Hacker News
- Primary target of Stuxnet could be China http://en.wikipedia.org/wiki/stuxnet#affected_countries 15 comments netsec
Linking pages
- It Looks Like You’re Trying To Take Over The World · Gwern.net https://www.gwern.net/Clippy 274 comments
- Microsoft admits to signing rootkit malware in supply-chain fiasco https://www.bleepingcomputer.com/news/security/microsoft-admits-to-signing-rootkit-malware-in-supply-chain-fiasco/ 193 comments
- TV report: Israel silent as Iran hit by computer virus more violent than Stuxnet | The Times of Israel https://www.timesofisrael.com/tv-report-israel-silent-as-iran-hit-by-computer-virus-more-violent-than-stuxnet/ 139 comments
- Newsrooms, let’s talk about Google Workspace https://freedom.press/training/blog/newsrooms-lets-talk-about-gsuite/ 122 comments
- The big idea around unikernels |> Changelog https://changelog.com/posts/the-big-idea-around-unikernels 114 comments
- essays/us_atrocities.md at master · dessalines/essays · GitHub https://github.com/dessalines/essays/blob/master/us_atrocities.md 100 comments
- Thunderstrike at 31C3 - Trammell Hudson's Projects https://trmm.net/thunderstrike_31c3 83 comments
- TELL CONGRESS TO STOP THE EARN IT ACT https://www.noearnitact.org/ 45 comments
- Ex-Googler Geoffrey Hinton and other A.I. doomers say it could kill us all. They’re focused on the wrong threat. https://slate.com/technology/2023/05/artificial-intelligence-existential-threat-google-geoffrey-hinton.html 34 comments
- It Looks Like You’re Trying To Take Over The World · Gwern.net https://www.gwern.net/fiction/Clippy 33 comments
- Secrets and Lies: Nine Years Later | JOEZACK.COM http://joezack.com/2013/07/14/secrets-and-lies-nine-years-later/ 32 comments
- WannaCry About Business Models – Stratechery by Ben Thompson https://stratechery.com/2017/wannacry-and-the-power-of-business-models/ 30 comments
- High Security, Plausible Deniability and Two Factor Encryption: You're the Weak Link https://www.alvarez.io/posts/two-factor-encryption/ 25 comments
- Hackers Targeting Kaspersky Used Stolen Foxconn Certificates http://blog.lifars.com/2015/06/16/hackers-targeting-kaspersky-used-stolen-foxconn-certificates/ 23 comments
- Slowing Moore’s Law: How It Could Happen · Gwern.net http://www.gwern.net/Slowing%20Moore%27s%20Law 22 comments
- New air-gap jumper covertly transmits data in hard-drive sounds | Ars Technica http://arstechnica.co.uk/security/2016/08/new-air-gap-jumper-covertly-transmits-data-in-hard-drive-sounds/ 19 comments
- US urged to recruit master hackers to wage cyber war on America's foes | Hacking | The Guardian http://www.guardian.co.uk/technology/2012/jul/10/us-master-hackers-al-qaida 13 comments
- Hillary Clinton Subtly Mentioned Stuxnet in the Debate with Donald Trump https://www.inverse.com/article/21462-hillary-clinton-debate-stuxnet-cybersecurity 12 comments
- According to Star Trek: Discovery, Starfleet still runs Microsoft Windows - The Verge https://www.theverge.com/tldr/2017/10/3/16412372/star-trek-discovery-cbs-windows-code-command-line 11 comments
- Iranian nuclear facilities under "massive attack" by Stuxnet worm | Boing Boing http://www.boingboing.net/2010/09/25/iranian-nuclear-faci.html 10 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Stuxnet - Wikipedia
See how to search.