Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

malware attack cyberespionage code hacker

An online market that offered cheap hacked servers returns

A website that offered access to hacked servers for as little as $6 is back online.

3d printer

Hacked 3D printers could commit industrial sabotage

3D printers can churn out toys, clothing and even food. But the technology also shows potential for use in industrial sabotage, researchers warn.

megaupload

File sharing site Megaupload will return in January, claims Kim Dotcom

The creator of Megaupload plans on reviving the infamous file sharing site on Jan. 20, five years after the U.S. government shut it down.

pokemon go

Sideloaders beware: a Pokemon Go knock-off contains malware

The hit game Pokemon Go could end up becoming bait for hackers wanting to take over your phone.

ransomware hardware security embedded circuit board integrated controller

Cybersecurity firms step up intel sharing despite issues of trust

The war against the cyber criminals won’t be won alone. To keep the hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and competition.

google quantum qubit

Google bolsters Chrome's defenses against quantum computing attacks

The encryption methods used to secure today’s internet won’t be impenetrable forever. More powerful “quantum computers” in the future could very well crack them.

107473 d0851

FBI chief says Guccifer lied about hacking into Clinton's email server

A Romanian hacker's claim that he broke into Hillary Clinton's private email server back in 2013 is a lie, according to the FBI.

wendys restaurant

Wendy's hack was bigger than thought and exposed credit card data

A data breach that hit Wendy's fast food restaurants targeted customer credit card information and was more than three times bigger than originally disclosed.

ok google

Here's how secret voice commands in YouTube videos could hijack your smartphone

A muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it.

ashley madison

Adultery website Ashley Madison is being investigated by the FTC

The company behind Ashley Madison, the adultery website that was hacked last year, is reportedly facing an investigation from the U.S. Federal Trade Commission.

trojan horse wooden

This mobile Trojan from China fills your phone with porn apps

Malware that secretly installs porn apps on your phone is infecting devices by the millions, becoming the world’s largest mobile Trojan.

hackers

DNC hacker Guccifer 2.0 denies Russian links and mocks security firms

The hacker who claims to have breached the Democratic National Committee’s networks is trying to beat back accusations that he’s linked with the Russian government.

mobile phones

Mobile ransomware use jumps, blocking access to phones

Mobile ransomware is on the rise, with the infection rate skyrocketing, according to new research.

security code big data cyberespionage byte

Terror-suspect database used by banks, governments, has been leaked

A database described by some as a “terrorism blacklist” has fallen into the hands of a white-hat hacker who may decide to leak it online.

hdd hard disk drive hitachi

Used hard drives on eBay, Craigslist are often still ripe with leftover data

Before you throw away that old hard drive, make sure you purge the memory clean. A new study has found that most users are accidentally giving up photos, social security numbers and financial data, by failing to properly delete the files on their recycled hard drives.