GO
Loading...

Enter multiple symbols separated by commas

Hacking America

More

 

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

  • Tech a future job killer?

    Looking to the future, Matt Barrie, Freelancer.com CEO, Cynthia Breazeal, JIBO founder; and Eric Horvitz, Microsoft Research, discuss the impact technology will have in the workforce.

  • Audience members watch a movie through 3D glasse at an IMAX theatre in Wuhan of Hubei Province, China.

    U.S. tech firms have been encountering growing hurdles in China. Here's what Jim Oberweis would avoid and what he would buy.

  • Hewlett-Packard

    HP reported strong notebooks sales in its fiscal second quarter, adding that its planned split into two companies is on track.

Technology Explained