Bleeping Computer
{{short description|Technology news and computer help website}}
{{use dmy dates|date=November 2020}}
{{italic title}}
{{Infobox website
| name = Bleeping Computer
| logo = File:Bleeping_Computer_logo.png
| logo_alt = The word "BLEEPINGCOMPUTER" is displayed in white lowercase letters over a dark blue background.
| screenshot =
| url = {{Official URL}}
| type = Technology news and computer help
| registration = Optional
| language = English
| owner = Bleeping Computer LLC.
| author = Lawrence Abrams
| launch_date = {{start date and age|2004|1|26|df=yes}}{{cite web|url=https://www.bleepingcomputer.com/forums|title=Bleeping Computer Technical Support Forums|website=Bleeping Computer|access-date=19 September 2018|archive-date=1 October 2018|archive-url=https://web.archive.org/web/20181001042603/https://www.bleepingcomputer.com/forums/|url-status=live}}
| current_status = Online
}}
Bleeping Computer is a website covering technology news and offering free computer help via its forums that was created by Lawrence Abrams in 2004. It publishes news focusing heavily on cybersecurity, but also covers other topics including computer software, computer hardware, operating system and general technology.
In 2018, Bleeping Computer was added as an associate partner to the Europol NoMoreRansom project for the ransomware information and decryption tools provided by the site.{{Cite web |title=Join the global 'No More Ransom' initiative to help more victims fight back |url=https://www.europol.europa.eu/newsroom/news/join-global-%E2%80%98no-more-ransom%E2%80%99-initiative-to-help-more-victims-fight-back |url-status=live |archive-url=https://web.archive.org/web/20200611034949/https://www.europol.europa.eu/newsroom/news/join-global-%E2%80%98no-more-ransom%E2%80%99-initiative-to-help-more-victims-fight-back |archive-date=11 June 2020 |accessdate=11 June 2020 |publisher=Europol}}
History
BleepingComputer was founded in 2004 after Abrams could not find existing technical support sites that could offer easy-to-understand instructions for his friends and family.
The domain name bleepingcomputer.com originates from the sounds made by a broken computer and because a user might want to curse at a computer when it does not work properly.{{Cite web|date=17 February 2016|title=Behind the scenes of a free PC troubleshooting helpsite: Interview with BleepingComputer|url=https://blog.emsisoft.com/en/21482/behind-the-scenes-of-a-free-pc-troubleshooting-helpsite-interview-with-bleepingcomputer/|accessdate=7 October 2020|website=Emsisoft {{!}} Security Blog|archive-date=13 October 2020|archive-url=https://web.archive.org/web/20201013133649/https://blog.emsisoft.com/en/21482/behind-the-scenes-of-a-free-pc-troubleshooting-helpsite-interview-with-bleepingcomputer/|url-status=live}}
Since the CryptoLocker ransomware attack in September 2013, and a subsequent DDoS of the site due to its reporting on the new malware,{{Cite web|title=Information regarding October 10th's DDOS attack|url=https://www.bleepingcomputer.com/forums/t/510432/information-regarding-october-10ths-ddos-attack/|accessdate=7 October 2020|website=BleepingComputer|archive-date=23 April 2023|archive-url=https://web.archive.org/web/20230423185328/https://www.bleepingcomputer.com/forums/t/510432/information-regarding-october-10ths-ddos-attack/|url-status=live}} Bleeping Computer has been reporting on new ransomware families as they are released.{{Cite web|title=Articles tagged with Ransomware|url=https://www.bleepingcomputer.com/tag/ransomware/|accessdate=8 October 2020|website=BleepingComputer|archive-date=22 September 2020|archive-url=https://web.archive.org/web/20200922045530/https://www.bleepingcomputer.com/tag/ransomware/|url-status=live}}
Content
The articles published at Bleeping Computer are categorized as news articles, tutorials and virus removal guides. Its content includes searchable databases for looking up Windows start-up programs and uninstall entries, as well as a free Internet forum to receive computer help.
The site covers news released by researchers and companies, but also performs in-house investigative reporting {{Cite web|title=Garmin outage caused by confirmed WastedLocker ransomware attack|url=https://www.bleepingcomputer.com/news/security/garmin-outage-caused-by-confirmed-wastedlocker-ransomware-attack/|accessdate=7 October 2020|website=BleepingComputer|archive-date=27 September 2020|archive-url=https://web.archive.org/web/20200927190313/https://www.bleepingcomputer.com/news/security/garmin-outage-caused-by-confirmed-wastedlocker-ransomware-attack/|url-status=live}}
- {{Cite web|title=Canon confirms ransomware attack in internal memo|url=https://www.bleepingcomputer.com/news/security/canon-confirms-ransomware-attack-in-internal-memo/|accessdate=7 October 2020|website=BleepingComputer|archive-date=13 October 2020|archive-url=https://web.archive.org/web/20201013075953/https://www.bleepingcomputer.com/news/security/canon-confirms-ransomware-attack-in-internal-memo/|url-status=live}} and analysis of ransomware{{Cite web|title=DarkSide: New targeted ransomware demands million dollar ransoms|url=https://www.bleepingcomputer.com/news/security/darkside-new-targeted-ransomware-demands-million-dollar-ransoms/|accessdate=7 October 2020|website=BleepingComputer|archive-date=20 September 2020|archive-url=https://web.archive.org/web/20200920103804/https://www.bleepingcomputer.com/news/security/darkside-new-targeted-ransomware-demands-million-dollar-ransoms/|url-status=live}} and malware.{{Cite web|title=Fake VPN Site Pushes CryptBot and Vidar Info-Stealing Trojans|url=https://www.bleepingcomputer.com/news/security/fake-vpn-site-pushes-cryptbot-and-vidar-info-stealing-trojans/|accessdate=7 October 2020|website=BleepingComputer|archive-date=29 January 2021|archive-url=https://web.archive.org/web/20210129183951/https://www.bleepingcomputer.com/news/security/fake-vpn-site-pushes-cryptbot-and-vidar-info-stealing-trojans/|url-status=live}}
Free decryptors to unlock files encrypted by various ransomware families have been released through the forums or the site's news section by third-party researchers.{{Cite web|title=TeslaDecoder released to decrypt .EXX, .EZZ, .ECC files encrypted by TeslaCrypt|url=https://www.bleepingcomputer.com/forums/t/576600/tesladecoder-released-to-decrypt-exx-ezz-ecc-files-encrypted-by-teslacrypt/|accessdate=7 October 2020|website=BleepingComputer|archive-date=13 November 2020|archive-url=https://web.archive.org/web/20201113162301/https://www.bleepingcomputer.com/forums/t/576600/tesladecoder-released-to-decrypt-exx-ezz-ecc-files-encrypted-by-teslacrypt/|url-status=live}}
- {{Cite web|title=ECh0raix Ransomware Decryptor Restores QNAP Files For Free|url=https://www.bleepingcomputer.com/ransomware/decryptor/ech0raix-ransomware-decryptor-restores-qnap-files-for-free/|accessdate=7 October 2020|website=BleepingComputer|archive-date=7 November 2020|archive-url=https://web.archive.org/web/20201107234107/https://www.bleepingcomputer.com/ransomware/decryptor/ech0raix-ransomware-decryptor-restores-qnap-files-for-free/|url-status=live}}
- {{Cite web|title=Windows Ransomware Decryptors Downloads|url=https://www.bleepingcomputer.com/download/windows/ransomware-decryptors/|accessdate=7 October 2020|website=BleepingComputer|archive-date=11 November 2020|archive-url=https://web.archive.org/web/20201111194113/https://www.bleepingcomputer.com/download/windows/ransomware-decryptors/|url-status=live}}
Government agencies have included Bleeping Computer cybersecurity articles and analysis in numerous advisories.{{Cite web |date=15 February 2018 |title=Petya Ransomware |url=https://us-cert.cisa.gov/ncas/alerts/TA17-181A |url-status=live |archive-url=https://web.archive.org/web/20201014081117/https://us-cert.cisa.gov/ncas/alerts/TA17-181A |archive-date=14 October 2020 |accessdate=7 October 2020 |publisher=CISA}}
- {{Cite web |date=17 June 2019 |title=Microsoft Operating Systems BlueKeep Vulnerability |url=https://us-cert.cisa.gov/ncas/alerts/AA19-168A |url-status=live |archive-url=https://web.archive.org/web/20201015033921/https://us-cert.cisa.gov/ncas/alerts/AA19-168A |archive-date=15 October 2020 |accessdate=7 October 2020 |publisher=CISA}}
- {{Cite web |title=Customer Alerts: Frauds and Scams |url=https://fiscal.treasury.gov/news/customer-alerts-frauds-scams.html |url-status=live |archive-url=https://web.archive.org/web/20201016162826/https://fiscal.treasury.gov/news/customer-alerts-frauds-scams.html |archive-date=16 October 2020 |accessdate=7 October 2020 |publisher=US Treasury}}
- {{Cite web |title=Cybersecuritybeeld Nederland CSBN 2019 |url=https://www.politie.nl/binaries/content/assets/politie/nieuws/2019/cybersecuritybeeld-nederland-2019-webversie.pdf |accessdate=6 January 2019 |publisher=Nationaal Coördinator Terrorismebestrijding en Veiligheid |language=nl}}{{Dead url|date=July 2024}}
- {{Cite web |title=LokiBot Malware |url=https://us-cert.cisa.gov/ncas/alerts/aa20-266a |url-status=live |archive-url=https://web.archive.org/web/20201002130248/https://us-cert.cisa.gov/ncas/alerts/aa20-266a |archive-date=2 October 2020 |accessdate=7 October 2020 |publisher=CISA}}{{Cite web|title=Emotet Malware|publisher=CISA|url=https://us-cert.cisa.gov/ncas/alerts/aa20-280a|accessdate=7 October 2020|archive-date=7 October 2020|archive-url=https://web.archive.org/web/20201007012611/https://us-cert.cisa.gov/ncas/alerts/aa20-280a|url-status=live}}
The site used to offer a malware removal training program{{Cite web|last=Elise|title=Malware Removal Training Program - Virus, Trojan, Spyware, and Malware Removal Help|url=https://www.bleepingcomputer.com/forums/t/532535/malware-removal-training-program/|accessdate=7 October 2020|website=BleepingComputer|archive-date=20 December 2021|archive-url=https://web.archive.org/web/20211220224935/https://www.bleepingcomputer.com/forums/t/532535/malware-removal-training-program/|url-status=live}} through its forums that teaches volunteers how to remove Windows infections using various tools, including Combofix, HijackThis, DDS,{{cite web|title=Am I Infected? What do I do? How do I get help? Who is helping me? - Am I infected? What do I do?|url=https://www.bleepingcomputer.com/forums/topic182397.html|website=Bleeping Computer|access-date=19 September 2018|archive-date=2 February 2013|archive-url=https://web.archive.org/web/20130202102455/http://www.bleepingcomputer.com/forums/topic182397.html|url-status=live}} OTL, GMER, Malwarebytes' Anti-Malware and Rkill,{{cite web|title=RKill - What it does and What it Doesn't - A brief introduction to the program - Anti-Virus, Anti-Malware, and Privacy Software|url=https://www.bleepingcomputer.com/forums/t/308364/rkill-what-it-does-and-what-it-doesnt-a-brief-introduction-to-the-program/|website=Bleeping Computer|access-date=19 September 2018|archive-date=23 September 2018|archive-url=https://web.archive.org/web/20180923110418/https://www.bleepingcomputer.com/forums/t/308364/rkill-what-it-does-and-what-it-doesnt-a-brief-introduction-to-the-program/|url-status=live}} developed by Abrams.
In October 2020, there were over 840,000 registered members on the site.{{Citation needed|date=November 2022}}
Legal issues
In early February 2016, Enigma Software, the developers of the anti-malware suite SpyHunter, filed a lawsuit{{Cite web|url=http://www.digitaltrends.com/computing/enigma-software-sues-bleepingcomputer/|title=Enigma Software sues BleepingComputer for a smear campaign|website=Digital Trends|accessdate=16 March 2016|date=8 February 2016|archive-date=16 March 2016|archive-url=https://web.archive.org/web/20160316070953/http://www.digitaltrends.com/computing/enigma-software-sues-bleepingcomputer/|url-status=live}} against Bleeping Computer in response to a negative review of SpyHunter, alleging a campaign to damage the reputation of their company and product.{{Cite news|url = http://www.networkworld.com/article/3029641/security/bleepingcomputer-under-free-speech-attack-as-spyhunter-makers-sue-over-bad-review.html|title = BleepingComputer under free speech attack as SpyHunter makers sue over bad review|last = Smith|first = Ms.|website = Network World|access-date = 16 March 2016|date = 3 February 2016|archive-date = 10 March 2016|archive-url = https://web.archive.org/web/20160310081818/http://www.networkworld.com/article/3029641/security/bleepingcomputer-under-free-speech-attack-as-spyhunter-makers-sue-over-bad-review.html|url-status = dead}} Bleeping Computer requested financial aid from its readers to help pay legal fees arising from the lawsuit.{{Cite web|url = https://www.bleepingcomputer.com/announcement/frivolous-lawsuits/help-bleepingcomputer-defend-freedom-of-speech/|title = Help BleepingComputer Defend Freedom of Speech|website = BleepingComputer|accessdate =16 March 2016|archive-url = https://web.archive.org/web/20160317032403/http://www.bleepingcomputer.com/announcement/frivolous-lawsuits/help-bleepingcomputer-defend-freedom-of-speech/|archivedate =17 March 2016|url-status = dead}} At the beginning of August 2016, Bleeping Computer filed{{Cite web|url=https://www.bleepstatic.com/legal/BleepingComputer-Reply-Counterclaim.pdf|title=BleepingComputer's lawsuit document|date=|website=Bleepstatic|accessdate=10 August 2016|archive-date=20 August 2016|archive-url=https://web.archive.org/web/20160820123007/http://www.bleepstatic.com/legal/BleepingComputer-Reply-Counterclaim.pdf|url-status=live}} its own lawsuit against Enigma Software for an alleged long-running smear campaign against Bleeping Computer. The lawsuit against BleepingComputer ended in settlement, with BleepingComputer removing Quietman7's posts on Enigma Software's product.{{cite web |url=https://www.bleepingcomputer.com/announcement/bleepingcomputer/press-release/ |title=Press Release |last=Abrams |first=Lawrence |date=March 1, 2017 |website=BleepingComputer |accessdate=22 September 2017 |archive-date=7 April 2017 |archive-url=https://web.archive.org/web/20170407040411/https://www.bleepingcomputer.com/announcement/bleepingcomputer/press-release/ |url-status=live }}
See also
{{portal|Journalism}}
References
{{Reflist}}