What we know about video conferencing with Zoom

Learn about the security, privacy, and anti-abuse measures of the Zoom video chat platform.

What we know about video conferencing with Google Meet

Learn about the security, privacy, and anti-abuse measures of the Google Meet video chat platform.

What we know about video conferencing with Jitsi Meet

Learn about the security, privacy, and anti-abuse measures of the Jitsi Meet video chat platform.

What we know about video conferencing with Whereby

Learn about the security, privacy, and anti-abuse measures of the Whereby video chat platform.

Evaluating videoconferencing tools

We outline some of the questions we think about when critically assessing video conferencing tools, and how journalists can determine what’s right for them.

Choosing the right video conferencing tool for the job

Learn about which video chat tools are secure and practical for your situation.

What about antivirus?

Antivirus software is one of the oldest offerings available from the now-billion-dollar cybersecurity industry. But what does antivirus software do to help protect our devices, what does it not do, and do we really need it?

Where does your team store its two-factor authentication codes?

The choice between storing two-factor authentication codes on your device, versus a remote service in the cloud comes with some usability and security trade-offs.

How reporters’ emails get got: Case studies in legal requests and hacking

Before potentially burning a source or tipping off a target before you're ready, journalists should know the privacy and security constraints of email — who can see your emails, and when?

We ran over some security keys with a car and some still worked

One of the most common questions we get in training journalists on two-factor authentication (2FA) is: How hard are these hardware security keys exactly? Our digital security team has plenty of anecdotes to support their durability, but we've decided to methodically put them to the test.

Categories