Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.
If we continue to think about cyber-warfare in the context of mass destruction and physical damage, we miss the fact that attackers are now taking more covert approaches to subvert existing systems. Disinformation is a dangerous tool.
Microsoft will do more than pay researchers bounties for finding and reporting vulnerabilities in Microsoft Account and Microsoft Entra ID in its Microsoft Identity Bounty Program. The company also wants vulnerabilities in select OpenID standards.
Why are attackers interested in compromising the Internet of Things? In this Decipher video, security experts discuss what attackers are looking for when they go after Internet-connected doorbells and other smart devices.
For organizations worried about phishing attacks and the prospect of losing control over their files the checklist from the Democratic National Committee is a good starting point to improve baseline security practices.
The CA Security Council's London Protocol attempts to address the problem of phishing sites with legitimate SSL/TLS certificates, but the initiative perpetuates the myth that the pricier EV certificates are more secure than DV certificates.