The hacking underworld is exploding as skilled well-funded criminals target US companies and consumers to steal whatever they can.» Read More
Beyond sanctions, U.S. officials are hoping to further target and isolate North Korea's international finance machine.
The Twitter account for U.S. Central Command was apparently hacked on Monday, with pro-ISIS messages plastering the account's profile.
President Obama will be previewing more proposals he will outline in his State of the Union address, including cybersecurity.
James Clapper revealed new details of a dinner he had with a top North Korean intelligence official during a secret trip.
Damage from hackers at a German steel mill is only the second known instance of physical harm from a cyberattack. Wired reports.
Personal details of the mobile customers of Moonpig have been exposed to hackers, a developer has claimed.
Passwords could be phased out in favour of major multi-factor components. Greg Day, CTO at Fireeye, says that we should be "building layers" appropriate to the risk we are protecting.
How can individuals protect themselves from being hacked on their smartphone? EJ Hilbert, cyber security analyst at Kroll, and Greg Day, CTO at Fireeye, give their thoughts.
The U.S. government tightened sanctions on North Korea in retaliation for the devastating cyberattacks against Sony.
North Korea has never before demonstrated any advanced hacking capabilities, says Scott Borg of the U.S. Cyber Consequences Unit.
Hacker Jan Krisller demonstrated his ability to replicate a fingerprint using a high-resolution photo at a conference this weekend.
The National Security Agency dropped hundreds of pages worth of surveillance reports just before Christmas Eve.
North Korea's Internet connectivity was interrupted yet again, experts at DYN Research reported, adding to tensions between the nation and the U.S.
DSTRUX is ripping a page from old spy shows by allowing users to destroy sent emails. But is the technology necessary?
Apple has pushed out its first automated security update to Macintosh computers without requiring a Mac user's approval.
Amid the Sony hack scandal, Jon Brod, Confide co-founder, is trying to change the way businesses communicate with his new Confide app.
Not sure what to do with your old iPhone? Well, here's one option.
Brad Hunstable, Ustream founder and CEO, discusses his company's 2012 cyberattack by Russian sympathizers because of content posted on Ustream.
Companies do too little to protect sensitive information once a breach occurs, a cybersecurity company CEO says.
Attorney Matthew George, Girard Gibbs, discusses the basis for three class-action lawsuits filed by former Sony employees who claim the company failed to properly protect data.
Get the best of CNBC in your inbox
Matt Hunter is the senior technology editor at CNBC.com.
Ari Levy is CNBC.com's senior technology reporter in San Francisco.
Harriet Taylor is a CNBC.com technology reporter based in San Francisco. She covers Apple, Uber and the sharing economy, cyber security and emerging Silicon Valley trends.
Working from Los Angeles, Boorstin is CNBC's media and entertainment reporter and editor of CNBC.com's Media Money section.
Jon Fortt is an on-air editor. He covers the companies, start-ups, and trends that are driving innovation in the industry.
Josh Lipton is CNBC's technology correspondent, working from CNBC's Silicon Valley bureau.