What I learned playing prey to Windows scammers
Three months of phone calls prove Windows scammers are more skilled at social engineering than you think
Fahmida Y. Rashid | 07 Jul | Read more
Three months of phone calls prove Windows scammers are more skilled at social engineering than you think
Fahmida Y. Rashid | 07 Jul | Read more
Listening to online chatter in hacker forums can give you a jump on juicy vulnerabilities your vendor hasn't fixed
Fahmida Y. Rashid | 16 Jun | Read more
Enterprises should disable Flash or deploy Microsoft's EMET until Adobe's promised patch arrives
Fahmida Y. Rashid | 15 Jun | Read more
Poor understanding of risk leaves health providers vulnerable to attack, as malicious hackers threaten to wreak havoc
Fahmida Y. Rashid | 02 Jun | Read more
Google Apps customers who still rely on SSLv3 or RC4 need to update to TLS or face the prospect of no longer being able to send out mail
Fahmida Y. Rashid | 18 May | Read more
Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom
Fahmida Y. Rashid | 13 May | Read more
The fixes are available for all supported versions of GitLab Community Edition and GitLab Enterprise Edition
Fahmida Y. Rashid | 07 May | Read more
Versions 1.0.2h and 1.0.1t of the cryptographic library also patch several more bugs of lesser severity
Fahmida Y. Rashid | 05 May | Read more
Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily
Fahmida Y. Rashid | 29 Apr | Read more
Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you
Fahmida Y. Rashid | 29 Apr | Read more
The stored XSS vulnerabilities in vReader affected only some versions, but could result in code execution
Fahmida Y. Rashid | 17 Mar | Read more
Ransomware attacks are on the rise. Here are four good reasons why you shouldn't pay to get your data back -- and one reason why people do
Fahmida Y. Rashid | 14 Mar | Read more
Introducing the 'Treacherous 12,' the top security threats organizations face when using cloud services
Fahmida Y. Rashid | 11 Mar | Read more
Google continues its monthly security update cycle for Android, fixing nearly 20 vulnerabilities in the latest bulletins
Fahmida Y. Rashid | 08 Mar | Read more
The DROWN attack decrypts TLS sessions on servers supporting SSL v2 and using RSA key exchange
Fahmida Y. Rashid | 02 Mar | Read more