Michael Kan

U.S. Correspondent

Michael Kan covers security for the IDG News Service.

Google Docs phishing attack underscores OAuth security risks

Google Docs phishing attack underscores OAuth security risks

Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.

Sneaky Gmail phishing attack fools with fake Google Docs app

Sneaky Gmail phishing attack fools with fake Google Docs app

Google Docs was pulled into a sneaky email phishing attack on Tuesday that was designed to trick users into giving up access to their Gmail accounts.

Vulnerability hits Intel enterprise PCs going back 10 years

Vulnerability hits Intel enterprise PCs going back 10 years

Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over the past decade.

NSA ends surveillance tactic that pulled in citizens' emails, texts

NSA ends surveillance tactic that pulled in citizens' emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications from U.S. citizens that mention foreign targets under surveillance.

Ransomware attacks are taking a greater toll on victim's wallets

Ransomware attacks are taking a greater toll on victim's wallets

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec.

Russian hackers use OAuth, fake Google apps to phish users

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.

Old Windows Server machines can still fend off hacks. Here's how

Old Windows Server machines can still fend off hacks. Here's how

Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.

Hipchat resets user passwords after possible breach

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.

There's now a tool to test for NSA spyware

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

Hackers use old Stuxnet-related bug to carry out attacks

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

A vigilante hacker may have built a computer worm to protect the IoT

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

At $175, this ransomware service is a boon to cybercriminals

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175.

IoT malware clashes in a botnet territory battle

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security...

IoT malware clashes in a botnet territory battle

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security...

New NSA leak may expose its bank spying, Windows exploits

New NSA leak may expose its bank spying, Windows exploits

A hacking group has released suspected U.S. government files that show the National Security Agency may have spied on banks across the Middle East.

Microsoft Word exploit linked to cyberspying in Ukraine conflict

Microsoft Word exploit linked to cyberspying in Ukraine conflict

A severe Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.

US dismantles Kelihos botnet after Russian hacker's arrest

US dismantles Kelihos botnet after Russian hacker's arrest

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.

Suspected CIA spying tools linked to hacks in 16 countries

Suspected CIA spying tools linked to hacks in 16 countries

The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.

The iCloud hackers' bitcoin ransom looks like a fake

The iCloud hackers' bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus.

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.

Load More