Security

Hacking anything connected to the Internet

The Shodan search engine allows anyone to search for anything connected to the Internet and if security settings are not turned on, take control of the device.  Play

iMessage is the DEA's worst nightmare

The iPhone's hardware encryption makes it near impossible to wiretap during criminal investigations  More

Samsung targets BlackBerry with Knox

Samsung Knox, a smartphone security solution, could help the company to gain entry to the last BlackBerry strongholds.  More

Reuters editor indicted for conspiring with Anonymous hackers

The DOJ has indicted Matthew Keys for conspiring with Anonymous to help the group hack into a website of his former employer, Tribune Company.  More

Good cybersecurity means better privacy - opinion

Cybersecurity legislation like CISPA will help deliver privacy protections, say Steve Largent and Rick Boucher.  More

NBC hack infects visitors in 'drive by' cyberattack

A hack of some NBC.com sites proves you can accidentally download malware simply by clicking on a link from a reputable website.  More

Wake up, America! China is attacking

Chinese cyberattacks have been linked to the country's military. It's time American businesses woke up and realized that jobs and the nation's security could be at stake.  More

Hackers take aim at key U.S. infrastructure

Experts say critical infrastructure such as power plants, factories, pipelines and water systems are at risk from a cyberattack.  More

President Obama cracks whip on cybercrime

The prevention of critical infrastructure cyberattacks is the focus of a new executive order President Obama will discuss at the State of the Union.  More

Watching porn is bad for your smartphone

Pornography is the leading source of malware on smartphones and tablets.  More

Your antivirus software won't block a cyberattack

The New York Times' antivirus software failed to prevent 44 out of 45 strands of malware that penetrated its systems during a four-month attack by Chinese hackers.  More

Hacker hits on U.S. power and nuclear targets spiked in 2012

The nation's critical infrastructure remains vulnerable to attack.  More

Smartphone cyberattacks to grow this year

Cybercriminals expected to go after smartphones more often this year, especially as the use of phones as mobile wallets increases. And even mighty Apple could be vulnerable.  More

Cybercrime in 2013: Prepare for battle

Cybersecurity experts say 2013 is when all-out cyber war becomes a reality, attacks grow larger, and Anonymous finally begins to fade away.  More

Snapchat's 'disappearing' videos don't actually vanish

A security flaw enables video messages on Snapchat to resurface.  More

McAfee won't change its name because of John McAfee

John McAfee's headline-grabbing exploits haven't tarnished the security company's brand, McAfee's co-presidents say.  More

Massive bank cyberattack planned

Project Blitzkrieg, a cyberattack planned on 30 U.S. banks, has been confirmed by McAfee.  More

Tumblr falls victim to Internet trolls

The attack sucked in thousands of users, but its bark was worse than its bite.  More

NTSB drops 'unacceptable' BlackBerry for iPhone

The transportation safety agency says its RIM devices have been failing 'at inopportune times and at an unacceptable rate.'  More

Fake tech gear has infiltrated the U.S. government

Counterfeit technology from high-risk suppliers has a growing presence in the government, despite laws designed to crack down on it.  More

Why you can't vote online yet

Countries like Canada, Norway and Australia have adopted online voting for elections, but the battle rages on in the U.S.  More

The real Iranian threat: Cyberattacks

Iran is suspected of carrying out some of the largest cyberattacks in history against the United States and its allies. Responding to the threat will be a priority for the next administration.  More

How your vote can be hacked

Researchers at Argonne National Laboratory can hack two types of commonly used electronic voting machines in under a minute.  Play

Google awards $60,000 prize for Chrome hack

A hacker known as "Pinkie Pie" has taken home a second $60,000 prize for uncovering a Google Chrome exploit.  More

Hackers are holding data for ransom

Hackers have begun deploying ransomware, a type of malware that holds files and servers hostage in exchange for payment.  Play

Chinese telecoms: 'We're not a threat'

Huawei and ZTE pushed back against a congressional report Monday, saying their products are safe for use in the United States.  More

Law comes to one of the Internet's Wild Wests

The question is, can drastic new penalties really curb Japan's rampant piracy?  More

BlackBerry's wipeout creates major mobile security gaps

The 'bring your own device' trend -- accelerated this year by BlackBerry's turmoil -- has created a big mobile security vulnerability in corporations.  More

Major banks hit with biggest cyberattacks in history

Cyberattacks launched against banks were twice as large as any in history and 10 times larger than typical attacks.  More

How hackers can steal electricity

One security firm looks at how hackers can access the computers on smart meters to steal electricity and consumer data from utilities.  Play

Your smartphone will (eventually) be hacked

Smartphone cyberattacks are rare, but experts continue to predict that a malware doomsday is coming. Here's why it hasn't happened yet -- but probably will.  More

The security risks in paying by smartphone

Security consultant Charlie Miller explains how smartphones equipped with NFC mobile payment chips can be exploited by hackers  Play

Malware attacks on the rise

Cyberattacks through malware are growing at their fastest pace in four years, as smartphones and other connected devices give hackers a new crop of targets to attack.  More

How hackers can steal your debit card info

Hackers at the Black Hat cybersecurity conference demonstrate flaws in debit card terminals that could expose card information.  Play

Cyberweapon targets Middle East bank accounts

Gauss, a malicious virus targeting Lebanese bank accounts, is the latest government-sponsored cyberattack in the Stuxnet family.  More
Market indexes are shown in real time, except for the DJIA, which is delayed by two minutes. All times are ET. Disclaimer LIBOR Warning: Neither BBA Enterprises Limited, nor the BBA LIBOR Contributor Banks, nor Reuters, can be held liable for any irregularity or inaccuracy of BBA LIBOR. Disclaimer. Morningstar: © 2013 Morningstar, Inc. All Rights Reserved. Disclaimer The Dow Jones IndexesSM are proprietary to and distributed by Dow Jones & Company, Inc. and have been licensed for use. All content of the Dow Jones IndexesSM © 2013 is proprietary to Dow Jones & Company, Inc. Chicago Mercantile Association. The market data is the property of Chicago Mercantile Exchange Inc. and its licensors. All rights reserved. FactSet Research Systems Inc. 2013. All rights reserved. Most stock quote data provided by BATS.