digital security


Google Gives Free Security Keys to Activists, But Not if You’re in Iran or Syria

Sources and a document show how Google bars nonprofits from telling activists in certain countries about their products.
Joseph Cox

Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication

Users are angry that Facebook is letting others, including advertisers, look up users via the phone numbers they provided to enable two-factor authentication.
Lorenzo Franceschi-Bicchierai

How to Use GDPR To Stop Data Breaches Screwing You Over

You may just think of the GDPR as a privacy law. But you can use it to remove your sensitive data from company servers in anticipation of a hack.
Joseph Cox
Motherboard's Security Tuneup

Put an Extra Passcode On Your Cellphone Account

Your cellphone number is the key to your entire online identity. Criminals are increasingly targeting people's phone numbers as a way to steal their identities and break into their most sensitive accounts.
Kaleigh Rogers
Lorenzo Franceschi-Bicchierai

CryptoHarlem Is Teaching Digital Security to the Over-Surveilled Black Community

Inside a 'cryptoparty.'
Mack DeGeurin

The Activist Developer Who Helps Journalists Protect Data and Sources

Harlo Holmes helps journalists learn how to use the anonymous whistleblower platform SecureDrop and how to stay safe online.
Lorenzo Franceschi-Bicchierai
Stay Vigilant

How to Lead a Digital Security Workshop

Do you want to teach people about infosec, opsec and how to stay safe online? Here's where to start.
Rachel Weidinger, Cooper Quintin, Martin Shelton, and Matt Mitchell
The Hacks We Can't See

What Learning to Lockpick Taught Me About Digital Security

Until you pick a lock, or challenge a password, you'll never know if it's really secure.
Kate Lunau

Crypto Pushed By the UK Government Has a Big Security Loophole

The encryption keys are handled by a central authority, which can then decrypt all communications.
Joseph Cox

Use a Dell? Hackers Can Grab Your Laptop's ID

Scammers could use the code to pose as tech support and gain control of your laptop.
Joseph Cox