Security news that informs and inspires
headshot of Fahmida Y. Rashid with teal overlay

Fahmida Y. Rashid

Contributor

Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.

  • fahmida@decipher.sc
  • @FYRashid
  • 3DF6 3FDA FACC 7BC6
352 articles by Fahmida Y. Rashid

Capital One Breach Highlights Challenges of Insider Threats

The breach of Capital One data on Amazon Web Services is a insider threat story. Defending from malicious insiders is a different ballgame than from outsiders.

Insider Threat, Data Breaches

Enterprises May Not Know Which Devices Have URGENT/11 Flaws

VxWorks is the operating system no one has ever heard of, but it is widely used in industrial control systems, robotics and automation, industrial control systems, and Internet of Things. The URGENT/11 group of vulnerabilities in these devices can be exploited remotely.

Vulnerability, Internet of Things, Patching, Critical Infrastructure Security

Being on the Latest Windows Version Can Thwart Zero Days

Zero day vulnerabilities exploited in the wild is never good news, but if the user's machine is running the latest version of the operating system, the chances are good that the attack won't be successful against that machine, according to a Microsoft security engineer.

Microsoft, Vulnerability, Windows, Software Security

BlueKeep Exploit on Sale, Now We Wait

What a week for BlueKeep watchers. Chinese-language slide deck appears on GitHub with details on how to use the BlueKeep vulnerability, Immunity includes a working exploit in its penetration testing kit, and the WatchBog cryptocurrency-mining botnet now has a scanner looking for vulnerable Windows machines with Remote Desktop enabled.

Malware, Exploit Sales

Government Targets Encrypted Messaging Apps in Going Dark Argument

Law enforcement officials and lawmakers asking the technology industry to provide backdoors into encryption products is not anything new, but U.S. Attorney General William Barr did something past officials hadn't done before: Barr specified that the backdoors and workarounds should be in encrypted messaging apps.

Government, Encryption, End to End Encryption