Josh Fruhlinger

Contributing writer

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

11 old software bugs that took way too long to squash

The Heartbleed bug: How a flaw in OpenSSL caused a security crisis

The Heartbleed bug: How a flaw in OpenSSL caused a security crisis

Heartbleed is a vulnerability in OpenSSL that came to light in April of 2014; it can be traced to a single line of code.

Stuxnet explained: The first known cyberweapon

Stuxnet explained: The first known cyberweapon

Thanks to Stuxnet, we now live in a world where code can destroy machinery and stop (or start) a war.

WannaCry explained: A perfect ransomware storm

WannaCry explained: A perfect ransomware storm

WannaCry is a virulent ransomware attack that was designed by a North Korean hacker gang and takes advantage of a Windows vulnerability that remains unpatched on too many computers.

Defense in depth explained: Layering tools and processes for better security

Defense in depth explained: Layering tools and processes for better security

Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold.

9 tips to prevent phishing

9 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

What is an SBOM? Software bill of materials explained

What is an SBOM? Software bill of materials explained

An SBOM is a detailed guide to what's inside your software. It helps vendors and buyers alike keep track of software components for better software supply chain security.

Data breaches explained: Types, examples, and impact

Data breaches explained: Types, examples, and impact

A data breach is a security incident in which a malicious actor breaks through security measures to illicitly access data.  The costs and consequences for the companies and individuals can be significant and long-lasting.

9 types of computer virus and how they do their dirty work

9 types of computer virus and how they do their dirty work

From macro viruses and boot sector viruses to droppers and packers, here’s a look at 9 common virus types, what they do, and the function they perform for attackers.

11 infamous malware attacks: The first and the worst

11 infamous malware attacks: The first and the worst

Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.

SSO explained: Single sign-on definition, examples, and terminology

SSO explained: Single sign-on definition, examples, and terminology

Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

Logic bomb attacks: 4 famous examples

Logic bomb attacks: 4 famous examples

A logic bomb is malicous code that waits for the right time or the right opportunity to strike.

Load More