Security news that informs and inspires
headshot of Fahmida Y. Rashid with teal overlay

Fahmida Y. Rashid

Contributor

Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.

  • fahmida@decipher.sc
  • @FYRashid
  • 3DF6 3FDA FACC 7BC6
352 articles by Fahmida Y. Rashid

Firms Increasingly Affected by Breaches at Other Organizations

The world is more interconnected than ever, and that network of dependencies means when an organization experiences a security incident, so do other downstream organizations in the supply chain, Cyentia Insitute said in its latest analysis.

China, Risk Management

TLS Delegated Credentials to Protect Private Keys on Web Servers

Mozilla, Firefox, and Cloudflare team up to tackle a specific TLS security problem: what to do in CDN and large web deployments where the private key has to be installed on every web server. Delegated credentials are short-lived TLS private keys that are generated by the web server.

TLS, SSL

Macs Storing Copies of Encrypted Messages from Apple Mail

The Apple Mail app on the most recent Macs appear to be storing copies of encrypted emails in plaintext, an Apple IT specialist found. There is a way to turn this off, temporarily.

Macos, Apple

Nikkei Hit By BEC Scam As Payments Get Larger

Japanese media conglomerate Nikkei is the latest victim of BEC scams, as companies continue to fall for this form of fraud.

Social Engineering, Phishing

Supply Chain Security Requires Knowing Who to Avoid

There are many ways to share threat indicators and vulnerability details, but no good way to share concerns about untrustworthy suppliers and vendors in the supply chain. That needs to change.

China