J.M. Porup

Senior Writer

J.M. Porup got his start in security working as a Linux sysadmin in 2002. Since then he's covered national security and information security for a variety of publications, and now calls CSO Online home. He previously reported from Colombia for four years, where he wrote travel guidebooks to Latin America, and speaks Spanish fluently with a hilarious gringo-Colombian accent. He holds a Masters degree in Information and Cybersecurity (MICS) from UC Berkeley.

What is Shodan? The search engine for everything on the internet

11 penetration testing tools the pros use

11 penetration testing tools the pros use

Automated and open source tools can help you conduct web application, network, and database penetration tests.

How and why deepfake videos work — and what is at risk

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

11 top DEF CON and Black Hat talks of all time

11 top DEF CON and Black Hat talks of all time

Hacker summer camp is almost upon us again. Here are some of the best talks of all time. Will this year's virtual talks measure up to these legends?

Why abandoned domain names are so dangerous

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

Should you deploy a TLS 1.3 middlebox?

Should you deploy a TLS 1.3 middlebox?

Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.

5 examples of security theater and how to spot them

5 examples of security theater and how to spot them

Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make...

Hashcat explained: How this password cracker works

Hashcat explained: How this password cracker works

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies. At its most basic level, hashcat guesses a password, hashes it, and then compares the resulting...

Make simple software security checks part of your purchasing process

Make simple software security checks part of your purchasing process

A few hours of due diligence when evaluating software for purchase is cheaper than incident response clean up.

Email spoofing explained: Who does it and how?

Email spoofing explained: Who does it and how?

Forging email has been with us since the beginning of the internet, but new security kludges are making it a lot harder.

Why new remote work policies attract hackers
Audio

Why new remote work policies attract hackers

With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work...

Bug bounty platforms buy researcher silence, violate labor laws, critics say

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.

Load More