Security news that informs and inspires
scrambled headshot of Fahmida Y. Rashid

Fahmida Y. Rashid

Senior Managing Editor

Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher.

Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.

  • fahmida@decipher.sc
  • @FYRashid
  • 3DF6 3FDA FACC 7BC6

Featured Articles

270 articles by Fahmida Y. Rashid

Chip-Based Credit Cards Did Not Stop Payment Card Fraud

Three years ago, the United States shifted to chip-enabled credit and debit cards. The big promise was that chip cards would reduce payment card fraud. While that is mostly true, millions of chip-cards are still getting stolen because some merchants haven't made the switch.

Finance Security, Payment Card Breach

Congress May Consider a U.S. Version of GDPR

Despite high-profile data breaches, increased scrutiny of how consumer data is used, and several hearings, there hasn’t been a lot of movement on privacy legislation out of Congress. That may change if lawmakers decide to pass the U.S. version of the European Union's data privacy law.

Government, Privacy

NIST Looking at AI to Calculate Bug Severity

IBM has been touting the potential of using Watson to help security analysts analyze large volumes of security data and make security decisions. The National Institutes of Standards and Technology may be considering using AI to help determine the severity of software vulnerabilities.

Nist, Vulnerability

New Bluetooth Bugs Let Attackers Take Over Wi-Fi Networks

The likelihood of a successful attack using a pair of vulnerabilities in some wireless access points with Bluetooth Low Energy chips against an enterprise network is currently low, but the fact that such an attack can bypass network segmentation is worrying.

Hardware, Bluetooth Security

Pay or Not Pay a Ransom? It’s Not That Simple

What does dumping toxic waste in the the Chicago River and paying cyber extortionist have in common? Quite a lot, actually. Risk management expert Tony Martin-Vegue looks at the factors that drive the decision to pay or not pay the ransom after an attack.

Ransomware