GO
Loading...

Hacking America

More

  • Your new Android phone could be hacked  Friday, 25 Apr 2014 | 4:00 PM ET

    Buyer beware! Up to 70% of Android smartphones may be vulnerable to hackers. CNBC's Scott Cohn reports.

  • IRS impersonators target tax filers after April 15 Friday, 18 Apr 2014 | 12:00 PM ET

    If you’ve filed tax returns and think everything is OK, guess again. Phone and email scams try to nab your data by impersonating the IRS.

  • Watch out! Tax scammers, the Heartbleed vulnerability  Thursday, 17 Apr 2014 | 6:30 PM ET

    Tax scammers have no deadline, and the Heartbleed vulnerability threatens websites. CNBC's Scott Cohn reports.

  • Cybercriminals’ new target? Medical records Monday, 31 Mar 2014 | 1:13 PM ET

    Millions of Americans have had their medical records breached since 2009 and the problem is growing. Some warning signs your data have been compromised.

  • The new target for cybercriminals: Medical records  Friday, 28 Mar 2014 | 1:30 PM ET

    Medical identity theft is a growing problem with 50 million data breaches each year. Also this week, Target is once again facing heat from Congress for its payment processing breach. CNBC's Scott Cohn and Sheila Dharmarajan report.

  • Filing taxes online? How to protect yourself Sunday, 16 Mar 2014 | 1:00 PM ET

    As millions of Americans file their taxes online, cybercriminals are ready to pounce. Here's how to protect yourself online.

  • Prevent cybercriminals from filing your taxes  Friday, 14 Mar 2014 | 4:00 PM ET

    As millions of Americans move to file their taxes online, cybercriminals are ready to pounce. CNBC's Eamon Javers reports on how you can prevent a tax fraud.

  • Dangerous website attacks—and how to avoid them Saturday, 8 Mar 2014 | 9:00 AM ET

    With identity theft rising, here's a look at some of the most dangerous kinds of attacks on websites. Plus, how to protect yourself online.

  • The most devastating website attacks  Friday, 7 Mar 2014 | 12:00 PM ET

    How safe is your personal information online? CNBC's Eamon Javers reports on the top three website attacks that could lead to your identity being stolen.

  • How cybersecurity pros really feel about hackers Tuesday, 4 Mar 2014 | 7:00 AM ET
    Edward Snowden

    Even as cybersecurity professionals try to fight cybercrime, they can't help but admire hackers' intelligence.

  • What do the brightest think about those on the other side of the cyberwar? CNBC's Eamon Javers reports from the RSA Security Conference in San Francisco.

  • 360 million newly stolen credentials for sale Wednesday, 26 Feb 2014 | 10:47 AM ET

    A cybersecurity firm said it uncovered stolen credentials from some 360 million accounts that are available for sale on cyber black markets.

  • New cyberattack could threaten U.S. markets  Wednesday, 26 Feb 2014 | 3:00 PM ET

    CNBC's Eamon Javers talks with House Intelligence Committee Chairman Mike Rogers about how hackers have tried to exploit any weakness in financial markets' computer networks.

  • 'Dark web' selling stolen data  Wednesday, 26 Feb 2014 | 3:12 PM ET

    In the wake of a cybersecurity firm reporting 360 million stolen credit cards are being sold on the black market, CNBC's Eamon Javers details the "dark web," the network for cybercrime. Javers also comments on the NSA privacy debate taking place within the industry.

  • Top cybersecurity plays  Wednesday, 26 Feb 2014 | 10:37 AM ET

    CNBC's Eamon Javers takes a look at the most innovative and valuable companies in the cybersecurity space.

  • Cybersecurity industry at war with itself Wednesday, 26 Feb 2014 | 1:43 PM ET
    Edward Snowden poses for a photo during an interview in an undisclosed location in December 2013 in Moscow.

    A San Francisco gathering of cybersecurity professionals is underscoring the divide in their community over the NSA. A look at the turmoil.

  • How cyberthieves are targeting online dating sites Saturday, 22 Feb 2014 | 1:00 PM ET

    As more users turn to online dating platforms to find love, they need to be cautious. Here are three cyber security traps to avoid.

  • Looking for love online? Cupid may be a hacker...  Friday, 21 Feb 2014 | 3:00 PM ET

    Hackers are turning to online dating to cash in on the search for that special someone. CNBC's Eamon Javers reports.

  • VA data breach 'practically unavoidable,' memo says Thursday, 20 Feb 2014 | 10:56 AM ET
    Pedestrians walk past the U.S. Department of Veterans Affairs (VA) headquarters in Washington, D.C.

    Online privacy of veterans and VA employees—including their health-care and financial data—is in danger, according to an internal draft report obtained by CNBC.

  • Bad business: Dumb mistakes made in cyberspace Tuesday, 18 Feb 2014 | 4:51 PM ET

    Even after the recent spate of staggering breaches, companies haven't learned all their lessons on securing sensitive data.

 

  • Scott Cohn develops in-depth features, special reports and documentaries for CNBC and CNBC.com.

  • “Squawk on the Street” Co-Anchor

  • CNBC Washington Reporter

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained