GO
Loading...

Enter multiple symbols separated by commas

Hacking America

More

  • "Spearphishing" is an approach that tricks a targeted individual to reveal information that can be used to infiltrate the company or government agency that person works for.

  • Is Washington to Blame for Chinese Cyberterrorism? Wednesday, 27 Feb 2013 | 11:51 AM ET

    Reports linking the Chinese military to scores of hacking attacks on US businesses was deeply troubling and completely unsurprising if we judge by Washington's reaction to the news.

  • Cyber-Attacks: More Public Awareness and More US Gov. Direction Needed

    CNBC's Eamon Javers interviews Mike Brown, a retired Rear Admiral in the U.S. Navy, and the current General Manager of RSA's Federal Business. Brown explains that the sequester will hurt U.S. cyber security and affect the private sector. He also believes that greater awareness of cyber-attacks is needed.

  • Cyber-Attacks Can Affect Stock Prices and Investors Wednesday, 27 Feb 2013 | 12:00 AM ET
    Cyber-Attacks Can Affect Stock Prices and Investors

    Ken Silva, the President of ManTech Cyber Solutions International tells CNBC¿s Eamon Javers how stock prices can be influenced by cyber-attacks and that investors care about companies' responses to online criminals.

  • Cyber Security: Sequestration and How McAfee Protects Against Malware

    CNBC's Eamon Javers interviews Pat Calhoun, McAfee's senior vp and general manager of network security on how the sequestration will affect cyber security in the U.S., and how McAfee is defending against malware threats.

  • Cybersecurity: How CEOs Are Fighting Back Tuesday, 26 Feb 2013 | 10:48 AM ET

    Our nation’s attention to cybersecurity risks has reached a new level, reflecting the rising threats to America’s national and economic security.

  • Online Pirates to Get Six Strikes Under New System Tuesday, 26 Feb 2013 | 9:32 AM ET

    Internet users who illegally share music, movies or television shows online could soon receive warning notices from the nation's major Internet service providers.

  • A New Cyber Cold War Tests US Ties to China Monday, 25 Feb 2013 | 1:18 PM ET

    An omission by the Obama administration last week underscored the U.S.'s heightened sensitivities over how directly to confront China's new leadership over hacking.

  • Why Companies Keep Quiet About Cyberattacks Monday, 25 Feb 2013 | 11:29 AM ET

    Cyberattacks are happening and are a serious threat, but companies may not want to reveal them for fears of liability and brand damage.

  • HP's Whitman on Cyber Security: It's an Arms Race Monday, 25 Feb 2013 | 6:00 AM ET
    HP's Whitman on Cyber Security: It's an Arms Race

    Hewlett-Packard CEO Meg Whitman talks about increasingly sophisticated cyber-attacks and what corporate America is doing to combat this new age espionage.

  • Hackers Have Heavy-Duty Week Friday, 22 Feb 2013 | 5:27 PM ET

    You know hacking has hit the mainstream when even the biggest names in tech are hit, and when it becomes an Internet meme. And that's exactly what happened over the past week.

  • Electricity electric grid

    The Cybersecurity Executive Order is another good step for government-industry coordination, says the chief exec of one utility organization, but more still needs to be done to protect the nation's power grid.

  • Protecting Your Investments From Cyberterrorists Friday, 22 Feb 2013 | 10:32 AM ET

    Should investors be extremely concerned about the widespread theft of information from corporate networks?

  • The White House is taking a cue from Silicon Valley and adopting what Mark Zuckerberg calls the "hacker way."

  • Big Data, Big Business Thursday, 21 Feb 2013 | 12:00 AM ET

    Small businesses are driving the evolution of the cyber security space, with Francis Desouza, Symantec; James Reese, TigerSwan CEO; and CNBC's Eamon Javers.

  • Apple Releases Security Fix for Malware Attack Wednesday, 20 Feb 2013 | 11:32 AM ET

    Apple released a security update after a small number of Macs were infected by malware.

  • US Is Developing Aggressive Penalties for Cybertheft Wednesday, 20 Feb 2013 | 8:20 AM ET

    Evidence of cyberstealing linked to the Chinese government is prompting the Obama administration to develop more aggressive responses to the theft of U.S. government data and corporate trade secrets.

  • China to US on Hacking: You've Got No Proof Wednesday, 20 Feb 2013 | 7:16 AM ET

    Accusations by a U.S. computer security company that a secretive Chinese military unit is likely behind a series of hacking attacks are scientifically flawed and hence unreliable, China said on Wednesday.

  • Hackers Doing No Favors for China's Image Wednesday, 20 Feb 2013 | 1:47 AM ET

    The recent hacking allegations against China puts another negative mark on the country's image as new leader Xi Jinping has repeatedly vowed to fight corruption.

  • Jeep Becomes Latest Victim of Twitter Hack Attack Tuesday, 19 Feb 2013 | 4:08 PM ET

    Yet another major Twitter account has been hacked, raising major concerns about the rising hacker threat and privacy protection.

 

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained