
Google’s personal data removal updates
Google updates its “Results about you” tool to help users remove unwanted or outdated information about themselves
Google updates its “Results about you” tool to help users remove unwanted or outdated information about themselves
After government demands for global access to Apple’s end-to-end encrypted iCloud, the company disables the feature regionally
Welcome to “Ask a security trainer,” the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Submit yours here! Let’s jump right into this week’s question.Dear DST,I have some sensitive data …
While X might be able to block links, it will have a tougher time blocking Signal usernames
The “snoopers’ charter” order for access to end-to-end encrypted iCloud accounts applies globally
Happy Valentine’s Day! Like love itself, digital security is all about trust, confidentiality, and compatibility, so we worked with our friends at Calyx Institute on this set of valentines.Please feel free to choose your favorites, download them, print them if you like, and send them along to anyone …
Welcome to “Ask a security trainer,” the column where the Digital Security Training team at Freedom of the Press Foundation (FPF) answers your burning questions at the intersection of journalism and security. Submit yours here! Let’s jump right into this week’s question.Dear DST,I’m concerned about using biometrics …
Ever linked a new device to your Signal account, only to find you didn’t get your old messages? No longer!
In one of his first moves as president, Trump disbands cybersecurity board tasked with investigating Chinese attacks on U.S. telecoms
FPF's digital security advice column today answers, how can I tell my device isn’t infected with malware or spyware?
Let’s talk about protecting your well-being by prioritizing what security risks you want to address.
The New York Times reports media organizations are locking down their communications amid threats to the press.
People may have tried to scare you away from the anonymity-preserving Tor Browser. … Use it anyway!
Following CEO Pavel Durov’s arrest, the messaging app is giving more user IP addresses and phone numbers to U.S. authorities
Trump attorneys, incoming officials lay out intentions to use the legal system to bully media and investigate leaks
Our digital security training team on the advantages and disadvantages of a browser-based password manager
Purging your social media posts is getting much simpler
Our digital security training team's checklist to help journalists secure their digital life.
Among journalists, Bluesky is taking flight. Critical account security protections are still under development
FPF's digital security training team today answers, how can I safely share passwords and two-factor authentication methods with my team?
Recent insight into the capabilities and limitations of GrayKey, a secretive phone forensics tool, highlight the importance of updates
Sometimes I need gifts for my journalist friends. Journalists don’t typically treat themselves to gadgets and services that will make their jobs safer and easier, but maybe you can treat them instead.
To fine-tune your digital security, start with a risk assessment. A useful resource for your reporting process, a risk assessment will help you identify potential digital security risks and create a plan to mitigate them.
In lawsuit against NSO Group, documents reveal the spyware vendor disconnected 10 abusive government customers
FPF's digital security advice column today answers, how do I keep notifications from telling on me?