Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

e2e

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.

161221 waymo 5

Uber rejects claims it stole Waymo's self-driving car tech

Uber is dismissing allegations that it stole trade secrets from rival Waymo, calling them “a baseless attempt to slow down a competitor.”

160914 uber selfdriving 3

Alphabet's Waymo raises stakes in self-driving car race with Uber lawsuit

The road to develop self-driving cars might be paved with lawsuits. Waymo, a spin-off from Google's self-driving car initiative, is suing Uber for allegedly stealing its trade secrets.

20140926 campus indoors 004 1

Amid cyberattacks, ISPs try to clean up the internet

From what Level 3 Communications can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity.

img 20160625 202609

Researchers prove that a hard drive's LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.

RSA

Here’s how the US government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet.

dsc05783

The best cybersecurity advice from experts at RSA

Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more.

artificial intelligence ai a.i.

A.I. faces hype, skepticism at RSA cybersecurity show

The cybersecurity industry has been talking up artificial intelligence and machine learning as a way to stop the hackers, but don’t necessarily believe all the hype.

ceo email scam spoof

Researchers trick 'CEO' email scammer into giving up identity

Businesses targeted in email phishing schemes don’t always have to play the victim. They can actually fight back.

p1170191 1

Doubts abound over US action on cybersecurity

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election.

ransomware hardware security embedded circuit board integrated controller

Cybersecurity alliance promoting intel-sharing seeks to expand

Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.

screen shot 2017 02 13 at 5.45.40 pm

Researcher develops ransomware attack that targets water supply

A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.

petya ransomware logo

Experts worried about ransomware hitting critical infrastructure

Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.

Legislation of privacy security keyboard law legal gavel court ruling

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.

icloud

Apple's iCloud saved deleted browser records, security company finds

Apple’s iCloud appears to have been holding on to users’ deleted internet browsing histories, including records over a year old.