Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.
The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency warned in an advisory that cardio defibrillators from medical device company Medtronic can be modified while still implanted in patients. Without access control, the defibs can't differentiate between authorized and unauthorized instructions.
Security researchers and enterprise defenders have many Internet-wide scanning tools at their disposal. Researchers at Cisco Talos have developed a way to scan for hosts with IPv6 addresses using the UPnP protocol.
From an attacker’s perspective, the wider the net cast, the more number of potential victims caught. So it’s no surprise that Recorded Future research indicates attackers continue to rely heavily on exploits targeting Microsoft applications.
Slack Enterprise Key Management tool will let organizations with strict data protection requirements use their own encryption keys in their Slack workspace.
There is bipartisan consensus in Congress that a federal data privacy law is necessary. Public policy experts from Google, Microsoft, and Twitter discussed the issues lawmakers will need to address to craft meaningful privacy regulation at a panel at RSA Conference.