Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is information security? Definition, principles, and jobs

What is a false flag? How state-based hackers cover their tracks

What is a false flag? How state-based hackers cover their tracks

False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice.

What is cybersecurity? Definition, frameworks, jobs, and salaries

What is cybersecurity? Definition, frameworks, jobs, and salaries

Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field.

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

How EDR stops hackers in their tracks

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further...

Equifax data breach FAQ: What happened, who was affected, what was the impact?

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

Marriott data breach FAQ: How did it happen and what was the impact?

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Social engineering explained: How criminals exploit human behavior

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

What is OAuth? How the open authorization framework works

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities.

2fa explained: How to enable it and how it works

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online...

Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature.

What is a computer worm? How this self-spreading malware wreaks havoc

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.

Load More