Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is pretexting? Definition, examples and prevention

What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

Vishing explained: How voice phishing attacks scam victims

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

What is smishing? How phishing via text message works

What is smishing? How phishing via text message works

Don't let the cute name fool you, smishing is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.

SOC analyst job description, salary, and certification

SOC analyst job description, salary, and certification

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements.

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources.

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

12 top IDS/IPS tools

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.

Top cybersecurity facts, figures and statistics for 2020

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.

The OPM hack explained: Bad security practices meet China's Captain America

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Load More