“There are only two types of companies: those that have been hacked, and those that will be.”
— Robert Mueller, FBI Director, 2012
Snort’s Creator Unmasked: Getting to Know Martin Roesch
Martin Roesch is one of the open source community’s most revered developers, best known for creating the Snort…
Who Is Onel de Guzman?
Onel de Guzman, like many hobbyist hackers, never thought that his “Love Bug” worm would get much attention….
What Is BCP?
BCP stands for Business Continuity Planning. It’s a proactive process that organizations implement to ensure the uninterrupted functioning…
Spear Phishing: the Most Terrifying Cyber-Attack
Spear phishing is one of the most high-profile — and costly — types of cyberattacks. Using masterful social…
5 Reasons Why Hackers Use Malware
Hackers use malware for various reasons, including financial gain, espionage, sabotage, or to make a political or ideological…
14 Essential Reasons to Use a VPN
Virtual Private Networks, or VPNs, have gained significant traction in recent years thanks to their versatile functionality and…
Learn What Adware Is Before It Destroys Your Computer
Let’s be honest: even when ads are subtle, compact, unassuming, and inoffensive, most of us don’t really like…
The Danger of Fileless Malware: Are You at Risk?
When we think of malware, we usually think of files: executable program files, infected email attachments, compromised videos…
Do You Know What Grayware Is? Learn About the Potential Threat
Much of the malware we encounter is blatantly ill-natured: cryptomining worms that monopolize your system resources, viruses that…
Concealed & Dangerous: Unveil the Truth About Rootkits
The idea of an attacker taking full control over your computer is a terrifying one. They could steal…
What Is a Trojan Horse?
We all know the story of the original Trojan horse: during the Trojan War, Odysseus and the Greeks…
What Is a Computer Worm?
Of all the types of malware out there, there’s one that takes sneakiness — and destruction — to…
What Is a Computer Virus?
You probably know that it’s important to protect your computer from viruses. But many people don’t know exactly…
What Is a Social Engineering Attack?
When most people think about cybercrime, they picture highly technical hackers with advanced programming skills and a deep…
What Are Tactics, Techniques, and Procedures (TTPs)?
In order to stop cybercriminals, one must get inside their heads and understand their goals, analyze their strategies,…
What Is pfSense?
pfSense is an open-source network firewall and router software distribution based on FreeBSD, an operating system derived from…
How to Secure Wi-Fi (12 Suggestions)
Securing your Wi-Fi network is essential to protect your devices and personal information from unauthorized access and potential…
13 Tips to Protect Your PII
Protecting your Personally Identifiable Information (PII) online is essential to prevent identity theft, financial fraud, and other cybercrime….
Who Is Alexander Peslyak?
You may know Alexander Peslyak better by another name: Solar Designer. Under that name, he’s led the Openwall…
Steve Bourne and the Bourne Shell
Every time you use a computer, you can thank British computer scientist Steve Bourne. As the creator of…
Discover the Creator of Nmap: Gordon Lyon
Most cybersecurity experts know Gordon Lyon by his pseudonym, Fyodor, but they all know him for his creation:…
H. D. Moore: the Visionary behind Metasploit
H. D. Moore is one of the world’s foremost cybersecurity researchers, but even if you don’t know his…
Who Is Daniel Stenberg?
Daniel Stenberg is a Swedish computer programmer who created one of the internet’s most important components: cURL, a…
Who Is Mati Aharoni?
Mati Aharoni is one of the biggest hidden forces in modern computing. As the creator of Kali Linux,…
Who Is John McAfee?
Eccentric, outspoken and innovative, John McAfee made a name for himself as the creator of the first commercial…
Who Is Brian Krebs?
Over the past three decades, Brian Krebs has combined his knowledge of computers and his talent for investigative…
Troy Hunt, Have I Been Pwned?
Whenever a big hack occurs, Troy Hunt is one of the first responders on the scene. As one…
The Ransomware Menace: Understanding and Mitigating Risks
Most of us think of viruses and Trojans when we hear the word “malware.” But in recent years,…
How to Secure WordPress (11 Suggestions)
WordPress is a content management system (CMS) based on PHP and MySQL for websites and blogs. It’s so…
What Is Ahrefs?
Ahrefs is a powerful and comprehensive suite of search engine optimization (SEO) tools used by website owners, digital…