Distributed denial of service attacks (DDoS) are a growing threat to businesses, as criminals can be hired by the hour.» Read More
The use of mobile dating apps is exploding, but experts say security is lagging. Here's how consumers can protect themselves against fraudsters.
Meet the man leading the NSA's recruiting efforts through a program targeting students as young as eighth grade.
A look inside cybersecurity start-up Tinfoil provides a peek into the current gold rush behind the hacking economy.
Jeff Moss, the hacker community's best-known security impresario, shares his insights as founder of the hacker convention Defcon.
With big data breaches becoming more common, experts say it's time to take more steps to protect yourself. Here's what you need to know.
Cyber criminals can now steal your money and hold your files hostage using sophisticated software known as Gameover Zeus and Cryptolocker. CNBC's Scott Cohn reports.
NSA whistleblower Edward Snowden says the government can spy on you, but experts say hackers seeking your financial data is still a bigger threat.
Edward Snowden told NBC News intelligence agencies have sophisticated real-time cyberspying techniques. But, how accurate are his claims? CNBC's Scott Cohn reports.
New malware, including Blackshades, allows hackers to spy on victims through infected webcams. Here's how to protect yourself.
Remote access tools, or RATs, can take over your computer and watch your every move. CNBC's Scott Cohn reports.
CNBC's Scott Cohn reports music service Spotify is launching an investigation into unauthorized access to company systems data.
Despite the global phenomenon of cyberattacks, U.S. entities are overwhelmingly at the receiving end of cyber-thieves, according to a new report.
Target may not know the costs of the data breach until late in the second quarter or early third quarter, interim CEO John Mulligan said.
Credit card information can make hackers money, but non-payment information is also a big target for cybercriminals. CNBC's Josh Lipton provides insight to Trustwave's Annual Global Security Report on data breaches.
So-called malvertising is a new threat worrying some lawmakers. These are ads with malware that can infect your computer without a single click.
Ads with malicious code embedded, known as "malvertising," can breach your computer without you even clicking on a link. CNBC's Scott Cohn reports.
CNBC's Scott Cohn reports the five defendants in the case which the U.S. alleges cyberspying, were all part of The People's Liberation Army, allegedly the most prolific hacking operation of the Chinese military.
The U.S. filed criminal charges against several Chinese officials, accusing them of stealing American trade secrets through cyber espionage.
China's foreign ministry says the allegations of cyber-espionage are made up, reports CNBC's Scott Cohn.
Data breaches can threaten executives' jobs, even those of bosses not formally charged with data security. Here's what all managers need to know.
By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.
China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.
US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.
Fully updated iPhones have been permanently bricked after undergoing unauthorized repairs.
Google is working on a virtual reality headset to better compete with the likes of Facebook's Oculus Rift, according to an FT report.
Twitter users went into meltdown over weekend, using the hashtag #RIPTwitter to vent their fury at reports of changes to the service.
Virtual reality start-ups are raising billions, and consumer headsets are hitting the market. VR's promise is for real.
Google has patented a way for its driverless cars to communicate with pedestrians and others on the road.
The technological efficiency of terrorist organizations is on the rise, with many popular apps being co-opted by ISIS.