Projects walkthroughs, tool teardowns, interviews, and more.
Articles tagged: shields up
Shields Up: In the Face of Supply Chain Attacks, Stay the CoursePosted on
Everything you need to know about supply chain attacks, a kind of security breach that targets trusted distribution channels for delivering software and hardware.
Shields Up: Using Signal Without Giving Your Phone NumberPosted on
Encrypted messaging apps like Signal, as well as WhatsApp and Viber, use your phone number as your main username. This means that if I want to chat with someone on these apps, I have to give them my phone number. But we may have many reasons—both practical and principled—not to share our number with someone. These digits are personal.
Shields Up: Get Your Malware ShotsPosted on
Malware lets an unauthorized third party access or take control of your device. In practice, it’s become a catch-all term for a huge variety of malicious software. That could include software that hijacks computing resources, lets an attacker monitor your screen, keystrokes,microphone, or effectively turns your device into an expensive brick.
Two-Factor Authentication for NewsroomsPosted on
Passwords are the brittle wall that keep unwanted visitors out of your accounts. Breaches can hit anyone, but as frequent targets with sensitive sources, work, and personal information at risk, reporters should take extra care. When it comes to account protection, two-factor authentication is one of the most effective defenses available.
Shields Up: Developing Security SkepticismPosted on
A little fear can motivate us to take action. But as consumers of security news, even the most well-intentioned reporting can scare us into paralysis—or worse, encourage us to adopt behaviors that promote a false sense of security.
Opening Secure Channels for Confidential TipsPosted on
To make it easier for tipsters to share sensitive information, a growing number of news organizations are launching resources for confidential tips. This short guide will describe some basics around how to think about security on behalf of your sources before thinking about tools and practices.