Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.
Phishing is a numbers game—and the longer a kit remains hidden and active, the longer the attack can run and net more victims. The developers behind popular phishing kits are adopting best practices from the business world to streamline operations and make money.
MongoDB engineers spent the last two years developing field-level encryption, a scheme that would reduce the damage after a data breach.
It took only a few days for a Linux worm to start exploiting the vulnerability in the Exim mail transfer agent. Microsoft said some Azure customers have already been affected.
This is not the decentralized network we were promised. The majority of the world’s DNS transactions pass through authoritative name servers operated by less than 10 organizations, DNS Observatory found.
This is the single most important stat in venture capitalist Mary Meeker’s massive Internet Trends report: 87 percent of Web traffic is now encrypted. Oh, and use of secure messaging apps are on the rise.