The website, which described itself as "dedicated to providing information about computer viruses (virii) and web space for virus authors and groups", has been running for many years.
Rockyou were fine by the FTC for storing customer data in plain text. 32 million login details were stolen and published on the web. What can the rest of us learn from this?
A spammer, who claims to earn $1000 a day by automatically posting affiliate links onto Pinterest from thousands of bot accounts, has given an interview describing his operation.
Take a look at some recent attacks where OpenX ad servers are being hacked in order to hit redirect users users to exploit sites and infect them with malware.
New Android malware seems to continue to roll off the criminal assembly lines, this time in China. Downloading an innocent game *can* get you into trouble.
Adobe has released an out-of-band fix for two critical vulnerabilities in Flash Player. More importantly they have also introduced an automatic, silent updater that can ensure you are on the latest version without the hassle.
Since the Blackhole exploit kit first reared its head in 2010, it's grown to become one of the most notorious exploit kits ever seen. SophosLabs' Fraser Howard takes a more detailed look into Blackhole and how it works.
Researchers looked at 1.4 million Facebook profiles from New York City in March 2010 and then again in June 2011. Do you think anything changed in that time?
Mrs. W guest blogs: A look at vigilantism by hacktivist collectives like Anonymous in light of the Trayvon Martin shooting, and why it's distracting and ineffectual.
Will you be in Brisbane, Queensland, on the evening of Tuesday 03 April 2012?
If so, you're invited to a live demo of Search Engine Poisoning, plus a touch of Mac malware, at the April chapter meeting of OWASP.
The US House of Representatives on Wednesday voted down a bid to stop telecommunications companies from demanding Facebook logins from prospective job applicants. Is this about privacy or a bun fight between parties?
A backdoor Trojan horse, which would allow a remote hacker to access your Mac computer without your knowledge and potentially snoop on your files and activity, has been discovered hidden inside a boobytrapped Word document.
If you're careless about what applications you allow to access your Twitter account, don't be surprised if you find the bad guys are spamming tweets out in your name without your permission.
Over 10 million credit cards may have been stolen by criminals who compromised a credit card processing company last month. Read on to find out what happened and what actions you may wish to take to protect yourself.
Apple has released an update to Java for OS X patching a recently exploited vulnerability targeting Mac users. Update now to protect yourself - or, better yet, remove Java entirely
Malware targeting users of Macintosh computers appears to be spreading quickly. One anti-virus vendor is reporting more than 600,000 OS X computers are part of a newly assembled botnet.
SophosLabs researcher Paul Baccas takes a close look at a way in which malware authors attempt to disguise their attacks inside boobytrapped PDF files.