Tariffs and security updates

FPF's digital security advice column today answers, how can I tell my device isn’t infected with malware or spyware?
Recent insight into the capabilities and limitations of GrayKey, a secretive phone forensics tool, highlight the importance of updates
In lawsuit against NSO Group, documents reveal the spyware vendor disconnected 10 abusive government customers
Tracking IDs baked into your mobile device reveal visits to abortion clinics and more.
To be curious is to be human — including about what’s on that USB drive. But first, let’s think through how to access it safely.
Police raid on Marion County Record underscores digital security threats to media orgs.
Both the newsroom and individual journalists must make some changes to work from home securely.
The environment in the U.S. surrounding digital security threats to journalists is evolving. What should journalists do to better protect themselves, sources, and colleagues from escalating digital security threats?
Learn about how to tighten your home Wi-Fi router's security settings.
One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our digital security team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.
This guide is intended for readers familiar with using PGP who want to take an extra step in fortifying the security around their private key. Some of these steps also utilize a command-line interface, and it may be helpful to get comfortable with that interface before diving in. For a …
They are tethered to wireless networks, and we are tethered to them. We spend so much time with smartphones, yet most of us devote little of it contemplating our small computers. We often treat these valuable devices more like everyday household items, as opposed to curated archives of our lives. …
This year we're gifting simple security guidance, which I think we can all agree is better than another internet-connected kitchen appliance.
Many fear how the Trump admin will use surveillance to stifle dissent. Here's a beginner's guide to upping your privacy and security game.
For journalists covering political movements, reporting on protests is crucial, but these events come with unique security challenges. Here's how you can better protect your privacy and security.
Before heading to an event, read our piece about mobile security for activists for detailed context.
Before heading to an event, read our piece about mobile security for activists for detailed context.
So, you’ve been arrested covering an event. You’re taken to the police station, you’re booked, and your phone is confiscated. When you’re let out, after a few hours or even a few days, your phone is handed back to you in a plastic baggie, the SIM card and SD card …