advice from experts at RSA

Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more.

artificial intelligence ai a.i.

A.I. faces hype, skepticism at RSA cybersecurity show

The cybersecurity industry has been talking up artificial intelligence and machine learning as a way to stop the hackers, but don’t necessarily believe all the hype.

ceo email scam spoof

Researchers trick 'CEO' email scammer into giving up identity

Businesses targeted in email phishing schemes don’t always have to play the victim. They can actually fight back.

p1170191 1

Doubts abound over US action on cybersecurity

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election.

ransomware hardware security embedded circuit board integrated controller

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.

screen shot 2017 02 13 at 5.45.40 pm

Researcher develops ransomware attack that targets water supply

A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.

petya ransomware logo

Experts worried about ransomware hitting critical infrastructure

Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.

Legislation of privacy security keyboard law legal gavel court ruling

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

icloud

Apple's iCloud saved deleted browser records, security company finds

Apple’s iCloud appears to have been holding on to users’ deleted internet browsing histories, including records over a year old.

dsc05694

Android privacy assistant seeks to stop unwanted data collection

Not sure what your phone is collecting about you? A new Android app is promising to simplify the privacy settings on your smartphone, and stop any unwanted data collection.

32310283740 71a7cbc128 o

U.S. idea to collect travelers' passwords alarms privacy experts

To better vet foreign travelers, the U.S. might demand that some visa applicants hand over the passwords to their social media accounts, a proposal that’s alarming privacy experts.

Mac malware Apple

Mac malware, possibly made in Iran, targets US defense industry

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian actors to target the U.S. defense industry.

iphone7plus review adam 1

Dozens of popular iOS apps leave user data vulnerable to attack

Dozens of iOS apps that are supposed to be encrypting their users' data don't do it properly, according to a security researcher.