Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

The 5 biggest ransomware attacks of the last 5 years

The 5 biggest ransomware attacks of the last 5 years

Ransomware isn't new, but the last few years have seen a remarkable uptick in this particularly nasty genre of attack software. The attacks highlighted here show how it has grown from a curiosity and an annoyance to a major crisis.

The dark web goes corporate

The dark web goes corporate

It's just as shady and dangerous as ever, but something has changed in the way the dark web does business, and it will look very familiar to IT buyers.

Inside the rickety, vulnerable systems that run just about every power plant

Inside the rickety, vulnerable systems that run just about every power plant

A security expert's warning: We're using Windows XP for a lot of awfully important things and hoping for the best.

New social media scams: Can you tell friend from foe?

New social media scams: Can you tell friend from foe?

Scams on social networks are nothing new, but they're constantly changing to take advantage of the latest apps, trends and news. As with all social engineering scams, the best defense is a skeptical user.

Teenagers who became hackers

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online"...

How to jumpstart your infosec career

How to jumpstart your infosec career

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security...

Infosec careers: There is no one true path

Infosec careers: There is no one true path

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security...

The IT equipment you can take into battle

The IT equipment you can take into battle

If you're in IT, you're as familiar with your laptop and your cell phone as a farmer is with his tools. And just like Japanese farmers with their kama, you might find yourself using one of those tools in battle, for offense or...

The security theory and troubling practice behind the TSA's PreCheck security lines

The security theory and troubling practice behind the TSA's PreCheck security lines

What is up with the TSA PreCheck program? Aside from being convenient, how does one get that pass through the security checkpoint? And how do you prove you are not a threat?

How to keep branch offices as secure as corporate HQ

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

What fake news means for IT—and how IT security can help fight it

What fake news means for IT—and how IT security can help fight it

The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about.

Who's on your IT security dream team?

Who's on your IT security dream team?

There are a number of important roles to fill, and I'm not just talking about job titles: I mean attitudes, and abilities that verge on superpowers. IT security is a team sport, so who do you want on your team?

The worst people you meet doing IT security

The worst people you meet doing IT security

Now I've collected specific kinds of insecure employees that infosec workers have had to deal with and protect—or protect their servers from. You'll definitely recognize people you work with on this list. Hopefully you won't recognize...

The internet of insecure things: Thousands of internet-connected devices are a security disaster in the making

The internet of insecure things: Thousands of internet-connected devices are a security disaster in the making

We talked to a host of tech experts about the state of security in the IoT world, and found out the good, the bad, and the very ugly.

Down but not out of options: How to keep IT security together in a company that's gone bankrupt

Down but not out of options: How to keep IT security together in a company that's gone bankrupt

If you're working for a company that's filed for bankruptcy, you're definitely going to encounter choppy waters when it comes to maintaining tech security. We talked to IT pros who have been through it to find out the best ways to...

Security is no fiction: Infosec on TV, film—and in space

Security is no fiction: Infosec on TV, film—and in space

Has film and TV depiction of IT security gotten any better since the '80s? We quizzed some tech pros hear their favorites and learn about the worst offenders.

How to keep IT security at the forefront during a merger

How to keep IT security at the forefront during a merger

Security pros weigh in on how to keep IT security at the forefront during a merger

Why the attack on the DNC won't be the last one like it

Why the attack on the DNC won't be the last one like it

Recorded Future has outlined a series of hacks targeting both campaigns over the past twelve months. The truth is that hackers have taken an interest in democracy and the electoral process for some time.

What security pros can learn from the networking team

What security pros can learn from the networking team

In truth, your security team has a lot to learn from the networking team about how to keep the whole organization running smoothly. We spoke to networking experts to find out what they most wanted security pros to know.

Just for show: 11 theatrical security measures that don't make your systems safer

Just for show: 11 theatrical security measures that don't make your systems safer

We talked to an array of tech experts to discover what security technologies are often just for show.

Load More