BoingBoing
SEARCH STORE
  • SEARCH
  • STORE
  • Blog : The posts
  • Forums : Read the rules
  • Store : Wonderful Products (Contact Support)
  • Newsletter : Daily wonderful things
  • About Us : Writers and staff
  • Contact Us : Get satisfaction
  • Advertise : Thank you for reading
  • Privacy Policy : The data you generate
  • TOS : What you agree to
  • Thumbnails : Youtube Thumbnail generator
  • security My review of Sandworm: an essential guide to the new, reckless world of "cyberwarfare" Cory Doctorow
  • security Son of Stuxnet: "invisible," memory-resident malware stalks the world's banks Cory Doctorow
  • politics Stuxnet, the worm that targeted Iran's nuclear facilities, was created by US and Israel Xeni Jardin
  • security Forever-day bugs Cory Doctorow
  • politics 'Sandworm' hacking group linked to Russian GRU's Main Center for Special Technology, says U.S. Xeni Jardin
  • security Attribution is hard: the incredible skullduggery used to try to blame the 2018 Olympic cyberattack on North Korea Cory Doctorow
  • sandworm Someone is targeting "critical infrastructure" safety systems in networked attacks Cory Doctorow
  • security New Vpnfilter analysis: modules attack router owners and target industrial control systems; reinfection still possible, more routers vulnerable Cory Doctorow
  • happy mutants Stealing data from airgapped computers by using power fluctuations as a covert channel Cory Doctorow
  • videos Squirrels are vastly more harmful to the world's power grids than "the cyber" is Cory Doctorow
  • trump America's top spy won't stick around to watch Donald Trump wield his doomsday device Cory Doctorow
  • security The democratization of censorship: when anyone can kill as site as effectively as a government can Cory Doctorow
  • videos Fansmitter: malware that exfiltrates data from airgapped computers by varying the sound of their fans Cory Doctorow
  • U.S. tried to Stuxnet North Korea and failed, says former intel officer Xeni Jardin
  • NSA has ability to embed spying software in computer hard drives, including yours Xeni Jardin
  • security Shining light on the shadowy, "superhuman" state-level Equation Group hackers Cory Doctorow
  • happy mutants Indispensable BBC/OU series on cybercrime starts tomorrow Cory Doctorow
  • Technology Security cruft means every exploit lives forever Glenn Fleishman
  • corruption Report from Trustycon: like RSA, but without the corruption Cory Doctorow
  • Business High-end CNC machines can't be moved without manufacturers' permission Cory Doctorow

Read the rules you agree to by using this website in our Terms of Service.

We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Boing Boing uses cookies and analytics trackers, and is supported by advertising, merchandise sales and affiliate links. Read about what we do with the data we gather in our Privacy Policy.

Who will be eaten first? Our forum rules are detailed in the Community Guidelines.

Boing Boing is published under a Creative Commons license except where otherwise noted.

    • Mark Frauenfelder
    • David Pescovitz
    • Rob Beschizza
    • Carla Sinclair
    Editors
    • Jason Weisberger
    Publisher
    • Ken Snider
    Sysadmin
    • About Us
    • Newsletter
    • Contact Us
    • Advertise
    • Forums
    • Shop
    • Shop Support