Meet the man leading the NSA's recruiting efforts through a program targeting students as young as eighth grade.» Read More
Cyber criminals can now steal your money and hold your files hostage using sophisticated software known as Gameover Zeus and Cryptolocker. CNBC's Scott Cohn reports.
NSA whistleblower Edward Snowden says the government can spy on you, but experts say hackers seeking your financial data is still a bigger threat.
Edward Snowden told NBC News intelligence agencies have sophisticated real-time cyberspying techniques. But, how accurate are his claims? CNBC's Scott Cohn reports.
New malware, including Blackshades, allows hackers to spy on victims through infected webcams. Here's how to protect yourself.
Remote access tools, or RATs, can take over your computer and watch your every move. CNBC's Scott Cohn reports.
CNBC's Scott Cohn reports music service Spotify is launching an investigation into unauthorized access to company systems data.
Despite the global phenomenon of cyberattacks, U.S. entities are overwhelmingly at the receiving end of cyber-thieves, according to a new report.
Target may not know the costs of the data breach until late in the second quarter or early third quarter, interim CEO John Mulligan said.
Credit card information can make hackers money, but non-payment information is also a big target for cybercriminals. CNBC's Josh Lipton provides insight to Trustwave's Annual Global Security Report on data breaches.
So-called malvertising is a new threat worrying some lawmakers. These are ads with malware that can infect your computer without a single click.
Ads with malicious code embedded, known as "malvertising," can breach your computer without you even clicking on a link. CNBC's Scott Cohn reports.
CNBC's Scott Cohn reports the five defendants in the case which the U.S. alleges cyberspying, were all part of The People's Liberation Army, allegedly the most prolific hacking operation of the Chinese military.
The U.S. filed criminal charges against several Chinese officials, accusing them of stealing American trade secrets through cyber espionage.
China's foreign ministry says the allegations of cyber-espionage are made up, reports CNBC's Scott Cohn.
Data breaches can threaten executives' jobs, even those of bosses not formally charged with data security. Here's what all managers need to know.
Each company data breach costs $3.5 million on average. For corporates executives the consequences can be even more dire, potentially costing them their jobs. Yet,experts tell CNBC you'd be surprised at what the boss doesn't know. CNBC's Scott Cohn reports.
As artists release summer concert schedules, fraudsters are luring consumers into buying fake tickets. Here's how to protect yourself.
Now that Andrew Auernheimer, hacker nickname "weev" is out of jail, he is starting a hedge fund based on using hacking skills to see what companies have vulnerabilities. CNBC's Scott Cohn reports.
Think your new smartphone is safe from cyberattacks? Think again. Many Android phones are vulnerable, as updates are not widely prevalent.
Infamous computer hacker Andrew Auernheimer is opening a hedge fund that will short companies vulnerable to security breaches.
By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.
China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.
US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.
Twitter has launched an in-app audio streaming service, in the hope that users will spend more time on its application.
Amid the hype of the launch of the latest iPad models, there was one new member of Apple's ecosystem that wasn't mentioned: Apple SIM.
Neil Young credits Steve Jobs with popularizing digital music. He now aims to take the next giant step forward -- by going back.
In conventional terms, front running is something that happens within a firm. That definition has changed recently.
You don't have to be Edward Snowden to hide your email from the NSA. Here is a basic primer on email encryption.
Cloud computing means being able to access the Internet anywhere, anytime and being able to use any and all of the data and applications you want.