GO
Loading...

Hacking America

More

 

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained

  • Pilot at controls of instrument panel

    CNBC explains exactly what the aircraft autopilot is, how it works and how safe it is.

  • A black box from the Germanwings crash in this photo released March 25, 2015 by the BEA, France's Bureau d'Enquetes et d'Analyses (Air Accident Investigator).

    A guide to how aircraft manufacturers equip all their planes so that investigators know what happens in a crash.

  • Watching TV

    Cord-cutting will bring huge changes in TV viewing. Apple already controls our phones. Will it control our TVs too?