Journalists often work with sensitive data, which they need to protect well in case an adversary searches their electronic device. In this article, tech security expert Bence Kócsi explains for Reporters Without Borders (RSF) how to create a decoy system to hide sensitive material. In their work, journalists have to […]
Digital safety
Chinese smartphone brand Honor, Huawei’s underhanded replica
Chinese smartphone manufacturer Honor, a former sub-brand of Huawei, is now stepping in Western markets in the face of mounting sanctions against the latter. Nevertheless, Honor indirectly belongs to the Chinese state and its products present major security issues that make them dangerous for journalists to use. Huawei is China’s […]
The dangers of AirTags and other trackers
Bluetooth trackers, such as Apple’s AirTags, are originally designed to help people find their belongings, but can also be used by malicious actors to secretly track people. Reporters Without Borders (RSF) examines the risks posed to journalists and what tech companies are doing to mitigate those dangers. Bluetooth trackers, such […]
Common misconceptions about digital safety
False ideas about technology and digital tools can lead journalists to carelessly behave on the internet, which can in turn compromise their safety or that of their sources. In this article, Reporters Without Borders (RSF) takes some common misconceptions about digital safety – and explains how things really work. “Incognito […]
Don’t get phished! Part 3: How to prevent phishing attempts
Phishing scams are designed to trick people, and even the most careful person can fall victim as the tactics continuously evolve. In this final article of a three-part multimedia series on phishing scams, Reporters Without Borders (RSF) gives advice to journalists on proactive steps to take to protect themselves against […]
Don’t get phished! Part 2: Introducing the five main phishing techniques
Phishing scams use deceptive messages to steal personal information from victims to access their accounts. In this second article of a three-part multimedia series on phishing scams, Reporters Without Borders (RSF) outlines the five most common phishing techniques journalists may come across, and how they can counter them. Phishing is […]
Don’t get phished! Part 1: What are phishing scams?
Phishing scams use deceptive messages to steal personal information from victims to access their accounts. In this first article of a three-part multimedia series on phishing scams, Reporters Without Borders (RSF) explains the risk they present for journalists, how to spot them and how to protect yourself against them. Phishing […]
Is cloud computing secure?
Cloud services such as Dropbox or Apple’s iCloud make it easy to access and share files from any location with internet access, but they also present risks. In this article, Reporters Without Borders (RSF) sums up the pros and cons of using the cloud for storing sensitive files and provides […]
USB safety Part 2: Protect your USB port
The USB port, if left unsecured, provides an easy path to bypass the plugged device’s security. In this second article of a two-part series on USB safety, cybersecurity expert Ben Finn explains for Reporters Without Borders (RSF) that public USB charging ports cannot be trusted, but data blocking tools exist […]
USB safety Part 1: Use secure USB drives
USB drives are generally used without much concern for security, but they actually present a number of serious vulnerabilities. In this first article of a two-part series on USB safety, cybersecurity expert Ben Finn explains for Reporters Without Borders (RSF) the risks and usage of USB drives and why journalists […]