With big data breaches becoming more common, experts say it's time to take more steps to protect yourself. Here's what you need to know.» Read More
New malware, including Blackshades, allows hackers to spy on victims through infected webcams. Here's how to protect yourself.
Remote access tools, or RATs, can take over your computer and watch your every move. CNBC's Scott Cohn reports.
CNBC's Scott Cohn reports music service Spotify is launching an investigation into unauthorized access to company systems data.
Despite the global phenomenon of cyberattacks, U.S. entities are overwhelmingly at the receiving end of cyber-thieves, according to a new report.
Target may not know the costs of the data breach until late in the second quarter or early third quarter, interim CEO John Mulligan said.
Credit card information can make hackers money, but non-payment information is also a big target for cybercriminals. CNBC's Josh Lipton provides insight to Trustwave's Annual Global Security Report on data breaches.
So-called malvertising is a new threat worrying some lawmakers. These are ads with malware that can infect your computer without a single click.
Ads with malicious code embedded, known as "malvertising," can breach your computer without you even clicking on a link. CNBC's Scott Cohn reports.
CNBC's Scott Cohn reports the five defendants in the case which the U.S. alleges cyberspying, were all part of The People's Liberation Army, allegedly the most prolific hacking operation of the Chinese military.
The U.S. filed criminal charges against several Chinese officials, accusing them of stealing American trade secrets through cyber espionage.
China's foreign ministry says the allegations of cyber-espionage are made up, reports CNBC's Scott Cohn.
Data breaches can threaten executives' jobs, even those of bosses not formally charged with data security. Here's what all managers need to know.
Each company data breach costs $3.5 million on average. For corporates executives the consequences can be even more dire, potentially costing them their jobs. Yet,experts tell CNBC you'd be surprised at what the boss doesn't know. CNBC's Scott Cohn reports.
As artists release summer concert schedules, fraudsters are luring consumers into buying fake tickets. Here's how to protect yourself.
Now that Andrew Auernheimer, hacker nickname "weev" is out of jail, he is starting a hedge fund based on using hacking skills to see what companies have vulnerabilities. CNBC's Scott Cohn reports.
Think your new smartphone is safe from cyberattacks? Think again. Many Android phones are vulnerable, as updates are not widely prevalent.
Infamous computer hacker Andrew Auernheimer is opening a hedge fund that will short companies vulnerable to security breaches.
Buyer beware! Up to 70% of Android smartphones may be vulnerable to hackers. CNBC's Scott Cohn reports.
If you’ve filed tax returns and think everything is OK, guess again. Phone and email scams try to nab your data by impersonating the IRS.
Tax scammers have no deadline, and the Heartbleed vulnerability threatens websites. CNBC's Scott Cohn reports.
By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.
China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.
US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.
Alibaba traded as high as $99.70 in its debut, a gain of nearly 50% above its IPO price, before paring gains.
Apple's iPhone 6 Plus uses chips from Qualcomm, Skyworks Solutions and other companies, said gadget repair firm iFixit.
People turned out in record numbers to buy the iPhone 6, which CEO Tim Cook called "the biggest advancement in the history of iPhone."
In conventional terms, front running is something that happens within a firm. That definition has changed recently.
You don't have to be Edward Snowden to hide your email from the NSA. Here is a basic primer on email encryption.
Cloud computing means being able to access the Internet anywhere, anytime and being able to use any and all of the data and applications you want.