Watch out for this spam run taking place on Twitter: The spam spreading on compromised accounts are bundles of @ messages…
Month: February 2014
The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In…
With school holidays in the UK slowly winding down (most likely with a cry of “Are they going back in yet”…
Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit. In a very busy month…
Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,…
Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils. A recent…
If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve…
Here’s a Facebook scam / fake video currently in circulation. Warning: a generally terrible standard of English used throughout: “Shocking Video:…
The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots…
Way back in June 2013 a website was asking users of Tumblr to add a “HTML widget” (or, more likely, to…