

Josh Fruhlinger
Contributing writer
Josh Fruhlinger is a writer and editor who lives in Los Angeles.

The Heartbleed bug: How a flaw in OpenSSL caused a security crisis
Heartbleed is a vulnerability in OpenSSL that came to light in April of 2014; it can be traced to a single line of code.

Stuxnet explained: The first known cyberweapon
Thanks to Stuxnet, we now live in a world where code can destroy machinery and stop (or start) a war.

WannaCry explained: A perfect ransomware storm
WannaCry is a virulent ransomware attack that was designed by a North Korean hacker gang and takes advantage of a Windows vulnerability that remains unpatched on too many computers.

Defense in depth explained: Layering tools and processes for better security
Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold.

9 tips to prevent phishing
From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

What is an SBOM? Software bill of materials explained
An SBOM is a detailed guide to what's inside your software. It helps vendors and buyers alike keep track of software components for better software supply chain security.

Data breaches explained: Types, examples, and impact
A data breach is a security incident in which a malicious actor breaks through security measures to illicitly access data. The costs and consequences for the companies and individuals can be significant and long-lasting.

9 types of computer virus and how they do their dirty work
From macro viruses and boot sector viruses to droppers and packers, here’s a look at 9 common virus types, what they do, and the function they perform for attackers.

11 infamous malware attacks: The first and the worst
Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.

SSO explained: Single sign-on definition, examples, and terminology
Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

Logic bomb attacks: 4 famous examples
A logic bomb is malicous code that waits for the right time or the right opportunity to strike.