“There are only two types of companies: those that have been hacked, and those that will be.”
— Robert Mueller, FBI Director, 2012
Cybersecurity Executive Order 14028: What Are the Implications
Cybersecurity Executive Order 14028 was issued by the former President of the United States, Donald J. Trump, on May 12th, 2021. The executive order is designed to strengthen and improve…
7 Alarming Data Privacy Statistics
Data privacy is an ever-growing concern in our rapidly advancing technological world. To keep you informed, here are seven facts about data privacy that may surprise you: 1. 50% of…
Ian Clarke: The Man Behind Freenet
Computer scientist Ian Clarke fell in love with coding when he was a child. His lifelong interest in technology — and staunch commitment to his ethics — led him to…
Ross Ulbricht: The Man Behind Silk Road
An enterprising young man turned black market magnate, Ross Ulbricht reinvented the Silk Road for the digital age. His darknet marketplace envisioned as a libertarian paradise, sold everything from drugs…
Who Is Linus Torvalds? (Creator of the Linux Kernel)
Widely considered one of the biggest geniuses in computer science, Linus Torvalds is best known as the creator of the Linux kernel — the core of many of the world’s…
Mikko Hyppönen: Cybersecurity Superhero
Long considered one of the best minds in technology, Mikko Hyppönen has been waging war on malware for over 30 years. Born in Finland in 1969, he’s since been on…
Who Is David Bombal? (Cisco Hacker and YouTuber)
David Bombal is one of the world’s most prominent Cisco experts, credited with helping thousands of people earn their sought-after Cisco networking certifications. Through his collection of study materials, his…
Paras Jha: How a Brilliant Mind Unleashed a Computer Monster
Paras Jha, a self-taught programmer from New Jersey, made national headlines in 2017 as the creator of Mirai: one of the most successful — and destructive — botnets in history….
5 Reasons Why Cybersecurity Is a Good Career Choice
These days, you can’t turn on the TV or open your news app without hearing about cybercrime. Whether it’s a data breach, a malware attack or a new online censorship…
Spear Phishing: the Most Terrifying Cyber-Attack
Spear phishing is one of the most high-profile — and costly — types of cyberattacks. Using masterful social engineering, emotional manipulation, and false identities, spear phishers convince their targets to…
Learn What Adware Is Before It Destroys Your Computer
Let’s be honest: even when ads are subtle, compact, unassuming, and inoffensive, most of us don’t really like them. They interrupt your browsing flow and hijack your attention, making you…
The Danger of Fileless Malware: Are You at Risk?
When we think of malware, we usually think of files: executable program files, infected email attachments, compromised videos from filesharing sites, and countless other variations. Nobody likes malware, of course,…
Do You Know What Grayware Is? Learn About the Potential Threat
Much of the malware we encounter is blatantly ill-natured: cryptomining worms that monopolize your system resources, viruses that delete your files, ransomware that holds your computer hostage until you pay…
Concealed & Dangerous: Unveil the Truth About Rootkits
The idea of an attacker taking full control over your computer is a terrifying one. They could steal your files, monitor your web browsing, use your system resources for their…
What Is a Trojan Horse?
We all know the story of the original Trojan horse: during the Trojan War, Odysseus and the Greeks hide their soldiers in a wooden horse that’s left outside the enemy…
What Is a Computer Worm?
Of all the types of malware out there, there’s one that takes sneakiness — and destruction — to the next level: the worm. Insidious, exploitative, and highly contagious worms have…
What Is a Computer Virus?
You probably know that it’s important to protect your computer from viruses. But many people don’t know exactly what viruses are — or what risks they can actually pose to…
What Is a Social Engineering Attack?
When most people think about cybercrime, they picture highly technical hackers with advanced programming skills and a deep knowledge of how computers work. But as technology advances, it gets easier…
Who Is Alexander Peslyak?
You may know Alexander Peslyak better by another name: Solar Designer. Under that name, he’s led the Openwall project for over 20 years, producing state-of-the-art cybersecurity software and tracking down…
Steve Bourne and the Bourne Shell
Every time you use a computer, you can thank British computer scientist Steve Bourne. As the creator of the Bourne shell in 1979, he elevated programming to a new level,…
Discover the Creator of Nmap: Gordon Lyon
Most cybersecurity experts know Gordon Lyon by his pseudonym, Fyodor, but they all know him for his creation: Nmap, an incredibly advanced, feature-rich network scanner. What started as a dorm-room…
H. D. Moore: the Visionary behind Metasploit
H. D. Moore is one of the world’s foremost cybersecurity researchers, but even if you don’t know his name, you’ve probably been saved multiple times by his work. He created…
Who Is Daniel Stenberg?
Daniel Stenberg is a Swedish computer programmer who created one of the internet’s most important components: cURL, a tool that enables the transfer of data to and from servers using…
Who Is Mati Aharoni?
Mati Aharoni is one of the biggest hidden forces in modern computing. As the creator of Kali Linux, he’s responsible for bringing cybersecurity to the masses. His work has enabled…
Who Is John McAfee?
Eccentric, outspoken and innovative, John McAfee made a name for himself as the creator of the first commercial antivirus software. His program, McAfee VirusScan, brought awareness of malware to the…
Troy Hunt, Have I Been Pwned?
Whenever a big hack occurs, Troy Hunt is one of the first responders on the scene. As one of cybersecurity’s biggest public figures, he’s made it his mission to educate…
What Is Ransomware?
Most of us think of viruses and Trojans when we hear the word “malware.” But in recent years, a different type of malware has been taking over as the go-to…
What Made Kevin Mitnick the Most Wanted Hacker?
Kevin Mitnick’s knack for social engineering and unflappable curiosity had him hacking major telecom companies and tech industry giants when he was just a teenager. That trajectory led him to…
Eugene Kaspersky: The Genius Behind Kaspersky Lab
Eugene Kaspersky is best known as two things: the founder of the antivirus company Kaspersky Lab and one of cybersecurity’s most controversial figures. His malware-fighting prowess and his outspoken nature…