Cybersecurity Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on May 07, 2024

How to Use Nmap to Scan for Open Ports

This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.

Image: Shutterstock / Built In
Ellen Glover Ellen Glover
Updated on May 03, 2024

What Is Online Privacy?

Complete online privacy doesn’t exist, but there’s still plenty you can do to protect your personal data.

Image: Shutterstock
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is SQL Injection?

SQL injection is a type of cyberattack that lets a criminal execute their own SQL queries on a database. Here are some examples.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is Smishing?

Smishing is when an attacker uses text messages to trick victims into giving up money, personal information or installing malware. Here’s how you can protect yourself.

Image: Shutterstock / Built In
Shahzaib Muhammad Feroz Shahzaib Muhammad Feroz
Updated on May 01, 2024

How Tech Can Combat Trade-Based Money Laundering

Worried about TBML? Here’s how you can use technology and stakeholder training to detect and squash it.

Image: Shutterstock / Built In
Fotios Chantzis Ioannis Stais Fotios Chantzis Ioannis Stais
Updated on April 27, 2024

Why Is IoT Security Important?

An excerpt from the forthcoming book Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things.

Jenny Lyons-Cunha Jenny Lyons-Cunha
Updated on April 26, 2024

Cybersecurity Is For Everyone: Three Women Leading the Charge at Prove

From hacker flicks to contemporary inclusion practices, three women talk about life at Prove.

Shutterstock
Brand Studio Logo
Brand Studio Logo
Built In Staff, With AI Built In Staff, With AI
Updated on April 26, 2024

Managed Intelligence Company Nisos Hires New CEO

Under new leadership, Nisos will invest in its intelligence capabilities to help organizations manage complex risk environments.

Image: Shutterstock