Josh Fruhlinger

Contributing writer

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

Computer viruses explained: Definition, types, and examples

Computer viruses explained: Definition, types, and examples

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

What is phishing? Examples, types, and techniques

What is phishing? Examples, types, and techniques

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.

What is spear phishing? Examples, tactics, and techniques

What is spear phishing? Examples, tactics, and techniques

Spear phishing is a targeted email attack purporting to be from a trusted sender. Learn how to recognize—and defeat—this type of phishing attack.

What is a botnet? When infected devices attack

What is a botnet? When infected devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised to launch DDoS attacks, spread phishing spam, mine bitcoin, and more.

What is SSL? How SSL certificates enable encrypted communication

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

8 IT security disasters: Lessons from cautionary examples

8 IT security disasters: Lessons from cautionary examples

An attack needs to really stand out to earn the name "disaster."

What is SIEM? Security information and event management explained

What is SIEM? Security information and event management explained

SIEM software collects and aggregates log and event data to help identify and track breaches. It is a powerful tool for security insights.

What is XSS? Cross-site scripting attacks explained

What is XSS? Cross-site scripting attacks explained

Cross-site scripting (XSS) is a cyberattack in which a hacker enters malicious code into a web form or web application url.

What is RBAC? Role-based access control explained

What is RBAC? Role-based access control explained

Role-based access control (RBAC) is an approach for restricting access to digital resources based on a user’s role in an organization

Malware explained: Definition, examples, detection and recovery

Malware explained: Definition, examples, detection and recovery

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs attackers use to wreak destruction and gain access to sensitive information. Here’s what you need to know.

Social engineering: Definition, examples, and techniques

Social engineering: Definition, examples, and techniques

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs.

DDoS attacks: Definition, examples, and techniques

DDoS attacks: Definition, examples, and techniques

A distributed denial of service (DDoS) attack is when an attacker disrupts the delivery of a service, typically by flooding a system with requests for data. They have been part of the criminal toolbox for twenty years, and they’re...

What is PII? Examples, laws, and standards

What is PII? Examples, laws, and standards

Personally identifiable information (PII), is any piece of data that could be used—either alone or when combined with other data—to identify an individual. Some types of PII are obvious, such as a name or Social Security number, but...

The 7 best password managers for business

The 7 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

How IPsec works, it’s components and purpose

How IPsec works, it’s components and purpose

IPsec (Internet Protocol Security) is a suite of protocols that are used to secure internet communications. It is a common element of VPNs.

8 top ethical hacking certifications employers value

8 top ethical hacking certifications employers value

If you're looking for a job as a penetration tester, these certs will help you demonstrate your hacking skills and your commitment to the field.

11 penetration testing tools the pros use

11 penetration testing tools the pros use

Automated and open source tools can help you conduct web application, network, and database penetration tests.

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing is a means of evaluating the security of a network or computer system by attempting to break into it. It is an exercise undertaken by professional pen testers (aka ethical hackers) with the permission of the...

6 security analyst certifications to advance your career

6 security analyst certifications to advance your career

Whether you're just starting out in your security career or you're on your way to the top, these certs can give you a leg up.

How to hack a phone: 7 common attack methods explained

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

Load More