Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is phishing? How this cyber attack works and how to prevent it

12 top IDS/IPS tools

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.

Top cybersecurity facts, figures and statistics for 2020

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.

The OPM hack explained: Bad security practices meet China's Captain America

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach FAQ: How did it happen and what was the impact?

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax data breach FAQ: What happened, who was affected, what was the impact?

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

The CIA triad: Definition, components and examples

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.

What is information security? Definition, principles, and jobs

What is information security? Definition, principles, and jobs

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.

What is a false flag? How state-based hackers cover their tracks

What is a false flag? How state-based hackers cover their tracks

False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice.

What is cybersecurity? Types, careers, salary and certification

What is cybersecurity? Types, careers, salary and certification

Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field.

Load More