Cybersecurity

data

Carelessness and well-known security weaknesses are at the core of many large-scale hacks, Stephen Boyer says.

102867563-gettyimages-119452197-160x105

You get some bad news: Your favorite retailer was just hacked. What to do to protect yourself.

yahoo

At least 500 million user accounts have been stolen from Yahoo, the company confirmed on Thursday.

103950945-cell-phone-charging-kiosk-530x298

A free charging station may seem like a lifesaver for travelers, but it could leave you vulnerable to hackers.

racing

Days before a big race, a Nascar team had its critical computer files held for ransom. Here’s how you can protect yourself.

hacking

Stolen personal data can fetch millions from buyers. Experts reveal how transactions are made and which info commands the highest price.

brazil

Brazil is notorious for its large concentration of hackers. Fears are mounting that there could be large-scale breaches at the Rio Olympics.

clinton

Guccifer 2.0 — the hacker who claimed credit for the recent DNC breach — has shared a new batch of juicy documents.

computer lock

This sector has had a lot of activity and it could be ripe for more M&A, says Steve Harrod of early stage venture-capital firm General Catalyst.

computer

Malicious actors are targeting smartphones for their wealth of data. Here are the main ways your device could be hacked.

laptop

New malware has already been used against banks in the U.S., Canada and Europe, bilking customers out of about $4 million.

hacking

Imagine a burglar breaks into your home, photographs your stuff, then sends you the pics and a message: “Pay now, and I’ll tell you how I got in.”

hacking

The cyberattack that knocked hundreds of Japanese school networks offline had at least one novel feature: It was allegedly instigated by a student.

data

A Fed official tells CNBC that the Fed has no authority to see oversee cybersecurity precautions for foreign assets held at the NY Fed.

DOCTOR

For doctors and nurses in a growing number of hospitals, worrying about security when they input data into computers requires a balancing act.