The Parallax

Pwned Android, Chromium devices drive winnings at Tokyo hacker contest

The Parallax

TOKYO—When it comes to getting hacked by security researchers at the seventh annual Mobile Pwn2Own hacking contest here, smart TVs could be a lot smarter about staying secure. The same goes for Wi-Fi routers, Xiaomi Android phones, and an Amazon Echo.

WAN 130

What to do when Customs asks for your social-media account info

The Parallax

After two years of preparation, the Trump administration is rolling out plans to require most U.S. visitors, including applicants for tourist and business visas, to disclose their social-media account identifiers when entering the country.

Media 208

How to move your two-factor authentication app to a new device

The Parallax

Last week, at least three months ahead of expectations, Google leaked the design for its upcoming Pixel 4 phone. Why the tech giant prematurely exposed its plans isn’t entirely clear.

This hack could take control of your Ford

The Parallax

Using a $300 software-defined radio , a security researcher says he has figured out how to take control of some of Ford’s newer and higher-end cars and trucks.

Hotels 202

Rapid Experimentation at Every Stage of Product Development

Speaker: Tanya Koshy, VP of Product, UserTesting

Experimentation isn't something you do once you have designs or once you’ve built the product; it's important to validate early and often to better understand your customer, their needs, and the market opportunity. Join Tanya Koshy, VP of Product at UserTesting, as she explores how, by using customer feedback at every stage of the product development process, you can better and more quickly iterate on your product ideas. Ultimately, this rapid experimentation during development will enable you to deliver customer value faster.

6 cybersecurity revelations from the redacted Mueller report

The Parallax

From the earliest moves by Russian hackers to influence the 2016 U.S.

Report 204

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

CHERNOBYL EXCLUSION ZONE, Ukraine—The stray dog looking directly at me was hard to resist. Her ears perked up, her fur appeared clean—free of mange, at any rate—and she held a large stick firmly between her jaws. She looked like a good dog.

How to wipe location data from mapping apps

The Parallax

As somebody who repeatedly got lost along the winding, poorly sign-posted alleys of Tokyo while living there before smartphones existed, I found great relief in having Google Maps on hand during a trip back to Japan in February. It was a lifeline of sorts.

How To 194

Android Q adds privacy, fragmentation

The Parallax

MOUNTAIN VIEW, Calif.—Google’s Google’s Android mobile operating system has long been criticized for fragmentation , as millions of older devices no longer receiving regular security and feature updates continue to connect to the Internet.

Election hackers are ‘waiting for the bigger prize in 2020’ (Q&A)

The Parallax

LEIPZIG, Germany?Just Just days before heading to Australia for his wedding, University of Michigan computer science professor and electronic voting-machine security expert J.

The Science of High-Impact Experimentation

Speaker: Holly Hester-Reilly, Founder and Product Management Coach, H2R Product Science

Too many product teams don't know what to test, which leads to poorly designed experiments and unclear results. How can a product manager be certain they’re making effective decisions when it comes to experimentation? Join Holly Hester-Reilly, Founder and Product Management Coach at H2R Product Science, as she walks us through the entire experimentation process, from deciding what to test to sharing the results with stakeholders, to illustrate what strong testing practices look like and how they can be implemented in every organization.

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking.

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series.

Hotels 208

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out.

Make a resolution to clean up your digital act? Here’s how

The Parallax

Did you get hacked in 2017? Chances are you did, thanks to Equifax’s inability to protect the data of more than 143 million of its customers. As a result, you might be feeling frustrated, vulnerable, even angry—not exactly a positive way to ring in the new year.

Travel 260

Design and Run Experiments That Actually Progress Your Business

Speaker: Nick Noreña, Innovation Coach and Advisor, Kromatic

Experimenting as a way to explore new products, services, and business models can help eliminate the guesswork involved in building something your customers actually value. That said, it's often quite tricky to take your vision and figure out the first experiment to run. How do you get started? How can you ensure your experiments are well-designed? Join Nick Noreña, educator, entrepreneur, and currently an Innovation Coach at Kromatic, as he walks us through how we can figure out the right experiments to run for any product or service, and in organizations of all sizes.

Open source the secret sauce in secure, affordable voting tech

The Parallax

SAN FRANCISCO—The fastest, most cost-effective way to secure direct-record electronic voting machines in the United States, according to cybersecurity experts, is to stop using them. Switch to paper ballots and apply risk-limiting audits to ensure that vote tallies are conducted properly.

Securing voting machines means raising funds

The Parallax

There likely isn’t a quick fix for complex U.S. election integrity challenges such as social-engineering interference on Facebook. Experts say there is a straightforward response, however, to vulnerable voting-machine software. The problem is that it involves cooperation in Congress.

Report 207

Done with Signal? Not so fast

The Parallax

In one revealing nugget of the Mueller Report , the Special Counsel says Trump administration officials used end-to-end encrypted messaging to conceal and delete communications that should be part of the public record.

How To 173

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming.

Trends 202

How to Design Strong Experiments

Speaker: Franziska Beeler, Head of Cloud Academy, and Tendayi Viki, Associate Partner, Strategyzer

When testing new business and product ideas, choosing the right experiment is just the beginning. After we have chosen our experiment, it’s important that we spend some time designing it well. Join Tendayi Viki, corporate innovation expert and associate partner at Strategyzer, and Franziska Beeler, Head of Cloud Academy at Strategyzer, as they walk us through the three key elements that help you design stronger experiments and come away with the evidence you need to advance your idea.

How to tell you’re part of the 30 million user Facebook breach

The Parallax

The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t likely to comfort the tens of millions of consumers whose personal data they entrusted to the social-media juggernaut has been stolen.

How To 208

New Zealand defends its border device search policy (Q&A)

The Parallax

What’s the cost of data privacy at the border? In New Zealand, it could be $5,000, if you resist an immigration official’s demand that you hand over your phone, tablet, or laptop before entering the country.

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. Kids as young as 11 are able to hack voting machines in fewer than 10 minutes.

How to check whether a link is safe

The Parallax

How To 206

Get Better User Insights With Wasteless Validation

Speaker: Tim Herbig, Product Management Coach and Consultant

Product teams tend to get ahead of themselves by rushing from idea straight to building a Minimum Viable Product (MVP). How can a product manager slow their team down and prevent them from wasting valuable resources? Join Tim Herbig, Product Management Coach and Consultant, as he introduces a new way of understanding MVPs and explores how you can approach validation without wasting the resources of your development team.

How to use your Android as a 2FA key

The Parallax

MOUNTAIN VIEW, Calif.—Google Google just made it much, much easier for Android device owners to protect themselves with one of the safest extra security layers available to consumers. If you have a phone or tablet running Android 7.0

How To 162

Your old router could be a hacking group’s APT pawn

The Parallax

VANCOUVER—If you’ve been looking for another reason to replace your old Wi-Fi router, here it is: A group of hackers could be using it to hide the origins of its online attacks.

Groups 236

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met.

Freshly (un)retired, Gary McGraw takes on machine-learning security (Q&A)

The Parallax

Tucked away in Building 43 of Google’s headquarters in Mountain View, Calif., hangs a large but otherwise unassuming mirror that, like Nietzsche’s monsters, will gaze back into you.

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

Facebook was breached. Here’s what we know (and don’t)

The Parallax

If you were unexpectedly logged out of your Facebook account this past week, you can count yourself as one of more than 90 million people out of the company’s more than 2.5 billion monthly users whose account access it reset.

Video 198

Porn extortion scam surfaces breached passwords

The Parallax

The email is alarming. Right there in its subject line is one of the recipient’s username-password pairings.

Report 207

Harassed or stalked online? Follow these 5 steps

The Parallax

In 1998, a column published in The New York Times recommended that people who were worried about online stalking change their email address to something that would be “hard to guess” and not to submit personal information to “on-line directories.”.

How To 208

Walk a Mile in Your Customer's Shoes

Speaker: Steven Haines, Founder and CEO, Sequent Learning Networks

Product professionals use phrases like "voice of the customer," and "user experience" so often that it can be easy to lose sight of their actual meanings. How can we, as product professionals, learn to keep customers and users at the heart of our work? Join Steven Haines, globally recognized thought leader and author, as he guides us through a memorable journey demonstrating how you can walk a mile in their customer's shoes. He'll explore how, by developing true empathy for your users, you can ensure you're creating the features and products they actually want.

When hackers target a conference code of conduct

The Parallax

NEW YORK—Can hackers effectively mitigate a hack of their own subculture? Confrontations between Circle of HOPE conference speakers and a small group of male attendees wearing “Make America Great Again” hats and shirts leave the question wide open.

Biohacker’s latest answer to health care hurdles: Homebrew meds

The Parallax

NEW YORK CITY—File sharing saves lives, Michael Laufer argues. Especially when the files contain instructions on how to turn the common but destructive narcotic painkiller oxycodone into its best-known overdose antidote, naloxone.

Primer: The next act for security theater

The Parallax

The day after DefCon concluded this year, a prominent cybersecurity researcher and hacker known as the brain behind hacks featured on hit TV show Mr. Robot offered his resignation as the head of its security operations.

Hotels 200

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

How User Acceptance Testing Can Save You Time and Money

Speaker: J.B. Siegel, VP of Client Services, Seamgen

Before a new product or feature goes into development, you have to gauge whether it will be a worthwhile investment. But what’s the best way to do so - and how can you get honest insights from your end users? Join J.B. Siegel, VP of Client Services at Seamgen, as he explores how to use wireframes and clickable prototypes to validate your product. He’ll discuss how user testing allows you to really understand your users - and how to use the insights to inform your product strategy.