IPhone fingerprint scanner will start security revolution
With the Touch ID fingerprint scanner on its new iPhone 5S, Apple will help popularize biometrics.
New York Times down in possible 'malicious attack'
The New York Times' website continued having problems Wednesday after it went down for several hours Tuesday as the result of a "malicious external attack."
FTC cracks down on hacked video camera maker
Hackers showed that a web-connected video camera company had serious flaws that made it easy to show online what users of nearly 700 cameras were doing.
News links on Washington Post, Time and CNN hacked
The Syrian Electronic Army hacked Outbrain, a news recommendation engine used by CNN, Time and the Washington Post.
Your TV might be watching you
A flaw in Samsung Smart TVs was discovered that could allow hackers to control the camera and watch users in their living rooms.
NSA chief to hackers: If you don't like what we do, change it
NSA director Keith Alexander told hackers that critics should make the Prism program better by coming to work for the government.
Security flaw in dating app Tinder
Hackers can use a security flaw in dating app Tinder that exposes user location data and Facebook friends.
How Obamacare's 'privacy nightmare' database really works
Obamacare applicants' personal data will be collected from several agencies, worrying privacy advocates.
Big banks and U.S. Treasury stage mega-cyberattack drill
A simulated bank cyberattack called Quantum Dawn 2 will help banks uncover vulnerabilities in the way they manage large-scale threats.
Yahoo's secret FISA fight to be made public
The FISA court granted Yahoo's request to publicize details of a 2008 surveillance case.
Do Not Track proposal is DOA
Do Not Track now has a working framework, but it is no closer to seeing the light of day.
New hack reveals phone calls and texts
A newly publicized security flaw highlights the vulnerability of an increasingly popular technology for extending mobile coverage ranges.
Hacking your cell phone calls, texts, browser
A security flaw opens access to the texts you send, the websites you browse, your private phone calls, and even your bank account password.
Iris scans are the new school IDs
A growing number of schools are replacing traditional identification cards with iris scanners.
Scanning your kid's eyeballs at school
Iris scanners at schools and in your college dorm may be the next wave in security technology.
Fed agency spent $3 million fighting non-existent malware
The U.S. Economic Development Administration went nuclear and trashed PCs to fight a routine malware infection.
Cyberattacks are the bank robberies of the future
Cybercriminals make money from selling hacking services and stolen data, before ever touching your cash.
BlackBerry launches iPhone and Android security platform
The new service, called "Secure Work Space," allows users to toggle between personal and corporate modes.
Google files First Amendment court case against NSA surveillance secrecy
Google says it wants to disclose when the government sends data requests like those in the newly discovered Prism program.
Cyberattacks hit Iran's Gmail users as election begins
Phishing campaigns spike on eve of Iranian election.
Google says it 'has nothing to hide' about government snooping
Google wants to make its compliance with secret government data requests public.
Would a smartphone 'killswitch' deter thieves?
Law enforcers are publicly calling on manufacturers to install "killswitch" technology that would render a stolen device useless.
Google & Facebook CEOs deny giving access to NSA program
Page and Zuckerberg say they've never allowed the government to have unfettered access to their servers, as has been reported this week.
How the PRISM spying worked: 3 theories
Security experts have theories on two major questions: Which parties knew about the program, and what type of communications was the government able to see?
Google ... Facebook ... Paltalk?!
Paltalk video chatting service is one of the more obscure companies targeted by the NSA.
Apps claim they can keep phone records secure
Even though Verizon reportedly gave up call logs for its customers, there may be ways to avoid having the government seeing your phone logs.
Spam doubles as bull market returns
Spam email soars as scam artists take advantage of naive investors.
New Chinese hacker group targets governments and nuclear facilities
Kaspersky Lab uncovered a new Chinese hacker group that is targeting the U.S. government and private industry.
Apple's new security system has holes
Apple recently beefed up its authentication system in an effort to thwart hackers, but a new report shows the security measure is lacking in a huge area.
Cyberattacks devastated my business!
From a small startup that was hacked by Anonymous to a cleaning firm that fell prey to a Nigerian scam, these five small businesses explain how cyberattacks hurt their firms.
Biggest Bitcoin exchange lands in feds' crosshairs
U.S. officials froze the financial accounts of Bitcoin's biggest exchange, accusing it of transmitting money without a license.
How I 'stole' $14 million from a bank
Hacking into a bank is surprisingly easy. This expert has the receipt to prove it.
8 to be charged in $45 million cybertheft bank heist
Federal prosecutors to announce charges against 8 in New York who were part of global cybertheft ring stealing targeting banks.
How porn snuck into Bitcoin's code
Hackers are tinkering with a key part of Bitcoin's system.
The Internet's most dangerous spots
Some things just shouldn't be connected to the Internet. With Shodan, a search engine that finds connected devices, it's easy to locate dangerous things that anyone can access without so much as a username or password.
Return to main page
Google's Eric Schmidt wants a ban on Amazon's drones
This Chrome extension replaces all website photos with Ryan Gosling pics
IBM and others facing the cloudy business of accounting for the cloud
data is provided as-is, delayed, and subject to
Search for Jobs
Millions of job openings!
See All Jobs ▶
Someone bought a $100,000 Tesla with Bitcoins
Economy is improving but why doesn't it feel that way?
Where should you put your money now?
2 million Facebook, Gmail and Twitter passwords stolen in massive hack
Five key numbers behind the jobs recovery
Advertise with Us
Subscribe to Fortune
Subscribe to Money
Give the Gift of Fortune
Give the Gift of Money
Magazine Customer Service
Real Estate Search
Mortgage and Savings Center
Market Data Alerts
Mobile Site & Apps
Market indexes are shown in real time, except for the DJIA, which is delayed by two minutes. All times are ET.
LIBOR Warning: Neither BBA Enterprises Limited, nor the BBA LIBOR Contributor Banks, nor Reuters, can be held liable for any irregularity or inaccuracy of BBA LIBOR.
. Morningstar: © 2013 Morningstar, Inc. All Rights Reserved.
The Dow Jones Indexes
are proprietary to and distributed by Dow Jones & Company, Inc. and have been licensed for use. All content of the Dow Jones Indexes
© 2013 is proprietary to Dow Jones & Company, Inc. Chicago Mercantile Association. The market data is the property of Chicago Mercantile Exchange Inc. and its licensors. All rights reserved. FactSet Research Systems Inc. 2013. All rights reserved. Most stock quote data provided by BATS.
© 2013 Cable News Network. A Time Warner Company. All Rights Reserved.
under which this service is provided to you.