Josh Fruhlinger

Contributing writer

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

9 types of computer virus and how they do their dirty work

11 infamous malware attacks: The first and the worst

11 infamous malware attacks: The first and the worst

Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.

SSO explained: Single sign-on definition, examples, and terminology

SSO explained: Single sign-on definition, examples, and terminology

Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

Logic bomb attacks: 4 famous examples

Logic bomb attacks: 4 famous examples

A logic bomb is malicous code that waits for the right time or the right opportunity to strike.

What is cryptography? How algorithms keep information secret and safe

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

How SAML works and enables single sign-on

How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

Keyloggers explained: How attackers record computer inputs

Keyloggers explained: How attackers record computer inputs

A keylogger (short for keystroke logger) is a tool that can record and report on a computer user's activity as they interact with a computer.

PCI DSS explained: Requirements, fines, and steps to compliance

PCI DSS explained: Requirements, fines, and steps to compliance

PCI DSS (Payment Card Industry Data Security Standard) is a cybersecurity standard backed by all the major credit card and payment processing companies that aims to keep credit and debit card numbers safe.

Computer viruses explained: Definition, types, and examples

Computer viruses explained: Definition, types, and examples

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

What is phishing? Examples, types, and techniques

What is phishing? Examples, types, and techniques

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.

What is spear phishing? Examples, tactics, and techniques

What is spear phishing? Examples, tactics, and techniques

Spear phishing is a targeted email attack purporting to be from a trusted sender. Learn how to recognize—and defeat—this type of phishing attack.

What is a botnet? When infected devices attack

What is a botnet? When infected devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised to launch DDoS attacks, spread phishing spam, mine bitcoin, and more.

Load More