Enter multiple symbols separated by commas

No China Exploitation of Akamai Servers: CEO

Akamai Technologies has a "good relationship" with the Chinese government and they're "not doing strange things" to the company's equipment there, Tom Leighton, CEO of the online content delivery network told CNBC on Tuesday.

For the first time Monday, the Pentagon officially accused the Chinese government and military of conducting computer-based attacks against the U.S., including efforts to steal information from federal agencies. China dismissed the accusations as "groundless" and "hype."

(Read More: China Is Waging Cyberattacks: Pentagon)

Leighton explained in a "Squawk Box" interview that the largest number of cyberattacks around the world originate in China, but stressed the Chinese government "is not exploiting" his servers.

"China is a complicated environment to do content delivery," he added. "But China is [also] a very important market for our customers."

Akamai's software is designed to move Web traffic securely and quickly across thousands of servers worldwide.

"There are a lot of attacks recently against major commercial websites and banks, for example in North America," Leighton said. "We can make those attacks disappear. We can prevent them from impacting the website."

He said the U.S. is the second-largest source of computers compromised by hackers. "It's people's computers at home that maybe don't have the latest defenses and someone's gotten in there and taken control of the machine to do bad things," Leighton said.

Shares of Akamai have soared nearly 40 percent in the past 52 weeks—trading around $45 each. But they're well below their all-time high of more than $300 in 1999.

Leighton told CNBC, "We believe in the future of the company."

On April 24, the company reported better-than-expected first-quarter earnings of 51 cents a share, excluding one-time items. Revenue of $368 million also exceeded Wall Street estimates.

By CNBC's Matthew J. Belvedere. Follow him on Twitter @Matt_SquawkCNBC.

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • lock_laptop.jpg

    China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • hacker_keyboard_200.jpg

    US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.


Technology Explained