With school holidays in the UK slowly winding down (most likely with a cry of “Are they going back in yet”…
Year: 2014
The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday.In the…
Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils.A recent study…
Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects.Component Object Model, abbreviated…
Here’s a Facebook scam / fake video currently in circulation. Warning: a generally terrible standard of English used throughout: “Shocking Video:…
If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve…
Way back in June 2013 a website was asking users of Tumblr to add a “HTML widget” (or, more likely, to…
The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots…
This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins…
A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…