- What's The 'Say Drake, I Heard You Like 'Em Young' Meme? Kendrick Lamar's Smile At The Super Bowl Halftime Show Explained
- What Is The 'Clutterfunk Cat' Meme And Where Did It Come From? The Viral 'Geometry Dash' Memes Explained
- What Is 'Republican Makeup'? Memes Mocking Republican Women's Makeup Trends Explained
- Where Are They Now? Here's What Staten Harry, The 'Lady Gaga Monsters Kid,' Has Been Up To Since His Brush With Viral Fame
- What's With All The 'Bootleg Metal Sonic Plush' Memes? The Viral 'Hue Hue Hue' Meme Explained
Meanwhile in the MTA Boardroom
March 26th, 2013 1:30 PM ShareCyberattacks and Hacktivism
March 26th, 2013 1:05 PMHackers have long been an integral part of the Internet culture since the Usenet era, but the recent waves of cyberattacks in the wake of Anonymous hacktivism have brought on a renewed interest in the shadowy subculture.
Rebecca Black Sings Rihanna
March 26th, 2013 12:17 PMAt this weekend's web video convention Playlist LIVE, Rebecca Black performed a cover of Rihanna's Stay and proved she's come a long way since Friday.
Remote Administration Tools
March 26th, 2013 11:36 AMThese programs allow the user to control a computer remotely and are often used for malicious purposes to spy on unknowing victims.
Heavy Breathing Pro Wrestlers
March 26th, 2013 11:30 AMThere are quite literally no words to describe this video.
Welcome new visitor!
Know Your Meme is a website dedicated to documenting Internet phenomena: viral videos, image macros, catchphrases, web celebs and more.
Cyberattacks and Hacktivism
Hackers have long been an integral part of the Internet culture since the Usenet era, but the recent waves of cyberattacks in the wake of Anonymous hacktivism have brought on a renewed interest in the shadowy subculture.
Rebecca Black Sings Rihanna
At this weekend's web video convention Playlist LIVE, Rebecca Black performed a cover of Rihanna's Stay and proved she's come a long way since Friday.
Remote Administration Tools
These programs allow the user to control a computer remotely and are often used for malicious purposes to spy on unknowing victims.