With big data breaches becoming more common, experts say it's time to take more steps to protect yourself. Here's what you need to know.» Read More
The threat of a cyber-attack tops the threat of losing money as the primary risk business executives worry about, according to a new survey sponsored by insurance giant AIG.
The Energy Department was hit by an online attack last month that compromised the personal data of several hundred employees.
Twitter and the Washington Post are the latest media companies to reveal that they too were victims of cyber attacks.
A recently discovered new form of Android malware cannot only infect your smartphone, but also target your PC to spy on you.
Symantec begs to differ with The New York Times' suggestion that it might be partially to blame for a security lapse that missed most of the intrusions from China.
Disastrous cyber-war attacks that could be life threatening are not far off if the government and businesses do not take action soon.
For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees. The New York Times reports.
Millions of network-connected devices are vulnerable to a new hack.
The U.S. Department of Homeland Security urged computer users on Tuesday to disable a common networking technology feature after it was discovered million are at risk.
The spy campaign targeted a range of government and diplomatic organizations, mostly in Eastern Europe and Central Asia.
The antivirus industry has a dirty little secret: its products are often not very good at stopping viruses
As more people use their mobile devices to access their bank accounts cyber attacks are on the upswing, McAfee's Michelle Dennedy told CNBC.
Major U.S. banks seem to have stopped a group of hacker activists from seriously disrupting their online banking operations.
A little-known Internet start-up that serves some of the Web's most controversial characters sees a business opportunity in cyberwars.
While wireless and mobile technology is liberating much of our lives, it comes with high risks.
Secret information on counter-terrorism shared by foreign governments may have been compromised by a massive data theft.
Without action, the US will face a major cyber attack, says a former US spy.
A top Federal Reserve official warned on Tuesday of potential risks to financial stability from cyberattacks on the U.S. payments system and from a looming funding gap in public pensions.
Here's how cybergangs are targeting online holiday shoppers, and here's what you can do to protect yourself.
The new technique will first be used in national security communications, but ultimately will help protect all information transmitted on the Internet.
By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.
China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.
US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.
Lost in the chatter about the tech bubble is an important detail: Most of technology's most notable names aren't participating.
The splashy IPO of Chinese e-commerce site Alibaba should scare Amazon.com for one reason: taxes. USA Today reports.
Sidecar recently secured $15 million in funding, as it competes with Uber and Lyft in the growing ridesharing space.
In conventional terms, front running is something that happens within a firm. That definition has changed recently.
You don't have to be Edward Snowden to hide your email from the NSA. Here is a basic primer on email encryption.
Cloud computing means being able to access the Internet anywhere, anytime and being able to use any and all of the data and applications you want.