
Mobile security tips: Nine steps to prepare your phone before an action
Before heading to an event, read our piece about mobile security for activists for detailed context.
Before heading to an event, read our piece about mobile security for activists for detailed context.
So, you’ve been arrested covering an event. You’re taken to the police station, you’re booked, and your phone is confiscated. When you’re let out, after a few hours or even a few days, your phone is handed back to you in a plastic baggie, the SIM card and SD card …
The first step to a healthy digital life is an easy-to-implement strategy for managing your account credentials. You’ll notice that we’re using the term “passphrases” instead of “passwords.” Do you wonder why? In short, because passwords are obsolete. They’re too short, they tend to be unimaginative, and chances are, they’re …
Journalists and newsrooms are increasingly the victims of hacking and malware, and hackers often target them through email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom involves a relatively simple email attack: phishing and spear phishing.Phishing is a social-engineering attack where an adversary crafts an email …