Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

cia

WikiLeaks looks at helping tech vendors disarm CIA hacking tools

WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products

dsc06014

Security holes in Confide messaging app, used by White House staffers, exposed user details

Confide, a messaging app reportedly used by White House staff, apparently had several security holes that made it easier to hack.

cia

Did the CIA hack you? Wikileaks leak may allow antivirus vendors to tell

Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA.

170227 mwc 02739

ZTE pays $892M settlement to US over illegal sales to Iran

Chinese smartphone maker ZTE has agreed to pay US$892 million to the U.S. government for illegally selling networking technology to Iran.

cr re

Consumer Reports to grade tech products on security, privacy

Consumer Reports, a major source for gadget reviews in the U.S., plans to start rating tech products on data security and privacy.

p1200475

Slack bug paved the way for a hack that can steal user access

One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick its users into handing over access.

yahoo mail

Yahoo execs botched its response to 2014 breach, investigation finds

The internet pioneer, which reported a massive data breach involving 500 million user accounts in Sept., actually knew an intrusion had occurred back in 2014, but allegedly botched a proper response.

first google

Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.

dsc05995

Laid-off IT workers worry US is losing tech jobs to outsourcing

Sixty-three-year-old Bob Zhang is worried about the future of tech jobs in the U.S. Will the high-paying positions be a thing of the past?

screen shot 2017 02 27 at 4.34.08 pm

Smart teddy bears for kids suffer a contentious data breach

If you own a stuffed animal from CloudPets, then you may have been hacked.

e2e

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.

161221 waymo 5

Uber rejects claims it stole Waymo's self-driving car tech

Uber is dismissing allegations that it stole trade secrets from rival Waymo, calling them “a baseless attempt to slow down a competitor.”

160914 uber selfdriving 3

Alphabet's Waymo raises stakes in self-driving car race with Uber lawsuit

The road to develop self-driving cars might be paved with lawsuits. Waymo, a spin-off from Google's self-driving car initiative, is suing Uber for allegedly stealing its trade secrets.

20140926 campus indoors 004 1

Amid cyberattacks, ISPs try to clean up the internet

From what Level 3 Communications can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity.