GO
Loading...

Hacking America

More

  • Chinese Hacked Obama, McCain Campaigns   Friday, 7 Jun 2013 | 4:00 PM ET
    Chinese Hacked Obama, McCain Campaigns

    Cyberattacks linked to the Chinese government will be at the top of the U.S. agenda when President Obama meets with Chinese president Xi Jinping Friday in California. Chinese officials deny any role in the cyberattacks, but U.S. experts say the 2008 attack was a "wake up call." NBC's Michael Isikoff reports. Officials say Chinese hackers took internal documents from the Obama and McCain campaigns.

  • US Pressures China -- Wants Hacker Crackdown   Friday, 7 Jun 2013 | 12:00 AM ET
    US Pressures China -- Wants Hacker Crackdown

    CNBC's Scott Cohn reports on increasing pressure from the U.S. on China's cyberespionage efforts, Microsoft's Botnet bust and recent increase in spamming for profit.

  • The Thrill of the Hack, Prosecuting Cybercrime   Wednesday, 5 Jun 2013 | 1:51 PM ET
    The Thrill of the Hack: Prosecuting Cybercrime

    A convicted felon says the government's heavy-duty crackdown on hacking may be going too far and hurting innovation, reports CNBC's Scott Cohn.

  • Companies Battle Cyberattacks Using 'Hack Back' Tuesday, 4 Jun 2013 | 1:00 PM ET

    Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of businesses are taking retaliatory action.

  • Hacker Claims Airplanes Vulnerable at 30,000 Feet Monday, 3 Jun 2013 | 1:05 PM ET
    Inside Denver's TRACON or Terminal Radar Approach Control center at DIA.

    It's frightening to imagine that suddenly your pilot is flying blind or taking evasive action to avoid another plane. A hacker says he has proof that the air traffic control system can be hacked.

  • Iran Threat Called 'Hostile'   Friday, 31 May 2013 | 12:00 PM ET
    Cyberthreat Weekly Recap: Week of May 31

    China has reportedly obtained critical defense secrets and Iran has reportedly poised a serious threat to U.S. oil, gas and electric companies. CNBC's Eamon Javers reports.

  • "Hacking Is Here to Stay"   Friday, 24 May 2013 | 3:26 PM ET
    Cyberthreat Weekly Recap: Week of May 24

    A new report found that intellectual property theft, much of which is done in cyber space, costs the US $300 billion and 2.1 jobs a year. Scott Cohn reports.

  • FBI's New Attack Plan   Friday, 17 May 2013 | 12:00 PM ET
    Cyberthreat Weekly Recap: Week of May 17

    The FBI has a new plan to battle Internet crime, it begins with opening up its secret files to corporate America.

  • Cyberthreat Weekly Recap: Week of May 10   Friday, 10 May 2013 | 12:00 PM ET
    Cyberthreat Weekly Recap: Week of May 10

    The largest bank heist in US history was announced this week. CNBC's Scott Cohn reports that the accused cyber criminals targeted banks and third party credit card processors. Also, the Pentagon, in its annual report on China, directly blamed China¿s government and military for attacks on the US.

  • On the Front Lines: Protecting Secrets   Tuesday, 7 May 2013 | 12:00 AM ET
    Cyberthreat Weekly Recap: Week of May 3

    CNBC's Eamon Javers talks with David Fastabend, Advanced Information Systems, about security precautions companies should implement now to protect themselves from cyberattacks.

  • Hackers On Overdrive: Is No One Safe?   Friday, 3 May 2013 | 11:00 AM ET
    Cyberthreat Weekly Recap: Week of May 3

    CNBC's Scott Cohn reports hackers have been working overtime, breaching Reputation.com, Living Social and the Twitter account of the Guardian in the UK. Even the Army Corps of Engineers National Inventory of Dams and the Department of Labor were compromised.

  • Verizon Warns Businesses About CyberThreats   Friday, 26 Apr 2013 | 11:30 AM ET
    Verizon Warns Businesses About CyberThreats

    Verizon's Wade Baker talks about the company's Annual Data Breach Investigation. With CNBC's Scott Cohn.

  • The Hack Felt Around the World   Friday, 26 Apr 2013 | 11:30 AM ET

    A hacking of the AP's Twitter account sends the markets plunging. CNBC's Scott Cohn has the details.

  • Markets Sink Briefly on Fake AP Terror Tweet Tuesday, 23 Apr 2013 | 8:01 PM ET

    A news agency tweet, that turned out to be fake about explosions at the White House injuring President Obama, sent markets on a round trip roller coaster ride.

  • CyberThreat Recap: April 1-19   Friday, 19 Apr 2013 | 12:00 PM ET
    CyberThreat Recap: April 1-19

    CNBC's Brian Sullivan reports on the recent controversial cyberlegislation that passed the U.S. House this week.

  • Privacy vs. Cybersecurity: The Debate Heats Up Wednesday, 10 Apr 2013 | 5:27 PM ET

    On Wednesday, the House Intelligence Committee held closed door meetings about the controversial cybersecurity bill that is scheduled to hit the House floor next week.

  • Cyber Threats Escalate as Banks Go Paperless Wednesday, 10 Apr 2013 | 9:21 AM ET

    Websites for five U.S. banks have been struck in the last month, with 13 targeted. With the rising threat of a hack, is your money safe?

  • Cyber Terrorism and the Innovation Gap Monday, 8 Apr 2013 | 1:40 PM ET

    Existing security models and defensive technologies have not kept pace with the innovation of the attackers and the return on investment from traditional firewalls and anti-virus is rapidly decreasing.

  • Cyberthreat Weekly Recap: Week of March 29   Thursday, 28 Mar 2013 | 2:00 PM ET
    Cyberthreat Weekly Recap: Week of March 29

    The "worst Internet attack ever" slowed down millions of computers worldwide.

  • Luring Young Web Warriors Is a Priority--and a Game Monday, 25 Mar 2013 | 11:06 AM ET

    Secretary of Homeland Security, Janet Napolitano, is looking for her own hackers — 600, the agency estimates.

 

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained

  • Pilot at controls of instrument panel

    CNBC explains exactly what the aircraft autopilot is, how it works and how safe it is.

  • A black box from the Germanwings crash in this photo released March 25, 2015 by the BEA, France's Bureau d'Enquetes et d'Analyses (Air Accident Investigator).

    A guide to how aircraft manufacturers equip all their planes so that investigators know what happens in a crash.

  • Watching TV

    Cord-cutting will bring huge changes in TV viewing. Apple already controls our phones. Will it control our TVs too?