Tag Archives: mobile security

Mobile Security Survival Toolkit for Activists

MobileActive’s SaferMobile projectis running two trainings at the Internet at Liberty conference on mobile security with colleagues from IWPR, the Committee to Protect Journalists, and UC Berkeley. We’ll be demoing common mobile threats and provide hands-on tips on how to better protect yourself. We put together a set of resources in a ‘mobile security survival kit’ for activists and journalists with practical tips and advice. They are all online at SaferMobile.org but we are also compiling here in a Primer Toolkit on Mobile Security.

Posted in mHealth, Technology | Also tagged , , , , , | Comments closed

Mobile Security for Journalist – The Essential SaferMobile Survival Guide

The newMobile Security Survival Guide for Journalistsfrom SaferMobilehelps you better understand the risks inherent in the use of mobile technology. It also discusses tactics you can use to protect yourself.As someone working with sensitive information, mobile communications are inherently insecure and expose journalists and citizen reporters working in sensitive environments to risks that are not easy to detect or overcome. This guide is designed to help you navigate these challenges.We outline the risks and offer tips to help mitigate them. SaferMobile’sprimary goal is to help you make better decisions about using your mobile phone as a journalist, rights defender, or activist.SaferMobileis a project of MobileActive.org.TheMobile Security Survival Guideis written with the workflow of a journalist in mind and covers Mobile Network Basics, Prepping for Assignment, Reporting with your Phone, Filing the Story, and considering for Social Media use on your phone.Check it out.There is much more atSaferMobile- resources, apps, and training materials to make you and your mobile communications more secure. final_sm_logo.jpg Featured?: Yes Featured on homepage?: Yes

Posted in mHealth, Technology | Also tagged , , , , | Comments closed

Working Towards a Deeper Understanding of Digital Safety for Children and…

Author:

Posted in mHealth, Technology | Also tagged , , , , , , , | Comments closed

Securing your Mobile Email

Author:

Posted in mHealth, Technology | Also tagged , , , , , , , , , | Comments closed

Mobile Anonymity and Censorship Circumvention: How to Browse the Web…

Author:

Posted in mHealth, Technology | Also tagged , , , , , , , , | Comments closed

A User Guide to Orbot – Anonymized Tor Browsing on Your Mobile Phone

Author:

Posted in mHealth, Technology | Also tagged , , , , , , , | Comments closed

Evaluating Security Apps

Particularly for smartphones, there are many apps that promise improved privacy and security for your mobile communications. Like all apps, some are very good, but other are poorly written or overpriced, and may even be malicious.

Posted in mHealth, Technology | Also tagged , , , , , , | Comments closed

M4Data: FrontlineSMS Launches Data Integrity User Guide

By Cathryn Paine We were excited to join colleagues and friends in Washington, DC, on Tuesday 9th August to release the first edition of our User Guide on Data Integrity, a tool that will help FrontlineSMS users around the world better understand the flow of information into and out of the platform, the risks and vulnerabilities to that data, and simple ways they can mitigate those risks. To kick off the discussion around the new guide, we hosted a panel discussion at Johns Hopkins’ School of Advanced International Studies, where FrontlineSMS’ Sean McDonald joined Jon Gosier of metaLayer, Development Seed’s Paul Goodman, and Internews Vice President for New Media Kathleen Reen, who moderated the event. This research effort, based on FrontlineSMS user input and research by Kristina Lugo and Carol Waters, focused not on mobile system security, a critical issue better addressed by others, but more on the ways that contextualized program design and implementation can improve data quality and reduce user risk.

Posted in mHealth, Technology | Also tagged , , , | Comments closed

Safer Facebook

Facebook has more 500 million users, half of which access the site through their mobile phones . Being able to communicate your message to an audience this large is exceptionally valuable. At the same time your activities on the site generate very detailed information about you and your networks.

Posted in mHealth, Technology | Also tagged , , , , , , , , | Comments closed

Using HTTPS for Secure Mobile Browsing

HTTP, the Hypertext Transfer Protocol, is the data communication protocol you use when you broswe the web – as you probably know if you’ve noticed that website addresses usually begin with http://. HTTPS is the secure version of HTTP, which you might have seen being used for sensitive transactions like online banking and online shopping.

Posted in mHealth, Technology | Also tagged , , , , , , | Comments closed

SaferMobile LockDown Guides

Despite the smartphone craze of the past 5 years, featurephones are still king in much of the world. From the perspective of activists, rights defenders, and journalists, they cannot be ignored. And feature phones have plenty of built-in capability to help users stay safer.

Posted in mHealth, Technology | Also tagged , , , , , , , , | Comments closed

Mobile Application Security

View original post here: Mobile Application Security

Posted in mHealth, Technology | Also tagged , , , , , , , , | Comments closed

Safer Twitter

Twitter is a way to get your messages to a wider audience.

Posted in mHealth, Technology | Also tagged , , , , , , | Comments closed

A Guide to Mobile Security Risk Assessment

You are an activist, rights defender, or journalist. You use a mobile device.

Posted in mHealth, Technology | Also tagged , , , , , , , | Comments closed