Advice column: Why not use my browser as my password manager?

The environment in the U.S. surrounding digital security threats to journalists is evolving. What should journalists do to better protect themselves, sources, and colleagues from escalating digital security threats?
The choice between storing two-factor authentication codes on your device, versus a remote service in the cloud comes with some usability and security trade-offs.
Also available in Spanish.Passwords are the brittle wall that keeps unwanted visitors out of your accounts. When it comes to account protection, two-factor authentication is one of the most effective defenses available.Two-factor authentication, or 2FA for short, strengthens login security by requiring a second piece of information …
One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our digital security team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.
Data breaches, and in particular those including personal passwords for websites or apps, are evergreen news stories that repeat themselves like an Advent calendar for cybersecurity failures. Although these breaches are a regular phenomena, they are trailed by a long, drawn-out window of time where other attackers use breached data …
This year we're gifting simple security guidance, which I think we can all agree is better than another internet-connected kitchen appliance.
Many fear how the Trump admin will use surveillance to stifle dissent. Here's a beginner's guide to upping your privacy and security game.
The first step to a healthy digital life is an easy-to-implement strategy for managing your account credentials. You’ll notice that we’re using the term “passphrases” instead of “passwords.” Do you wonder why? In short, because passwords are obsolete. They’re too short, they tend to be unimaginative, and chances are, they’re …
Journalists and Journalists and newsrooms are increasingly the victims of hacking and malware, and hackers often target them through email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom involves a relatively simple email attack: phishing and spear phishing.Phishing is a social-engineering attack where an adversary crafts …