Meet the man leading the NSA's recruiting efforts through a program targeting students as young as eighth grade.» Read More
Our nation’s attention to cybersecurity risks has reached a new level, reflecting the rising threats to America’s national and economic security.
Internet users who illegally share music, movies or television shows online could soon receive warning notices from the nation's major Internet service providers.
An omission by the Obama administration last week underscored the U.S.'s heightened sensitivities over how directly to confront China's new leadership over hacking.
Cyberattacks are happening and are a serious threat, but companies may not want to reveal them for fears of liability and brand damage.
Hewlett-Packard CEO Meg Whitman talks about increasingly sophisticated cyber-attacks and what corporate America is doing to combat this new age espionage.
You know hacking has hit the mainstream when even the biggest names in tech are hit, and when it becomes an Internet meme. And that's exactly what happened over the past week.
The Cybersecurity Executive Order is another good step for government-industry coordination, says the chief exec of one utility organization, but more still needs to be done to protect the nation's power grid.
Should investors be extremely concerned about the widespread theft of information from corporate networks?
The White House is taking a cue from Silicon Valley and adopting what Mark Zuckerberg calls the "hacker way."
Small businesses are driving the evolution of the cyber security space, with Francis Desouza, Symantec; James Reese, TigerSwan CEO; and CNBC's Eamon Javers.
Apple released a security update after a small number of Macs were infected by malware.
Evidence of cyberstealing linked to the Chinese government is prompting the Obama administration to develop more aggressive responses to the theft of U.S. government data and corporate trade secrets.
Accusations by a U.S. computer security company that a secretive Chinese military unit is likely behind a series of hacking attacks are scientifically flawed and hence unreliable, China said on Wednesday.
The recent hacking allegations against China puts another negative mark on the country's image as new leader Xi Jinping has repeatedly vowed to fight corruption.
Yet another major Twitter account has been hacked, raising major concerns about the rising hacker threat and privacy protection.
It's highly unlikely that the Chinese government was not at least aware of the cyber attacks that targeted U.S. companies, organizations and government entities, one security expert said.
Hackers breached the Twitter account of fast-food chain Burger King, posting the online equivalent of graffiti and sometimes making little sense.
Facebook says that it was hacked last month in what it called "a sophisticated attack." But it says no user data was compromised.
The majority of Americans fear the U.S. will become the the victim of a major cyber attack, or target another country with cyber weapons, according to a recent survey.
Just because you're a small-business owner doesn't make you immune to security issues. Here are five tips for protecting your company.
By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.
China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.
US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.
Apple easily beat Wall Street forecasts, and its sales outlook for the current quarter came in ahead of expectations.
Not all is rosy in the land of Apple. Despite a stellar Q4 and impressive iPhones sales, the company still struggles to sell iPads.
Jim Cramer discusses Apple and IBM, two polar opposite companies, to find out where IBM went wrong and why Apple is the leader of the techie pack.
In conventional terms, front running is something that happens within a firm. That definition has changed recently.
You don't have to be Edward Snowden to hide your email from the NSA. Here is a basic primer on email encryption.
Cloud computing means being able to access the Internet anywhere, anytime and being able to use any and all of the data and applications you want.