Digital Security
In today’s society, influenced by social media, the lure of online trends can often lead to actions with dangerous consequences. TikTok is a social media platform where users can create, share, and watch short videos.
Metamorphosis Foundation | 3 min read | Nov 4, 2024
When it comes to reading, many opt for easy and enjoyable reads, but we have an excellent recommendation for those looking for something more profound.
“The Mirage of Truth: Complexities and Challenges of Disinformation in the Western Balkans” is a perfect read for those who want to learn more about the disinformation landscape in the region.
Metamorphosis Foundation | 1 min read | Oct 29, 2024
A student party in Skopje this spring took an unexpected turn when playing an Albanian song towards the end of the event sparked controversy and hate speech on social media. Despite the organization’s inclusive nature, which includes members from diverse ethnic backgrounds, a nationalist group named “Patriotsko drushtvo” (Patriotic Society) on Instagram, self-proclaimed as a “young, ambitious group of patriots filled with enthusiasm,” criticized the inclusion of the song in Albanian, triggering hate speech aimed at the student organization.
Metamorphosis Foundation | 5 min read | Oct 29, 2024
The new video from the Metamorphosis Foundation reminds you why we should focus more on Open Data.
Metamorphosis Foundation | Oct 28, 2024
What can we learn about our organization using social media monitoring tools?
Political Capital | 14 min read | Oct 2, 2024
We are inundated with information, but we still know nothing about important things. In addition to the exhausting traditional platforms, we find our way through newer and newer channels, but we usually receive filtered information and endless impulses. Division is growing, trust is in ruins. Instead of running away, it's worth understanding the situation, and we also have room for maneuver as an NGO.
NIOK | 5 min read | Oct 2, 2024
To find out what influences social media reach and how we can put the algorithm to work for you, read on!
NIOK | 6 min read | Oct 2, 2024
See the newest video from Metamorphosis Foundation and learn about the mechanisms behind the political manipulation.
Metamorphosis Foundation | Sep 10, 2024
We live in a digital age where every day we witness the advancement of one of the most prominent trends of our time: artificial intelligence. The beauty of this new trend lies in its accessibility to everyone and its versatility for virtually every need: writing texts, assembling ready-made code for programs, assisting in the creation of 3D models, which can then be used in medicine, and much more. However, for the time being, artificial intelligence is mostly used for generating images.
Metamorphosis Foundation | 4 min read | Sep 4, 2024
Learn more about the two-factor authentication in a new video by Metamorphosis Foundation!
Metamorphosis Foundation | Aug 30, 2024
An algorithm is a procedure used to solve a problem or perform a calculation. Algorithms operate based on an exact list of instructions carried out step by step or routinely based on hardware or software. On social media, algorithms are rules, signals, and data that govern the platform's operation. These algorithms determine how content is filtered, ranked, selected, and recommended to users. In a way, algorithms influence our choices and what we see on social media.
Metamorphosis Foundation | 3 min read | Aug 27, 2024
In today's information society, where digital technologies and the internet are increasingly important, media literacy is becoming an indispensable skill area. This includes the ability to analyze information, understand its sources, and to understand how the media shape our perception of the world.
Civic Resilience Initiative | 4 min read | Aug 26, 2024
Images created by artificial intelligence are becoming more and more realistic, and thus more difficult to distinguish from real photographs. There are several methods which may be used to identify photographs created by AI, by noticing their unnatural textures or warped backgrounds.
Metamorphosis Foundation | 2 min read | Aug 20, 2024
With phones practically glued to our hands and constantly going off with notifications, we are in an era where devices dictate our every move. The pressure to remain constantly informed and up to date with current events can sometimes become too big and overwhelm us. This marks a period where it is necessary to take a step back and create some distance from the devices dominating our lives.
Metamorphosis Foundation | 2 min read | Aug 20, 2024
The rise of Artificial Intelligence is permeating every facet of society, from daily life, education, healthcare, manufacturing, security, and finance, all the way to social media. One critical issue emerging is the challenge of distinguishing between what is real and what is generated by AI. Due to negative criticism, addressing and clarifying how AI should be utilized properly becomes imperative.
Metamorphosis Foundation | 2 min read | Aug 19, 2024
In Lithuania, as in many other countries, children are spending more and more time on the internet. New technologies, social media platforms, games and social networks are becoming an integral part of children’s daily lives. Youngsters spend more than a few hours a day online. This includes gaming, social networking, watching videos, studying and other online activities. Of course, the amount of time spent on the internet can vary depending on a child’s age, hobbies, family agreements and other factors, but there is a trend that children are starting to use the internet and spend their leisure time online at an increasingly younger age.
Civic Resilience Initiative | 4 min read | Jun 27, 2024
It has probably happened to you - you comment on some of your own views on Facebook or post something that may not seem so controversial to you. Someone with an opposing opinion appears and conveys this in a provocative and stubborn tone. Suddenly, the entire conversation is thrown in an illogical direction, you waste time and nerves, and in the end, you wonder how such people can exist.
In short, you’ve encountered a troll.
Metamorphosis Foundation | 5 min read | Jun 26, 2024
At present, more than one third of the world’s population uses the Internet, and this trend is on a continuous rise. It is almost impossible to imagine life without the Internet, which offers thousands of information sources, digital books and maps, social media, e-commerce, digital libraries and museums, news…
Metamorphosis Foundation | 2 min read | Jun 26, 2024
Cyber security is very important in Lithuania due to the rapidly changing technologies and the growing popularity of Internet use. More and more residents, companies and government institutions in Lithuania are becoming dependent on internet and digital technologies every day. One of the most significant reasons why cyber security is of extreme importance in Lithuania is personal data protection. More and more sensitive personal data, such as bank logins, health and identity data, are being stored online.
Civic Resilience Initiative | 7 min read | Jun 25, 2024
The environment of non-profit organizations tends to be dynamic. Combinations of full-time and part-time workers, volunteers, collaborating freelancers or students on internships are more common here than in corporate settings. Along with the lower budgets that nonprofits typically work with, this vibrancy often translates into some team members using their own equipment or software to do their work. However, this makes it impossible to have a central administration that can, for example, ensure a deadline for mandatory password changes or enforce updates. This makes it all the more necessary to rely on the personal responsibility of team members and to encourage them to follow at least basic security rules.
Petra Kudrna Sobková | 5 min read | Jun 10, 2024
In today's digital landscape, our online activities mirror real-life processes. Just as in the physical world, nobody is completely immune to fraud, theft, deception, and other threats on digital platforms. The evolution of digital technologies and services has paved the way for many inventive methods for dishonest individuals or organizations to access and exploit data for their own good. However, real-world security measures like locking doors and setting alarms, do have equivalents in the digital realm, so that we can identify risks and safeguard ourselves against cyberattacks. In this article, we offer some insights for small organizations on effectively preparing for a cyberattack. Given the increasing frequency of such incidents, it's crucial for every organization, regardless of size, to have a comprehensive action plan in place.
Baltic Centre for Media Excellence | 9 min read | Jun 7, 2024
Fake news is believed to be complex for various reasons. Among other things, they refer to our personality and attitude to facts, and there are various cognitive mechanisms that distort our perception. The question arises: How can we become more resilient?
Metamorphosis Foundation | 2 min read | Jun 4, 2024
Online scams are an inexhaustible topic where virtually anyone can be a victim, no matter how knowledgeable and educated they are and how many times they say "don't click" to themselves. This is true in particular when someone's health is at stake, and people can easily fall for manipulations and fake news when they are vulnerable or feel helpless. Thus, there are frequent examples of users of social networks clicking on advertisements for medicine promising to cure hundreds of diseases, various supplements for rapid weight loss within a few days, purifying the body in just a few hours, etc.
Metamorphosis Foundation | 2 min read | Jun 4, 2024
Misinformation from various platforms spreads rapidly around the world, proliferating through social media further without verification by users. Social networking platforms are designed to distribute as much content as possible to users that captures their attention. Since the human brain works in such a way that it pays more attention to negativity and fear, the content served tends to be negative. This enables social networks to influence entire populations at an unprecedented scale and speed. An MIT University study shows that fake news spreads 6 times faster than verified news. In such an environment, how can activists and officials communicate effectively, and how are they organized? How are they countering misinformation?
Metamorphosis Foundation | 1 min read | Jun 4, 2024
Digital transformation has made organizations dependent on technology for performing their work. But despite its many benefits, digitalization also brings cybercrime. According to the “Nonprofit Tech for Good Report” from 2023, 27% of NGOs around the world have suffered at least one cyberattack. NGOs collect, manage and process large amounts of data on people in sensitive situations as well as financial data from donors, which are the main reasons they are targeted by malicious actors, making the sector the third industry most targeted by hackers.
Metamorphosis Foundation | 2 min read | Jun 4, 2024
A third article in the series about the data-based communication. This time we are discussing the tools the organizations may use.
NIOK | 8 min read | Jun 3, 2024
In recent years, platform regulation projects have forced companies to actively fight against what they call "harmful content". This is the case of the Digital Services Act, an ambitious project that has been implemented in the European Union and has served as inspiration for similar projects, such as the UK's Online Safety Bill or the so-called "fake news project" in Brazil.
Linterna Verde | 5 min read | May 10, 2024
In Makaia, we work to strengthen social development capabilities based on technology, cooperation and innovation. From the Digital Resilience project, which is based on the Hive Mind platform, we seek to create and share tools, knowledge and good habits in the digital sphere to counteract misinformation in the Latin American region.
MAKAIA | 1 min read | May 9, 2024
If you have a cellphone, you use social or have email, you have surely left your data somewhere, or some platform has had access to it, including your voice. That's why, when you mention or search for shoes, the pages you visit show you lots of advertising and even different options. Or just put your name, number, ID or email in search engines, to realize the information that other people have access to just by clicking on it.
Camila Gil | 7 min read | May 9, 2024
In an era where digital activism and security are paramount, the West Africa Civil Society Institute (WACSI) continues to lead the charge in leveraging technology to bolster the capabilities of civil society organisations (CSOs) across the region.
Kwame Asante | 1 min read | Apr 24, 2024
Another message lands in the email with an attachment and a task: print, sign, scan and send back. Who wouldn't know this? Even though we live in the digital age, we still can't get rid of the paper shackles.
VIA Association | 6 min read | Apr 2, 2024
Although cyber security is not a new concept, discussed both publicly and in everyday life, its meaning has changed over time. Nowadays, the concept of cyber security covers an increasingly wide range of areas and is becoming more and more important, at a national and personal level. This is due to the rapid and all-encompassing development of new technologies, which are bringing many areas of life, including personal life, into the cyberspace.
Civic Resilience Initiative | 5 min read | Mar 26, 2024
The need for objectivity, neutrality and balance in journalism is a daily challenge for professional media, but one of the biggest challenges to media professionalism comes with the elections. The election process presents a challenge for the media, as it puts into focus their purpose to offer citizens access to all facts, opinions and ideas in the campaign. Journalists must also ensure access to the media so that citizens' voices can be heard beyond the words of political debate.
Metamorphosis Foundation | 3 min read | Mar 21, 2024
The population across the European Union is ageing. This is a fact that is more often looked at as a problem, rather than an opportunity. However, it is time to reverse the perspective. One of the main problems especially in countries like Bulgaria, is that opportunities are not given and sought for the active inclusion of the elderly in public life. Due to the digitalization of the world a big part of social debates has migrated to the digital space. Elderly people want to participate and be heard.
Kristina Hristova | 8 min read | Feb 29, 2024
Critical thinking is the ability of an individual to recognize or evaluate and critically analyze a particular issue. Critical thinking develops from an early age, and every person acquires it on an individual basis. To determine if we have critical thinking, we must acquire skills for observation, analysis, interpretation, reflective thinking, evaluation, conclusion, explanation, problem-solving, and making the most appropriate decisions, writes Portalb.mk.
Metamorphosis Foundation | 3 min read | Feb 15, 2024
Until a few years ago, online shopping was primarily associated with tech-savvy individuals or used for specialized products. However, nowadays, online shopping has become a normal part of our daily lives. Entrusting personal banking information to the online realm no longer sounds as daunting as it did a decade ago. Although online money transfers through banks are more secure than ever, it doesn't mean we shouldn't be cautious about spending money online.
Борјан Гаговски | 4 min read | Feb 14, 2024
Did you know that the first password as we know it today was used over sixty years ago? Passwords are an essential security feature and are therefore often the target of various Internet fraudsters. Although passwords are a traditional part of cybersecurity training, many users don't take very good care of them. As a result, they may lose their accounts or finances. And since we carry bad habits into the work environment as well, when combined with poor security policies, sensitive client data or an organization's reputation can be at risk. In this article, we'll go over some tips on how to take care of your passwords so that you can feel more secure and simplify your work at the same time.
Petra Kudrna Sobková | 5 min read | Feb 5, 2024
In this video series we focus on debunking common cybersecurity myths. Oftentimes, these myths do stem from real-world examples, but have been exaggerated or simply outdated due to the rapid growth of technology in the past several decades. Yet, some myths remain extremely resilient, and many people use them as colloquialisms even today!
Goce Arsovski | 2 min read | Feb 2, 2024
Since 24 February 2022, when the Russian Federation started an aggressive and unjustified war against Ukraine, both the neighboring countries and the Republic of Moldova have been targets of propaganda and disinformation from the Kremlin. The waves of disinformation have forced the authorities in Chisinau to adopt various measures, including legislation, to protect Moldova's information space and its citizens from Kremlin propaganda transmitted through various channels. This article analyzes what can the authorities do to stop the spread of disinformation on the example of the Republic of Moldova.
Lilia Cravcenco-Zaharia | 5 min read | Jan 24, 2024
In this video series we focus on debunking common cybersecurity myths. These myths often do stem from real-world examples, but have been exaggerated or simply outdated due to the rapid growth of technology in the past several decades. Yet, some myths remain extremely resilient and many people still use them as colloquialisms!
Goce Arsovski | 2 min read | Jan 23, 2024
In this video, the Metamorphosis Foundation shows what propaganda actually is and where and how it shapes opinions even today.
Goshe Nikolov | Jan 17, 2024
As we approach the end of yet another tumultuous year, it is a worth taking a step back and taking a broader look over the past 12 months. What worked and what didn’t, what we could have done to better prepare ourselves, and finally, what to expect from 2024 as it is right around the corner.
Goce Arsovski | 9 min read | Dec 15, 2023
The concept of “think before you click” is one of the most important factors in terms of information safety. This regards everything that is offered to you on social networks, the advertisements that pop up as you read a text on a web-page, links that “invite” you to open them as you are watching a YouTube video, and the "like" button.
Antonija Popovska | 2 min read | Dec 13, 2023
We are living in times when there is much more information gathered, structured, created, and shared than ever before. Even the most cautious of us can fall for a fake ad. Today, technologies, social media and artificial intelligence tools can bring positive change to individuals and communities, but they can also destroy them. How can people protect themselves from misleading content? This series of four articles, produced in cooperation with the Baltic Media Centre of Excellence, will remind you of the basics of media literacy skills that you cannot do without in the digital environment.
Baltic Centre for Media Excellence | 6 min read | Dec 7, 2023
Anastasiia Apetyk is a lawyer and expert on information rights and digital security. Since 2017, she has been researching security issues at the community level, problems of information and digital rights, data protection, and digital security at the Expert Centre for Human Rights in Kyiv, Ukraine. She advises on and develops training programmes in the field of digital rights and digital security for executive authorities and local government.
Goce Arsovski | 10 min read | Oct 31, 2023
Non-profit organizations certainly share a common denominator, but we can hardly generalize anything related to them. Especially when it comes to cybersecurity. NGOs vary one from another in their form, mission, area of responsibility, as well as budgets. And for a hacker, each of them plays its own role. When hearing the term “cyber attack” most people imagine a failure of all computer systems, loss of access to data and a ransom of staggering amounts. Of course, this sort of attacks happen too. However, there are also smaller-scale cyber attacks. They may not be as spectacular on the surface, but can also result in financial loss or leakage of important information. We are referring to social engineering attacks.
Petra Kudrna Sobková | 3 min read | Oct 25, 2023
Online violence involves using digital technologies to perpetrate acts of violence. This can occur on social media platforms, messaging apps, gaming platforms, and mobile phones. According to UNICEF, it refers to repeated behavior aimed at intimidating, angering, or shaming those it targets.
Meri | 3 min read | Oct 12, 2023
The number of online purchases by Macedonian citizens is increasing, and concurrently, scams targeting citizens shopping on virtual stores are proliferating. To avoid "emptying" credit cards through scams, there are several recommendations that we, as citizens, should follow when making our online purchases.
Бојан Блажевски | 3 min read | Oct 12, 2023
Klaudia is the co-founder of Vidoc Security Lab, an Application Security Expert with years of experience. Her dedication to security research led to the creation of Vidoc, a platform for security professionals, gaining global recognition by discovering hundreds of vulnerabilities through bug bounty programs with prominent tech giants.
Beyond spearheading the startup, Klaudia actively engages with NGOs and the tech community, sharing knowledge and empowering human rights activists across Central and Eastern Europe.
Goce Arsovski | 7 min read | Sep 25, 2023
The influx of media texts, videos, photos, as well as social media posts, nowadays is immense, as they constantly appear on our devices through which we communicate on the internet daily. Bombastic headlines and announcements of spectacular discoveries in such content often lead us to forget one of the fundamental rules of creating media content — the signature of the author behind them.
Бојан Блажевски | 4 min read | Aug 30, 2023
Is your favorite messaging app secure? Does it offer encryption, or features like “hidden” chat, or “secret” chat? Or maybe you are not too worried about using secure messaging, because, who needs it anyway.
Goce Arsovski | 2 min read | Jul 31, 2023
Civil society organisations (CSOs) play a vital role in society, serving various causes and providing essential services. However, like any other entity operating in the digital age, CSOs are not immune to cyber threats. In fact, these organisations can be attractive targets for cybercriminals due to the valuable data they possess and their potentially limited cybersecurity resources.
Kwame Asante | Jun 20, 2023
Disinformation and online manipulation is a widespread issue, targeting a number of minority groups based on gender, sexual expression, race, age, and more. In light of the rise in politically driven attacks on the rights of LGBTQI+ persons, it's critical to counter disinformation in order for them to receive treatment for physical and mental health, sex reassignment procedures, and have safer spaces in schools and communities.
Sibongile Ndlovu | 8 min read | Jun 14, 2023
The internet has taken the globe by storm for the past 30 years, and it’s almost impossible to imagine the world without it. Digital privacy can be at risk without the proper online precautions in place.
Sibongile Ndlovu | 6 min read | Jun 14, 2023
Have someone make fun of you in front of other people?
Have you been critized and offended by how you dress, think or talk?
Do you know of people that follow or investigate you?
Oscar Levy | 3 min read | Jun 13, 2023
Open call for civil society organizations, independent media or journalist and digital activist of Latin America.
MAKAIA | 2 min read | Jun 2, 2023
Welcome to the "Expert Tips on Online Security and Privacy series" vol. 1
Goce Arsovski | 1 min read | Apr 26, 2023
Close friends and family have a very important role to play when it comes to our digital privacy and security. Since most of us regularly communicate with those close to us using digital tools and channels, and we are not ready to give up those modes of communication, we must be aware of our increased exposure when using them.
Goce Arsovski | 4 min read | Mar 1, 2023
Traditionally, at the beginning of each year, large companies and organizations share with the public their opinions and predictions for the new year in the context of digital security. Looking back, 2022 was marked by a series of major events in the digital world, some of which will definitely leave a mark in the years (even decades) to come.
Goce Arsovski | 6 min read | Feb 21, 2023
Phambano Technology Development Centre was founded in 2017.
Our aim is to provide sustainable technology-related solutions and support technology development among civil society organisations (CSO’s) that work on social justice issues across Southern Africa.
Sibongile Ndlovu | 1 min read | Feb 16, 2023
In this webinar, hosted by the West Africa Civil Society Institute, we sought to increase knowledge sharing on digital security and resilience.
Kwame Asante | Jan 26, 2023
On Wednesday 16 November 2022, The West Africa Civil Society Institute (WACSI) organised the Launch of WACSI Nigeria Node to build civil society resilience in Nigeria for the country’s development and to address the proximity challenge and especially make the Institute’s services readily available to organisations and civic actors that may not have the means to engage effectively online.
Kwame Asante | 7 min read | Dec 21, 2022
Learn the information you need to be aware of the risks that young people and children are exposed to when using the Internet.
MAKAIA | 5 min read | Dec 20, 2022
Learn about the basics that will help you understand the risks you are exposed to when using the Internet.
MAKAIA | 2 min read | Oct 1, 2022
This space will teach you to recognize the characteristics of the threats and attacks called social engineering so that you can have information on how to avoid them.
MAKAIA | 4 min read | Sep 1, 2022
It has become increasingly common to read news on the internet where young people participate in viral challenges that have harmful consequences for their health or even for the rest of their lives and those of their families.
MAKAIA | 10 min read | Aug 1, 2022
The use of links and hyperlinks have made email correspondences easier in our corporate world. But do you know that a simple click on a link in a spam message can jeopardise an entire organisation’s email network? Although emails continue to be a widely used platform for professional communication, a lot of email users lack basic knowledge on how to use email safely.
Kwame Asante | 5 min read | Jun 7, 2022
Baby faces covered in chocolate, baby feet splashing in the water, cheeks soaked in crocodile tears. As we read the list, we might think of a post or story from social media that we sometimes encounter in the online space. But is it safe to share not only your personal information, but also that of a child who is in our care? What does it mean to be a responsible digital parent?
NIOK | 3 min read | Jun 1, 2022
Phishing is among the biggest cyber threats facing organizations. According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year.
Hive Mind | 3 min read | May 25, 2022
Smartphones are the most widely used electronic devices in our daily lives. Once upon a time, we used our cellphones only to call someone or send an important text message. These days, they have become more akin to portable computers. With a bundle of features, social networking, and time-saving apps, smartphones have become an essential part of our daily routine. Whether you are organizing your work schedule, hitting on someone on Tinder, ordering Chinese, or keeping track of your fitness regime, a secure cell phone provides peace of mind that your personal data will not end up in the hands of those who could use it to do you harm.
Hive Mind | 3 min read | May 19, 2022
What is digital security, and should civil society organisations in Africa be concerned?
Kwame Asante | 4 min read | May 17, 2022
Passwords are the key to nearly everything you do online, and you presumably have multiple passwords that you use throughout the day. Choosing hard-to-hack phrases and managing them securely can occasionally feel inconvenient. Fortunately, there are simple ways to make your passwords as secure as possible. Doing so can keep hackers from taking over your accounts and prevent theft of your data.
Hive Mind | 2 min read | Apr 29, 2022
Elena Stojanovska is true believer that privacy protection is a culture, a way of recognition and respect of a human right. Her experience dates from the times when privacy was a mysterious concept in North Macedonia (2005), until now, when everyone is buzzing around new ways of protecting privacy. Elena worked for the Agency for Data Protection as an Advisor for International Cooperation, she was the human rights on-line specialist at the Metamorphosis Foundation and from February 2020 has really busy days in implementing the new Law on Personal Data Protection in the business sector.
Goce Arsovski | 10 min read | Apr 1, 2022
In this article we have collected a few webinars available in English on HiveMind for the Hungarian audience.
NIOK | Mar 29, 2022
With the dramatic increase of our digital footprint (in other words, the footprint of our activities in the online word, e.g. use of social media sites, emailing, blogging, accepting cookies on various websites etc.) data protection is not only an issue for large companies, but it is equally important for civil society organizations and individual users as well. However, while the former can often employ a whole team of security experts, in case of civil society organizations it is an issue that we have to deal with ourselves. Keep in mind that the most precious information today is data and identity, therefore it is especially important to protect them.
NIOK | 2 min read | Mar 25, 2022
Social media is based on continuous positive feedback from other users on user messages. The operators of these platforms have an obvious interest in ensuring that users spend as much time as possible on their platforms, and to do this they have a wealth of data about what content is likely to be attractive to users. This leads to an increasingly strong conviction of the user's own truth in a community of positive feedback, even if that truth is based on completely nonsensical or deliberately manipulative facts.
Mertek Media Monitor | 3 min read | Mar 24, 2022
A user's digital footprint is the set of data that the user leaves behind about him or herself in the digital world. Intentionally or unknowingly, every day we create and leave a lot of data in the digital space that gives us a picture of who we are, what we do, where we are in the digital world and why we do it.
Mertek Media Monitor | 3 min read | Mar 23, 2022
Value, nowadays, comes in lots of different forms. We have traditional ones, such as time, power, security, health, and money. However, there is another, new form of value which is not yet fully understood: digital information. In this article, our aim is to raise awareness about how Facebook affects us and our loved ones on a daily basis, and how not knowing our rights and the help we can receive open us up to potential harm in the cyberspace.
Mertek Media Monitor | 6 min read | Mar 23, 2022
Phishing is a serious threat in our modern world, and there is no knowledge passed down from generation to generation of how to prevent it. This knowledge we have to acquire ourselves so that we can pass it on to the next generation. The number of hacking and phishing attempts has been increasing from year to year, in direct proportion to the fact that more and more activities in our lives are moving to the online space – from work to having fun and to shopping.
NIOK | 2 min read | Mar 23, 2022
AC-LAC is a platform that promotes and defends encryption and fosters capacities and knowledge in citizens to maintain an ecosystem of trust, security, and stability [of ICTs] in the region.
MAKAIA | 3 min read | Mar 11, 2022
Filip Simeonov, Founder and Cyber Security Expert of CPP Services Skopje (www.cpp.mk), as an Information Technology Engineer begins his work experience as a System Administrator and System Engineer, later focusing on Cyber Security of IT and Telecommunication Systems, application solutions, as well as raising awareness of cyber security and secure data management of all process stakeholders and data processors.
Philip often says that Cyber Security is an investment, not a company expense. As an ethical hacker for 13 years trying to detect all the weaknesses and vulnerabilities in his clients, all in order to be mitigated before bad hackers and malicious users find them, thus improving and increasing the cyber security of companies and their solutions and systems.
Goce Arsovski | 8 min read | Mar 11, 2022
The following article, written by Vladimir Garay of “Derechos Digitales”, talks about the implications of a facial recognition system in Chile for mass surveillance and the fight against common crimes.
MAKAIA | 4 min read | Mar 1, 2022
Every day millions of people access the internet and browse through countless content within the reach of a few clicks. Children and teenagers are connecting more and more frequently, finding facilities to access information, knowledge and opportunities, while exposing themselves to different risks such as cyberbullying, sharing private information with strangers, sexual exploitation online, among others.
MAKAIA | 2 min read | Feb 21, 2022
What would you do if you are a victim of cyberbullying? Laura Zapata Ortiz lived this experience and decided to help those who face a similar situation. Today she is part of our program "School of Influencers". This is her story.
MAKAIA | 3 min read | Feb 21, 2022
A survey recently conducted by TechSoup has revealed how social organizations around the world are working with data. At the same time, collaboration, communication and technological trends for the social sector explain the panorama where 5 major trends for the sector stand out.
MAKAIA | 4 min read | Feb 18, 2022
This article is the result of a 2021 MozFest workshop co-facilitated by Laura Vidal (Mozilla), Marielos Galindo (Red Concausa), Natalia Trigoso (Causas Digitales) and Soledad Magnone (JAAKLAC iniciativa). The activity aimed at exploring the possibilities of digital education practices to amplify the participation in data protection/privacy policies.
JAAKLAC iniciativa | 4 min read | Feb 18, 2022
Save the dates, mark your calendars and get ready to go! These are the five Media Literacy Events you simply cannot miss in 2022!!!
Hive Mind | 3 min read | Feb 14, 2022
PERSONAL DEMOCRACY FORUM UKRAINE (PDF UA 2022) is back!
This year PDF UA will be held on March 3-4 in Kyiv in a hybrid form.
The “Future of the Elections” is the main topic this year.
TechSoup Europe joins OPORA, TransparenCEE Network and OSCE ODIHR for the fifth time and brings "tech4good", transparency, and open data topics to the Ukrainian debate about democracy and the role of civil society.
Tytarenko Yaroslava | 2 min read | Jan 28, 2022
This article is a production of Ciudadania Inteligente (Ciudadania AI), a Latin American, inclusive and feminist organization that fights for social justice and for the transformation of democracies.
MAKAIA | 6 min read | Jan 12, 2022
Social media platforms allow users to interact in a faster and easier manner. On one hand, this phenomenon helps establishing relationships and bonds beyond physical boundaries, leading to the exchange of information and content of all kinds. It is also not a secret that these platforms offer users tools for commercializing goods, products and services.
CIVIX Colombia | 4 min read | Jan 3, 2022
ESI Digital from JAAKLAC aims to promote Comprehensive Sexuality Education (CSE, ESI for its Spanish acronym) in relation to digital technologies to minimize online sexual risks among adolescents. The guide covers topics such as sexual and reproductive rights, digital education, internet risks in adolescence and digital safety strategies.
JAAKLAC iniciativa | 6 min read | Dec 21, 2021
Most often when we notice media articles about a hacking incident, it is usually because the target (or a victim) is a larger, more well-known company to the public. When Google, Facebook, Microsoft, etc. are victims of a cyber-incident, and the media are naturally interested in the topic, and thus inform the public. However, almost regardless of the magnitude and sophistication of such attacks on well-established companies and organizations, they are almost always "resolved", i.e., they have their own beginning, course, and end, or resolution. The resolution is not always "positive" for the company institution: sometimes victims pay huge sums of money (usually in cryptocurrencies) to attackers in order to get their data back.
Goce Arsovski | 9 min read | Nov 22, 2021
Many of us (if not all) usually lock the front door of our home, even when we go out to a nearby shop or café. Especially, if we live in a building with more tenants, or our home is facing a busy street - sometimes we even make sure our windows are closed as well! It is clear and unambiguous why we are doing this - we are concerned for our safety, and we do not want anyone (without our explicit permission) to enter our home!
In other words, our sense of security is important to us when it comes to our immediate physical environment - the privacy of our own home.
Goce Arsovski | 9 min read | Nov 19, 2021
We live in the Information Age. Our ability to synthesize and use information well is crucial to our fate and future well-being. Our Experts have been designing bespoke courses on topics that are relevant, set in a meaningful context and important. From making sense of the news online, to protecting your own or your organization’s digital safety and privacy.
Hive Mind | 4 min read | Nov 15, 2021
Cybercrime is an act against the law. It is not a highly complex act directed at specific organizations or institutions and It is more common and closer than we think. Social Engineering is the main technique used by cybercriminals to attack a greater number of people.
JuanDa | 1 min read | Nov 12, 2021
The large number of likes, comments or distributions does not mean that it reflects the real number of people involved in that interactivity. The online public sphere is often contaminated by Bots and Trolls.
Dren Gerguri | 3 min read | Sep 23, 2021
If this pandemic has taught us anything, it’s the fact just how important basic, daily hygiene habits are in our daily lives, and how much can they protect us from billions of bacteria and viruses. Did you know that perhaps this very behaviour has probably “saved us” in the past while we were exposed to a viral pathogen, maybe even COVID19?
Goce Arsovski | 7 min read | Jul 30, 2021
According to the "Digital 2021"1 report, at the turn of the year 2020 and 2021, more than half of the 7.83 billion people in the world were described as "mobile phone users", and 59.5% (4.66 billion) of the population – were stated to use the Internet. The vast majority of them use Social Media
(4.2 billion people)...
Dominika Uzar | 10 min read | Jul 26, 2021
According to the "Digital 2021" report, at the turn of the year 2020 and 2021, more than half of the 7.83 billion people in the world were described as "mobile phone users", and 59.5% (4.66 billion) of the population – were stated to use the Internet. Most of them use the Social Media (4.2 billion people).
Hive Mind | 5 min read | Jul 22, 2021
This podcast episode brings together Anna Chęć and "Klara", who is a TechSoup Europe trainer from Poland, a security researcher, a hacktivist, currently working as a software security engineer for a financial institution. In this episode you can listen to what are some of the key threats once you buy a smartphone and why it is important to secure it well.
Dominika Uzar | 1 min read | Jul 19, 2021
In this episode Anna Chęć is talking to "Klara", who is - like Anna - a TechSoup Europe trainer from Poland, but on top of this, she is also a security researcher and a hacktivist. Anna and "Klara" are great at talking about complex security topics in an easy-to-digest, friendly and open manner. In this episode you can find out if there is such a thing as anonymity on the Internet.
Dominika Uzar | 1 min read | Jul 19, 2021
In this episode of our “Let’s Talk Digital Resilience!” podcast series, we’ll be joined by Anna Chęć, talking to "Klara" (a real-deal hactivist), who are both TechSoup Europe trainers on Digital Safety & Security.
Dominika Uzar | 1 min read | Jul 16, 2021
Do you ever look at the screen-time analysis on your smart phone and cannot believe the high number it displays? If not –great, but if you do –then this podcast is for you.
In this episode you will hear Jakub Górnicki talking to Kamil Śliwowski -
a Media Literacy, Open Educational Resources and Online Privacy expert.
Kamil explains how he has gone from becoming a techno-enthusiast to a real techie helping people better understand the negative effects of using technology...
Hive Mind | 1 min read | Jul 14, 2021
Welcome to the Hive Mind podcast series: “Let’s Talk Digital Resilience!”, where we would like to offer you a chance to enjoy 5 meaningful conversations led by top experts in the field of media technology, online security, and digital wellbeing.
Dominika Uzar | 1 min read | Jul 14, 2021
"Operational Security (OpSec) is a continuous process to ensure operational success in the face of adversaries. [...] Before you understand how to protect yourself, you should realise how to attack yourself."
- Melanie Rieback, CEO/Co-founder of Radically Open Security, NL
If you would like to learn more about being safe and resilient against cyber threats, watch the recording from the webinar we did on June 22, 2021,
led by Melanie Rieback and one of her ethical hackers, Stefan Marsiske.
Dominika Uzar | 1 min read | Jun 24, 2021
Major dangers and media manipulation threats in the age of disinformation
Michal Prawdzik | 1 min read | May 24, 2021
Manipulation, coercion, and preying on emotions – all have been a part of human existence probably since the very beginning. Naturally, some people are doing it better than others, and those at the other side of the equation, tend to fall victim to such schemes, and are left faced with the consequences of their often unassuming nature.
Goce Arsovski | 7 min read | Apr 9, 2021
The growing trend of state institutions of providing more electronic services to citizens besides requiring consistent monitoring of technological development, advancing knowledge and changing the habits of citizens also requires precise determination of measure for the protection of citizens' personal data
Hive Mind | 5 min read | Mar 16, 2021
How many times have you faced the embarrassing situation of forever losing your precious data such as photos, videos, etc.? All of this either due to a little carelessness or maybe not even your fault? Are you being careful by always keeping a safe copy of your most valuable data, or are you just relying on your usual antivirus software to protect you against ransomware attacks?
Goce Arsovski | 1 min read | Feb 18, 2021
Virtual Private Networks, also known as VPNs, are well known to our public as a very useful "tool" for circumventing the rules of certain streaming platforms regarding the geolocation constraints. Aside from "cheating" the service or platform, and making your favorite series, feature film, or podcast available, what else do we know about them? Can VPNs benefit us in other circumstances, professional or private, and why are they really important?
Goce Arsovski | 6 min read | Feb 8, 2021
Phishing messages, spam, junk, and a host of other names. We have all, at some point, received such messages. From the infamous e-mails from the Nigerian prince to the most sophisticated types of targeted phishing. The bad news is: they are here to stay. What can we do about it?
Goce Arsovski | 6 min read | Jan 18, 2021
We'd like to invite young people associated in non-governmental organizations, informal groups, dialogue bodies and activists acting on their own to free online training sessions on disinformation, recognizing it, preventing and counteracting its negative effects. The training is addressed to all those who understand the importance of disinformation in public life, who would like to learn more about the ways it works, get specific tools of recognition and methods of dealing with it. We also invite people who actively participate in public life (also at the local level) and therefore are most vulnerable to disinformation actions aimed at undermining their credibility and the trust of public opinion, necessary to effectively fight for the public good or the interests of the groups they represent.
Dominika Uzar | 2 min read | Dec 14, 2020
Guides, checklists, FAQs, reading lists and a debunk database
Mark Semoil | 1 min read | Jul 8, 2020