Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is a computer worm? How this self-spreading malware wreaks havoc

Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature.

What is a computer virus? How they spread and 5 signs you've been infected

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

What is a Trojan horse? How this tricky malware works

What is a Trojan horse? How this tricky malware works

A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.

What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

What is malware? How to prevent, detect and recover from it

What is malware? How to prevent, detect and recover from it

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

What is OPSEC? A process for protecting critical information

What is OPSEC? A process for protecting critical information

Operations security (OPSEC) is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to...

Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.

The 6 biggest ransomware attacks of the last 5 years

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis.

What is a honeypot? A trap for catching hackers in the act

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.

7 hot cybersecurity trends (and 4 going cold)

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

Load More