“There are only two types of companies: those that have been hacked, and those that will be.”

— Robert Mueller, FBI Director, 2012
Alarming Data Privacy Statistics

7 Alarming Data Privacy Statistics

Data privacy is an ever-growing concern in our rapidly advancing technological world. To keep you informed, here are seven facts about data privacy that may surprise you: 1. 50% of…

Read More
Ross Ulbricht

Ross Ulbricht: The Man Behind Silk Road

An enterprising young man turned black market magnate, Ross Ulbricht reinvented the Silk Road for the digital age. His darknet marketplace envisioned as a libertarian paradise, sold everything from drugs…

Read More
Trojan horse

What Is a Trojan Horse?

We all know the story of the original Trojan horse: during the Trojan War, Odysseus and the Greeks hide their soldiers in a wooden horse that’s left outside the enemy…

Read More
Computer worm

What Is a Computer Worm?

Of all the types of malware out there, there’s one that takes sneakiness — and destruction — to the next level: the worm. Insidious, exploitative, and highly contagious worms have…

Read More
Computer virus

What Is a Computer Virus?

You probably know that it’s important to protect your computer from viruses. But many people don’t know exactly what viruses are — or what risks they can actually pose to…

Read More
Social engineering attacks

What Is a Social Engineering Attack?

When most people think about cybercrime, they picture highly technical hackers with advanced programming skills and a deep knowledge of how computers work. But as technology advances, it gets easier…

Read More
Alexander Peslyak

Who Is Alexander Peslyak?

You may know Alexander Peslyak better by another name: Solar Designer. Under that name, he’s led the Openwall project for over 20 years, producing state-of-the-art cybersecurity software and tracking down…

Read More
Bourne Shell

Steve Bourne and the Bourne Shell

Every time you use a computer, you can thank British computer scientist Steve Bourne. As the creator of the Bourne shell in 1979, he elevated programming to a new level,…

Read More

Discover the Creator of Nmap: Gordon Lyon

Most cybersecurity experts know Gordon Lyon by his pseudonym, Fyodor, but they all know him for his creation: Nmap, an incredibly advanced, feature-rich network scanner. What started as a dorm-room…

Read More
Daniel Stenberg

Who Is Daniel Stenberg?

Daniel Stenberg is a Swedish computer programmer who created one of the internet’s most important components: cURL, a tool that enables the transfer of data to and from servers using…

Read More
Mati Aharoni

Who Is Mati Aharoni?

Mati Aharoni is one of the biggest hidden forces in modern computing. As the creator of Kali Linux, he’s responsible for bringing cybersecurity to the masses. His work has enabled…

Read More
John McAfee

Who Is John McAfee?

Eccentric, outspoken and innovative, John McAfee made a name for himself as the creator of the first commercial antivirus software. His program, McAfee VirusScan, brought awareness of malware to the…

Read More
Troy Hunt

Troy Hunt, Have I Been Pwned?

Whenever a big hack occurs, Troy Hunt is one of the first responders on the scene. As one of cybersecurity’s biggest public figures, he’s made it his mission to educate…

Read More
Ransomware

What Is Ransomware?

Most of us think of viruses and Trojans when we hear the word “malware.” But in recent years, a different type of malware has been taking over as the go-to…

Read More