Michael Kan

U.S. Correspondent

Michael Kan covers security for the IDG News Service.

Top tips for finding the right cybersecurity products

Top tips for finding the right cybersecurity products

Having trouble finding the right security products for your business? You’re not the only one. We asked experienced buyers for their tips.

The pitfalls of cybersecurity shopping: hype and shoddy products

The pitfalls of cybersecurity shopping: hype and shoddy products

Today's cybersecurity market is beset by vaporware, exaggerated marketing claims and shady sales tactics, security managers say.

Google Docs phishing attack underscores OAuth security risks

Google Docs phishing attack underscores OAuth security risks

Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.

Sneaky Gmail phishing attack fools with fake Google Docs app

Sneaky Gmail phishing attack fools with fake Google Docs app

Google Docs was pulled into a sneaky email phishing attack on Tuesday that was designed to trick users into giving up access to their Gmail accounts.

China will attempt to keep IT products spy-free with security checks

China will attempt to keep IT products spy-free with security checks

China will start carrying out security checks for IT vendors in the country that intend to keep out internet and networking services vulnerable to spying and hacking risks.

Vulnerability hits Intel enterprise PCs going back 10 years

Vulnerability hits Intel enterprise PCs going back 10 years

Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over the past decade.

Trump seeks to upgrade US government IT services

Trump seeks to upgrade US government IT services

President Trump is launching a special council to upgrade the U.S. government’s IT services. “Americans deserve better digital services from their government,” the executive order, released on Monday, said.

NSA ends surveillance tactic that pulled in citizens' emails, texts

NSA ends surveillance tactic that pulled in citizens' emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications from U.S. citizens that mention foreign targets under surveillance.

Google's Chrome will soon start warning you more about HTTP pages

Google's Chrome will soon start warning you more about HTTP pages

A Google effort to push websites to implement encryption is expanding. Starting in October, the company will flag even more HTTP connections as insecure in its Chrome browser.

Ransomware attacks are taking a greater toll on victim's wallets

Ransomware attacks are taking a greater toll on victim's wallets

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec.

Russian hackers use OAuth, fake Google apps to phish users

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.

Old Windows Server machines can still fend off hacks. Here's how

Old Windows Server machines can still fend off hacks. Here's how

Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.

Hipchat resets user passwords after possible breach

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.

There's now a tool to test for NSA spyware

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Hackers use old Stuxnet-related bug to carry out attacks

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

A vigilante hacker may have built a computer worm to protect the IoT

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

At $175, this ransomware service is a boon to cybercriminals

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175.

IoT malware clashes in a botnet territory battle

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security...

Microsoft: Past patches address leaked NSA exploits

Microsoft: Past patches address leaked NSA exploits

Microsoft said its already patched vulnerabilities revealed in Friday’s high-profile leak of suspected U.S. National Security Agency spying tools, meaning customers will be protected if they’ve updated their software to latest version....

Leaked NSA exploits plant a bull's-eye on Windows Server

Leaked NSA exploits plant a bull's-eye on Windows Server

Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.

Load More