Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.
The likelihood of a successful attack using a pair of vulnerabilities in some wireless access points with Bluetooth Low Energy chips against an enterprise network is currently low, but the fact that such an attack can bypass network segmentation is worrying.
What does dumping toxic waste in the the Chicago River and paying cyber extortionist have in common? Quite a lot, actually. Risk management expert Tony Martin-Vegue looks at the factors that drive the decision to pay or not pay the ransom after an attack.
The Food and Drug Administration outlines what manufacturers have to do to develop secure medical devices on the draft of its premarket guidance. The FDA laid out recommendations on what information to provide when submitting the devices for premarket approval.
The WordPress security team has a tough job: regularly fixing security issues found in the most popular CMS while providing users with the tools to make sure they aren't running older vulnerable code.
A new report from CyberX study shows that industrial control systems and industrial internet of things continue to struggle with devices being connected to the internet and legacy protocols exposing passwords.