Fahmida Y. Rashid

Contributor

Fahmida Y. Rashid is a freelance writer who wrote for CSO and focused on information security. Before joining CSO, she wrote about networking and security for various technology publications, including InfoWorld, eWeek, PC Magazine, Dark Reading, and CRN. She also spent years as an IT administrator, software developer, and data analyst. "I, for one, welcome our new computer overlords."

The advanced security techniques of criminal hackers

The advanced security techniques of criminal hackers

InfoWorld talks with Digital Shadows' Rick Holland about the security tools hackers use to protect themselves while ripping you off

Do developers really care about security?

Do developers really care about security?

InfoWorld talks with GitHub's Jamesha Fisher about the cultural shifts necessary for baking security early into the devops process

The threat hunter's guide to securing the enterprise

The threat hunter's guide to securing the enterprise

You're already breached. Here's how to track down attackers on your network before they wreak havoc.

What I learned playing prey to Windows scammers

What I learned playing prey to Windows scammers

Three months of phone calls prove Windows scammers are more skilled at social engineering than you think

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

The noted web security guru worries that the key web and application threats aren't getting the right level of focus

Hack the hackers: Eavesdrop for intel on emerging threats

Hack the hackers: Eavesdrop for intel on emerging threats

Listening to online chatter in hacker forums can give you a jump on juicy vulnerabilities your vendor hasn't fixed

Adobe warns: Cyberespionage group targeting critical Flash bug

Adobe warns: Cyberespionage group targeting critical Flash bug

Enterprises should disable Flash or deploy Microsoft's EMET until Adobe's promised patch arrives

Code red: Health IT must fix its security crisis

Code red: Health IT must fix its security crisis

Poor understanding of risk leaves health providers vulnerable to attack, as malicious hackers threaten to wreak havoc

Google to shutter SSLv3, RC4 from SMTP servers, Gmail

Google to shutter SSLv3, RC4 from SMTP servers, Gmail

Google Apps customers who still rely on SSLv3 or RC4 need to update to TLS or face the prospect of no longer being able to send out mail

4 big plans to fix internet security

4 big plans to fix internet security

Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

OpenSSL patches two high-severity flaws

OpenSSL patches two high-severity flaws

Versions 1.0.2h and 1.0.1t of the cryptographic library also patch several more bugs of lesser impact

How to tell if you've been hit by fake ransomware

How to tell if you've been hit by fake ransomware

Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily

Got ransomware? These tools may help

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

19 open source GitHub projects for security pros

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

New Azure tool helps IT tame SaaS apps

New Azure tool helps IT tame SaaS apps

Microsoft Cloud App Security reveals shadow IT and authorized cloud app usage, along with security controls to manage access

4 reasons not to pay up in a ransomware attack

4 reasons not to pay up in a ransomware attack

Ransomware attacks are on the rise. Here are four good reasons why you shouldn't pay to get your data back -- and one reason why people do

The dirty dozen: 12 cloud security threats

The dirty dozen: 12 cloud security threats

Introducing the 'Treacherous 12,' the top security threats organizations face when using cloud services

Make threat intelligence meaningful: A 4-point plan

Make threat intelligence meaningful: A 4-point plan

Threat intelligence is a hot topic, but it requires a ton of work to be operational and effective. Here's how to steer clear of the traps

NSA seeks to combine offense and defense in its spy efforts

NSA seeks to combine offense and defense in its spy efforts

NSA chief Michael Rogers argues against a presidential commission's proposal to restrict the NSA to foreign intelligence, and asks the tech industry for help

OpenSSL update fixes Drown vulnerability

OpenSSL update fixes Drown vulnerability

The Drown attack decrypts TLS sessions on servers supporting SSL v2 and using RSA key exchange

Load More