Hacking America


  • How to tap the braintrust on cybersecurity Wednesday, 1 Oct 2014 | 11:07 AM ET
    Defcon conference

    Jeff Moss, the hacker community's best-known security impresario, shares his insights as founder of the hacker convention Defcon.

  • Worried about your password? Change it ... now! Wednesday, 6 Aug 2014 | 2:26 PM ET

    With big data breaches becoming more common, experts say it's time to take more steps to protect yourself. Here's what you need to know.

  • Cybercriminals stealing your money   Friday, 6 Jun 2014 | 1:20 PM ET
    Cybercriminals stealing your money

    Cyber criminals can now steal your money and hold your files hostage using sophisticated software known as Gameover Zeus and Cryptolocker. CNBC's Scott Cohn reports.

  • Is Big Brother really watching you? Tuesday, 3 Jun 2014 | 9:08 AM ET
    Edward Snowden

    NSA whistleblower Edward Snowden says the government can spy on you, but experts say hackers seeking your financial data is still a bigger threat.

  • Is the NSA spying on your cellphone and keystrokes?

    Edward Snowden told NBC News intelligence agencies have sophisticated real-time cyberspying techniques. But, how accurate are his claims? CNBC's Scott Cohn reports.

  • Hackers are watching you on infected webcams Saturday, 24 May 2014 | 12:00 PM ET
    Cyber crime hacker

    New malware, including Blackshades, allows hackers to spy on victims through infected webcams. Here's how to protect yourself.

  • Easy-to-use cyberspying malware   Friday, 23 May 2014 | 3:41 PM ET
    Easy-to-use cyberspying malware

    Remote access tools, or RATs, can take over your computer and watch your every move. CNBC's Scott Cohn reports.

  • Spotify investigating hack: Report   Tuesday, 27 May 2014 | 10:58 AM ET
    Spotify investigating hack: Report

    CNBC's Scott Cohn reports music service Spotify is launching an investigation into unauthorized access to company systems data.

  • Data breach! US tops list of victims, study shows Wednesday, 21 May 2014 | 3:31 PM ET

    Despite the global phenomenon of cyberattacks, U.S. entities are overwhelmingly at the receiving end of cyber-thieves, according to a new report.

  • Data breach costs still unknown: Target CEO Wednesday, 21 May 2014 | 3:00 PM ET
    Target's John Mulligan

    Target may not know the costs of the data breach until late in the second quarter or early third quarter, interim CEO John Mulligan said.

  • What types of data are cybercriminals after?   Wednesday, 21 May 2014 | 2:24 PM ET
    Types of data targeted

    Credit card information can make hackers money, but non-payment information is also a big target for cybercriminals. CNBC's Josh Lipton provides insight to Trustwave's Annual Global Security Report on data breaches.

  • New cyberthreat to consumers: Malvertisements Tuesday, 20 May 2014 | 11:55 AM ET

    So-called malvertising is a new threat worrying some lawmakers. These are ads with malware that can infect your computer without a single click.

  • Can an ad hack your computer?   Monday, 19 May 2014 | 11:00 AM ET
    Can an ad hack your computer?

    Ads with malicious code embedded, known as "malvertising," can breach your computer without you even clicking on a link. CNBC's Scott Cohn reports.

  • Chinese accused of cyberspying   Monday, 19 May 2014 | 1:28 PM ET
    Chinese accused of cyberspying

    CNBC's Scott Cohn reports the five defendants in the case which the U.S. alleges cyberspying, were all part of The People's Liberation Army, allegedly the most prolific hacking operation of the Chinese military.

  • US charges China with cyberspying on American firms Monday, 19 May 2014 | 11:42 AM ET
    Attorney General Eric Holder (2nd L), U.S. Attorney for Western District of Pennsylvania David Hickton (L), and Assistant Attorney General for National Security John Carlin (R) take questions from members of the media during an announcement on indictments against Chinese military hackers on cyber-espionage May 19, 2014 at the Department of Justice in Washington, DC.

    The U.S. filed criminal charges against several Chinese officials, accusing them of stealing American trade secrets through cyber espionage.

  • China says spying allegations 'made up': Reuters   Monday, 19 May 2014 | 11:18 AM ET
    China says spying allegations are 'made up': Reuters

    China's foreign ministry says the allegations of cyber-espionage are made up, reports CNBC's Scott Cohn.

  • Painful lessons from Target's massive data breach Sunday, 11 May 2014 | 1:08 PM ET
    A Target customer prepares to sign a credit card slip.

    Data breaches can threaten executives' jobs, even those of bosses not formally charged with data security. Here's what all managers need to know.

  • What bosses don't know about cybersecurity   Friday, 9 May 2014 | 2:00 PM ET
    What bosses don't know about cybersecurity

    Each company data breach costs $3.5 million on average. For corporates executives the consequences can be even more dire, potentially costing them their jobs. Yet,experts tell CNBC you'd be surprised at what the boss doesn't know. CNBC's Scott Cohn reports.

  • Making summer concert plans? Don't get scammed Saturday, 3 May 2014 | 6:00 AM ET

    As artists release summer concert schedules, fraudsters are luring consumers into buying fake tickets. Here's how to protect yourself.

  • Would you invest in a hacker's hedge fund?   Friday, 2 May 2014 | 1:35 PM ET
    Would you invest in a hacker's hedge fund?

    Now that Andrew Auernheimer, hacker nickname "weev" is out of jail, he is starting a hedge fund based on using hacking skills to see what companies have vulnerabilities. CNBC's Scott Cohn reports.


Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.


Technology Explained

  • Pilot at controls of instrument panel

    CNBC explains exactly what the aircraft autopilot is, how it works and how safe it is.

  • A black box from the Germanwings crash in this photo released March 25, 2015 by the BEA, France's Bureau d'Enquetes et d'Analyses (Air Accident Investigator).

    A guide to how aircraft manufacturers equip all their planes so that investigators know what happens in a crash.

  • Watching TV

    Cord-cutting will bring huge changes in TV viewing. Apple already controls our phones. Will it control our TVs too?