GO
Loading...

Hacking America

More

 

  • Scott Cohn develops in-depth features, special reports and documentaries for CNBC and CNBC.com.

  • “Squawk on the Street” Co-Anchor

  • CNBC Washington Reporter

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

  • People entering an Apple store in New York

    Apple easily beat Wall Street forecasts, and its sales outlook for the current quarter came in ahead of expectations.

  • Not all is rosy in the land of Apple. Despite a stellar Q4 and impressive iPhones sales, the company still struggles to sell iPads.

  • Jim Cramer discusses Apple and IBM, two polar opposite companies, to find out where IBM went wrong and why Apple is the leader of the techie pack.

Technology Explained

  • In conventional terms, front running is something that happens within a firm. That definition has changed recently.

  • You don't have to be Edward Snowden to hide your email from the NSA. Here is a basic primer on email encryption.

  • Cloud computing means being able to access the Internet anywhere, anytime and being able to use any and all of the data and applications you want.