With school holidays in the UK slowly winding down (most likely with a cry of “Are they going back in yet”…

The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday.In the…

Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils.A recent study…

Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects.Component Object Model, abbreviated…

Here’s a Facebook scam / fake video currently in circulation. Warning: a generally terrible standard of English used throughout: “Shocking Video:…

If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve…

Way back in June 2013 a website was asking users of Tumblr to add a “HTML widget” (or, more likely, to…

The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots…

This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins…

A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…