Fahmida Y. Rashid

Contributor

Fahmida Y. Rashid is a freelance writer who wrote for CSO and focused on information security. Before joining CSO, she wrote about networking and security for various technology publications, including InfoWorld, eWeek, PC Magazine, Dark Reading, and CRN. She also spent years as an IT administrator, software developer, and data analyst. "I, for one, welcome our new computer overlords."

5 signs your Web app has been hacked

5 signs your Web app has been hacked

Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all

Intel Security will discontinue McAfee SaaS products

Intel Security will discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

Intel Security to discontinue McAfee SaaS products

Intel Security to discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

Health care orgs fall short on software security

Health care orgs fall short on software security

A survey of major industries reveals health care organizations are below average in secure coding.

Adobe promises a new Flash Player update to plug zero-day bug

Adobe promises a new Flash Player update to plug zero-day bug

The latest zero-day vulnerability in Flash Player is currently under attack by Pawn Storm. Sit tight for an emergency patch next week

Google adopts single sign-on for more desktop, mobile apps

Google adopts single sign-on for more desktop, mobile apps

Google Apps administrators now can use single sign-on for a wider set of Web and mobile apps.

AWS security and compliance tools embrace enterprise clouds

AWS security and compliance tools embrace enterprise clouds

Two new Amazon cloud products proactively deal with security issues before they become security and compliance problems.

Attackers target OWA for domain credentials

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?

Attackers target Outlook Web Application for domain credentials

Attackers target Outlook Web Application for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?

EMV sets the stage for a better payment future

EMV sets the stage for a better payment future

Most merchants now have EMV credit card readers in place, yielding marginally improved security today -- and a platform for better payment systems arriving soon.

GitHub adds hardware-based authentication for developers

GitHub adds hardware-based authentication for developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys

GitHub expands hardware-based authentication to developers

GitHub expands hardware-based authentication to developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys.

Why Windows 10 is the most secure Windows ever

Why Windows 10 is the most secure Windows ever

With Device Guard and Credential Guard, Windows enjoys unprecedented protection from malware and advanced persistent threats

Secunia acquired by Flexera Software

Secunia acquired by Flexera Software

Organizations will now be able to use Secunia's software security audit tools in concert with Flexera's asset management capabilities.

Reports of attacks on the Department of Energy raise alarms

Reports of attacks on the Department of Energy raise alarms

The power grid may not be in immediate danger, but that doesn't mean the threat to critical infrastructure isn't there.

Reports of attacks on the Dept. of Energy raise alarms

Reports of attacks on the Dept. of Energy raise alarms

The power grid may not be in immediate danger, but that doesn't mean the threat to critical infrastructure isn't there.

Extortion or fair trade? The value of bug bounties

Extortion or fair trade? The value of bug bounties

Vendors without bug bounty programs risk the wrath of the infosec community, but such programs must be constructed carefully to yield optimal outcomes.

U.S. readies sanctions against China for cyber-spying

U.S. readies sanctions against China for cyber-spying

As the Obama administration prepares to impose sanctions on Chinese companies for economic cyber-espionage, experts question whether the penalties will have significant effect

U.S. readies sanctions against China for cyberspying

U.S. readies sanctions against China for cyberspying

Experts question whether the penalties on Chinese companies for economic cyber espionage will have a significant effect.

Who can stop malware? It starts with advertisers

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies.

Load More