These are the stocks posting the largest moves before the bell.Market Insiderread more
China wants to have another round of talks with the U.S. before signing phase one of a trade deal, a source tells CNBC's Kayla Tausche.Marketsread more
"But I expect we'll have a deal," Mnuchin tells CNBC.Politicsread more
Wall Street analysts were largely skeptical of Trump's announcement on Friday of a substantial trade deal.Marketsread more
Apple will release the iPhone SE2 early next year for $399, analyst Ming-Chi Kuo says.Technologyread more
The Treasury secretary expresses optimism that the U.S. and China have a workable first-phase agreement.Economyread more
The ITB, the homebuilder's ETF, has its highest level since January 2018. Craig Johnson, chief market technician at Piper Jaffray, thinks there could be even more room to run.Trading Nationread more
However, that doesn't mean it won't cause harm, says Gottlieb. "You can't inhale something into the lungs on a repeated basis and not cause some damage to the lung."Health and Scienceread more
Climate change activists targeted BlackRock, the world's biggest asset manager, in London on Monday, demanding that the world's major financial institutions stop funding what...Environmentread more
The Salesforce CEO called for the establishment of a "new capitalism" that's partly funded by taxing the rich.Technologyread more
Industrials are gearing up for big gains, says Piper Jaffray's Craig Johnson. Here's one way to play the breakout.Trading Nationread more
Intel CEO Brian Krzanich sold off a large chunk of his stake in the company last year — after the chipmaker was already aware of serious security flaws in its computer processors, according to multiple reports.
The chipmaker did not immediately respond to CNBC's emailed request for comments sent outside U.S. office hours.
Other outlets have reported an Intel spokeswoman said Krzanich's decision to sell the shares was unrelated to the security vulnerability disclosed this week.
According to a Securities and Exchange Commission filing in late November, Krzanich acquired and sold 644,135 shares at a weighted average price of $44.05 by exercising his options. Those options let him purchase the shares at prices between $12.985 and $26.795, significantly lower than where Intel was trading at the time.
He sold another 245,743 shares that he already owned at a weighted average of $44.55. That brought down the total number of shares he owns to 250,000 — which is the minimum number of shares that the CEO of Intel is required to own, according to a Motley Fool report. Krzanich sold all of those shares for a little over $39 million, apparently netting about $25 million.
The filing showed that the sales were part of a 10b5-1 plan, which was created on Oct. 30, just a month before Krzanich sold the shares. The 10b5-1 is a trading plan that company executives set up to sell stocks they own at a pre-determined time so that they are not accused of insider trading.
Multiple outlets, however, have reported that Intel and other chip makers were notified of the security vulnerabilities in June.
Security researchers released documentation this week of critical vulnerabilities in modern processors used on almost every computer around the world. The hardware bugs — known as Meltdown and Spectre could allow programs to steal data including "passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents."
While Meltdown is specific to Intel processors, and can be patched, Spectre affects Intel, AMD and ARM processors — meaning almost every device that uses a chip — and is harder to fix. That sent the computer industry scrambling to patch those vulnerabilities. Though there are no known exploits for the problem yet, what is alarming is the fact that it can potentially affect millions of devices.
On Wednesday, Krzanich told CNBC's "Closing Bell" that the company is working on fixes that could start next week. He also said he's "relatively confident" that the security issue has not been exploited and that the industry has been working together for a couple of months to address it.
"I mean, it's very hard — we can't go out and check every system out there," he added. "But when you take a look at the difficulty it is to actually go and execute this exploit — you have to get access to the systems, and then access to the memory and operating system — we're fairly confident, given the checks we've done, that we haven't been able to identify an exploit yet."
Krzanich said the entire industry was planning to publish the data security issue once the fix was in place — but the problem leaked early.
"Why did it leak ahead of time? Somebody was doing some updates on a Linux kernel and they improperly posted that this was due to this flaw," Krzanich said. "That's why we're responding to it today."
— CNBC's Matt Rosoff and Anita Balakrishnan contributed to this report.