Key Recommendations
All Articles
Your battery status is being used to track you online
A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that.
How linkedin’s password sloppiness hurts us all
Why start-ups must step up on data security
How to check if your vpn is leaking private data
A virtual private network is a great way to keep your internet usage secure and private whether at home or on public Wi-Fi. But just how private is your activity over a VPN? How do you know if the VPN is doing its job or if you’re unwittingly leaking information to those trying to pry into your activities?
Ten steps to beating id fraud: how you can avoid falling victim to the conmen
Politician’s fingerprint ‘cloned from photos’ by hacker
A member of the Chaos Computer Club (CCC) hacker network claims to have cloned a thumbprint of a German politician by using commercial software and images taken at a news conference.
Security for journalists, part one: the basics
Journalism can be a risky business. Reporters covering violence necessarily work in unsafe circumstances, and news organizations have to worry about getting sued for defamation or sanctioned by one government or another. But there are less dramatic but equally grave risks created by the ubiquitous use of digital communications technology, from email to camera phones.
Security for journalists, part two: threat modeling
If you know that your work as a journalist will involve specific risks, you need a specific security plan. In part one of this series, we covered the digital security precautions that everyone in news organizations should take. If one of your colleagues uses weak passwords or clicks on a phishing link, more sophisticated efforts are wasted.
Know of a resource that helps people secure their data? Submit it today