Michael KanU.S. Correspondent, IDG News Service

Michael Kan covers security for the IDG News Service.

security code big data cyberespionage DDoS

Mirai is the hydra of IoT security: too many heads to cut off

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.

CIA central intelligence agency

WikiLeaks dump brings CIA spying powers into the spotlight

Has the CIA ever spied on you? That’s a key question swirling around Tuesday’s WikiLeaks document dump that allegedly detail the U.S. agency’s secret hacking tools.

wikileaks

WikiLeaks will share CIA hacking details with companies, but can they use it?

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed. But will software companies want it?

cia

WikiLeaks looks at helping tech vendors disarm CIA hacking tools

WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products

dsc06014

Security holes in Confide messaging app, used by White House staffers, exposed user details

Confide, a messaging app reportedly used by White House staff, apparently had several security holes that made it easier to hack.

cia

Did the CIA hack you? Wikileaks leak may allow antivirus vendors to tell

Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA.

170227 mwc 02739

ZTE pays $892M settlement to US over illegal sales to Iran

Chinese smartphone maker ZTE has agreed to pay US$892 million to the U.S. government for illegally selling networking technology to Iran.

cr re

Consumer Reports to grade tech products on security, privacy

Consumer Reports, a major source for gadget reviews in the U.S., plans to start rating tech products on data security and privacy.

p1200475

Slack bug paved the way for a hack that can steal user access

One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick its users into handing over access.

yahoo mail

Yahoo execs botched its response to 2014 breach, investigation finds

The internet pioneer, which reported a massive data breach involving 500 million user accounts in Sept., actually knew an intrusion had occurred back in 2014, but allegedly botched a proper response.

first google

Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.

dsc05995

Laid-off IT workers worry US is losing tech jobs to outsourcing

Sixty-three-year-old Bob Zhang is worried about the future of tech jobs in the U.S. Will the high-paying positions be a thing of the past?

screen shot 2017 02 27 at 4.34.08 pm

Smart teddy bears for kids suffer a contentious data breach

If you own a stuffed animal from CloudPets, then you may have been hacked.

e2e

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.