Search Results

Filter
  • TOOL

    Essential Guides on disinformation and other topics

    The Essential Guides to reporting on disinformation cover news gathering, verification, responsible reporting, online safety, digital ads and more. Each book is intended as a starting point for exploring the challenges of digital journalism in the mo...
    10-03-2022
  • TOOL

    How to Dox Yourself on the Internet

    A step-by-step guide to finding and removing your personal information from the internet. It includes useful resources such as Doxxing Guide, Social Media Security and Privacy Checklist, Doxxing Curriculum Outline.
    10-03-2022
  • TOOL

    Cover Your Tracks

    The app helps you check your browser to see how well you are protected from tracking and fingerprinting: How does tracking technology follow your trail around the web, even if you've taken protective measures? Cover Your Tracks explains its methodolo...
    08-03-2022
  • POST

    Social engineering explained – psychology vs digital world

    There are millions of examples of these encounters – from the famous Trojan horse, left at the gates of Troy by the Greeks, to the modern day exploits of Kevin Mitnick, or the e-mail hacking of former White House Chief-of-staff, John Podesta, in 2016...
    09-04-2021
  • TOOL

    Key Questions To Ask When Analyzing/Creating Media Messages

    This is a practical two-part downloadable handout with sets of constructivist key questions you need to ask to develop 1) habits of inquiry when analysing media messages and2) habits of reflection when creating media messages.
    08-03-2022
  • TOOL

    RiskIQ

    RiskIQ Community brings petabytes of internet intelligence directly to your fingertips. Investigate threats by pivoting through attacker infrastructure data. Understand your digital assets that are internet-exposed, and map and monitor your external...
    08-03-2022
  • TOOL

    Google Lens

    Google Lens is an image recognition technology developed by Google, designed to bring up relevant information related to objects it identifies using visual analysis based on a neural network.
    07-03-2022
  • TOOL

    DNSlytics

    Find out everything about a domain name, IP address or provider. Discover relations between these items and access historical data. Use this knowledge in your digital investigation, fraud prevention or brand protection.
    07-03-2022
  • TOOL

    Twitonomy

    Twitonomy is a tool for analysing Twitter accounts and their activity. Also, it is a great way to identify indicators of suspicious or bot-like behaviour on the platform.
    07-03-2022
  • POST

    Backups – the easiest way to protect yourself from ransomware attacks

    According to the European Union Agency for Cybersecurity (ENISA), the second most widespread types of cyber-attacks in 2020 (following malware attacks) were, you guessed it, ransomware attacks. They accounted for almost one third (28%) of the total n...
    18-02-2021
First Page Previous Page 1 ... 15 16 17 18 19 20 Next Page Last Page