
Check if your account has been breached
If you have found your email in a data breach and the affected account is still active, you’re going to want to change the password for the relevant service right away.
If you have found your email in a data breach and the affected account is still active, you’re going to want to change the password for the relevant service right away.
On Jan. 9, 2024, the U.S. Securities and Exchange Commission’s account on X, formerly known as Twitter, was hijacked and used to post about the approval of a Bitcoin exchange-traded fund. This could have happened to anyone, whether an individual or a well-resourced organization. Learn how to mitigate similar attacks in this week's edition of our digital security digest
Two-factor authentication (2FA) is great because it helps harden your account security. The strongest 2FA option commonly available today depends on a piece of hardware, a security key — a little device you can plug into your USB port to help log in.
On all major browsers, research suggests many users overestimate the privacy promises of private browsing mode, with many believing that it allows them to hide their IP address, encrypt their web traffic, browse anonymously, and more. That’s why you’ll want to read about what private browsing mode does and doesn’t do.
We outline important decisions for newsrooms when setting up Signal tiplines
Police raid on Marion County Record underscores digital security threats to media orgs.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
También disponible en inglés.
Also available in Spanish.
Both the newsroom and individual journalists must make some changes to work from home securely.
Also available in Spanish.
One of the most common ways people get hacked is through phishing — when an attacker impersonates a trusted website to trick you into entering your credentials. But what if you never had to type in a password? Passwordless logins — known as passkeys — reduce your risk by enabling …
A study of mob censorship of journalists, and how media organizations and platforms are responding.
If you use Signal, the secure messaging app, you may have thought about getting a second account. The good news is you don’t need another phone plan to use a second Signal account, and you may be able to set it up on a range of devices.We’ll walk …
Journalistic work often depends on transcription services for creating written logs of recorded audio, from assisting in research to captioning videos to publication of interviews. But uploading audio to a transcription service means giving a copy of that — sometimes sensitive — recording over to a company.
In journalistic work, email introduces needless risk. But it's also tough to avoid. We must think through when and how to switch to different channels.
How do most U.S. journalism schools instruct on digital security? Our research suggests there's a long way to go.
When working together online, chat tools like Slack are useful, but allow the service provider to read your messages. Keybase simplifies the process of sharing files and having conversations securely.Keybase is end-to-end encrypted, meaning that only you and your conversational partners can read the messages and files you …
Also available in Spanish.
Freedom of the Press Foundation recently released a report detailing a record number of arrests throughout 2020 based on comprehensive data gathered by the U.S. Press Freedom Tracker, a project in collaboration with the Committee to Protect Journalists.Harlo Holmes, Olivia Martin, David Huerta, and Martin …
While there is now little evidence of U.S. election malfeasance, there's still so much more we can do.
How journalists can safely make the most of their confidential tip pages.