The Goldman Sachs technology M&A team, led by Sam Britton, has cashed in on its software focus and decades of experience to dominate 2019's biggest deals.Technologyread more
American small and medium-size companies that rely on China are scrambling to adjust their business plans in response to the escalating trade war.Traderead more
Here are the products that stand to be the most affected by China's new tariffs on $75 billion worth of U.S. goods.Marketsread more
The summit comes amid fears over a global economic slowdown, and U.S. tensions over trade allies, Iran and Russia.Politicsread more
The world's second biggest economy is past a point where it cannot ignore its enormous debt anymore, according to an analyst.China Economyread more
Carl Medlock used to work at Tesla. Now he's one of the few people in the U.S. that can fix the company's original Roadster electric vehicles.Technologyread more
Trump does have some powerful tools that would not require approval from U.S. Congress.Politicsread more
Stocks dropped after Donald Trump ordered that U.S. manufacturers find alternatives to their operations in China.US Marketsread more
As demand for lab monkeys continues to rise, U.S. scientists are reporting delays in research projects because they can't obtain enough animals, according to the National...Politicsread more
The European Union will respond in kind if the U.S. imposes tariffs on France over digital tax plan, EU chief Donald Tusk told G-7.Technologyread more
Trump said he will raise tariffs on $250 billion in Chinese goods to 30% and hike duties on another $300 billion in products to 15%.Politicsread more
Even though cryptocurrency prices have fallen, cybercriminals could still take advantage of mining software, and not for the reasons you think.
Instead of creating alternative currencies, cryptomining software could be used for a more sinister attack that could steal corporate secrets, according to Troy Kent, a threat researcher at Awake Security. He presented his research at the InfoSecurity North America Conference in New York earlier this month.
"With this attack, people are using a tool, a crypto miner that they're used to seeing on their network. But they're not used to responding to it as though it is a legitimate threat, like a botnet or a Trojan," Kent said in an interview with CNBC. "They can come in and they can steal files, they can steal intellectual property, they can steal credentials and then log in as maybe the CEO. Or they can download more software. They can bring down services."
Kent said he is unsure whether hackers are already using this technique to attack companies, but wanted to share his research so businesses can be on guard.
"If I can do it, then absolutely an attacker could do it, whether they're very sophisticated or not sophisticated at all," he said.
The threat is stealthy and cybersecurity teams may have trouble finding it. "Depending on the type of detection that they're using, it's very possible that they [businesses] would miss this attack, or at least deprioritize it, or dismiss it as only a miner," Kent said
The attack begins like cryptojacking, when hackers take over your computer to mine cryptocurrencies for their profit.
To protect themselves, Kent suggests companies adopt more advanced detection methods based on behavior and analytics.