GO
Loading...

Enter multiple symbols separated by commas

Hacking America

More

  • Looking for love? Just avoid these dating scams Friday, 13 Feb 2015 | 7:00 AM ET
    Woman with mobile phone

    The use of mobile dating apps is exploding, but experts say security is lagging. Here's how consumers can protect themselves against fraudsters.

  • Meet the NSA’s hacker recruiter Wednesday, 1 Oct 2014 | 11:06 AM ET
    National Security Agency headquarters, Fort Meade, Maryland

    Meet the man leading the NSA's recruiting efforts through a program targeting students as young as eighth grade.

  • Inside a cybersecurity start-up Wednesday, 1 Oct 2014 | 11:08 AM ET

    A look inside cybersecurity start-up Tinfoil provides a peek into the current gold rush behind the hacking economy.

  • How to tap the braintrust on cybersecurity Wednesday, 1 Oct 2014 | 11:07 AM ET
    Defcon conference

    Jeff Moss, the hacker community's best-known security impresario, shares his insights as founder of the hacker convention Defcon.

  • Worried about your password? Change it ... now! Wednesday, 6 Aug 2014 | 2:26 PM ET
    Hacking hacker cyber security

    With big data breaches becoming more common, experts say it's time to take more steps to protect yourself. Here's what you need to know.

  • Cybercriminals stealing your money Friday, 6 Jun 2014 | 1:20 PM ET
    Cybercriminals stealing your money

    Cyber criminals can now steal your money and hold your files hostage using sophisticated software known as Gameover Zeus and Cryptolocker. CNBC's Scott Cohn reports.

  • Is Big Brother really watching you? Tuesday, 3 Jun 2014 | 9:08 AM ET
    Edward Snowden

    NSA whistleblower Edward Snowden says the government can spy on you, but experts say hackers seeking your financial data is still a bigger threat.

  • Is the NSA spying on your cellphone and keystrokes? Friday, 30 May 2014 | 6:00 PM ET
    Is the NSA spying on your cellphone and keystrokes?

    Edward Snowden told NBC News intelligence agencies have sophisticated real-time cyberspying techniques. But, how accurate are his claims? CNBC's Scott Cohn reports.

  • Hackers are watching you on infected webcams Saturday, 24 May 2014 | 12:00 PM ET
    Cyber crime hacker

    New malware, including Blackshades, allows hackers to spy on victims through infected webcams. Here's how to protect yourself.

  • Easy-to-use cyberspying malware Friday, 23 May 2014 | 3:41 PM ET
    Easy-to-use cyberspying malware

    Remote access tools, or RATs, can take over your computer and watch your every move. CNBC's Scott Cohn reports.

  • Spotify investigating hack: Report Tuesday, 27 May 2014 | 10:58 AM ET
    Spotify investigating hack: Report

    CNBC's Scott Cohn reports music service Spotify is launching an investigation into unauthorized access to company systems data.

  • Data breach! US tops list of victims, study shows Wednesday, 21 May 2014 | 3:31 PM ET

    Despite the global phenomenon of cyberattacks, U.S. entities are overwhelmingly at the receiving end of cyber-thieves, according to a new report.

  • Data breach costs still unknown: Target CEO Wednesday, 21 May 2014 | 3:00 PM ET
    Target's John Mulligan

    Target may not know the costs of the data breach until late in the second quarter or early third quarter, interim CEO John Mulligan said.

  • What types of data are cybercriminals after? Wednesday, 21 May 2014 | 2:24 PM ET
    Types of data targeted

    Credit card information can make hackers money, but non-payment information is also a big target for cybercriminals. CNBC's Josh Lipton provides insight to Trustwave's Annual Global Security Report on data breaches.

  • New cyberthreat to consumers: Malvertisements Tuesday, 20 May 2014 | 11:55 AM ET

    So-called malvertising is a new threat worrying some lawmakers. These are ads with malware that can infect your computer without a single click.

  • Can an ad hack your computer? Monday, 19 May 2014 | 11:00 AM ET
    Can an ad hack your computer?

    Ads with malicious code embedded, known as "malvertising," can breach your computer without you even clicking on a link. CNBC's Scott Cohn reports.

  • Chinese accused of cyberspying Monday, 19 May 2014 | 1:28 PM ET
    Chinese accused of cyberspying

    CNBC's Scott Cohn reports the five defendants in the case which the U.S. alleges cyberspying, were all part of The People's Liberation Army, allegedly the most prolific hacking operation of the Chinese military.

  • US charges China with cyberspying on American firms Monday, 19 May 2014 | 11:42 AM ET
    Attorney General Eric Holder (2nd L), U.S. Attorney for Western District of Pennsylvania David Hickton (L), and Assistant Attorney General for National Security John Carlin (R) take questions from members of the media during an announcement on indictments against Chinese military hackers on cyber-espionage May 19, 2014 at the Department of Justice in Washington, DC.

    The U.S. filed criminal charges against several Chinese officials, accusing them of stealing American trade secrets through cyber espionage.

  • China says spying allegations 'made up': Reuters Monday, 19 May 2014 | 11:18 AM ET
    China says spying allegations are 'made up': Reuters

    China's foreign ministry says the allegations of cyber-espionage are made up, reports CNBC's Scott Cohn.

  • Painful lessons from Target's massive data breach Sunday, 11 May 2014 | 1:08 PM ET
    A Target customer prepares to sign a credit card slip.

    Data breaches can threaten executives' jobs, even those of bosses not formally charged with data security. Here's what all managers need to know.

 

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

  • Sony headquarters in Tokyo, Japan.

    Sony has launched a crowdfunding site to finance employees' ideas, in a bid to bring back innovation to the Japanese electronics giant.

  • The Uber app on an iPhone in New York.

    Uber targeted its customers to protest outside New York City Council Tuesday as a bill stands to cap for-hire vehicles.

  • National Security Agency building in Fort Meade, Md.

    A court ruled on Monday that the NSA may temporarily resume its once-secret program that collects records of Americans' domestic phone calls.

Technology Explained