The Parallax

What to do when Customs asks for your social-media account info

The Parallax

After two years of preparation, the Trump administration is rolling out plans to require most U.S. visitors, including applicants for tourist and business visas, to disclose their social-media account identifiers when entering the country.

Media 208

How to move your two-factor authentication app to a new device

The Parallax

Last week, at least three months ahead of expectations, Google leaked the design for its upcoming Pixel 4 phone. Why the tech giant prematurely exposed its plans isn’t entirely clear.

6 cybersecurity revelations from the redacted Mueller report

The Parallax

From the earliest moves by Russian hackers to influence the 2016 U.S.

Report 180

This hack could take control of your Ford

The Parallax

Using a $300 software-defined radio , a security researcher says he has figured out how to take control of some of Ford’s newer and higher-end cars and trucks.

Hotels 174

How To Take Action on Customer Discovery

Speaker: Nick Noreña, Innovation Coach and Advisor, Kromatic

We all want to build successful products - and that means satisfied customers. Before anything else, you must understand what problems you can solve. The best way to do that is to get out of the building and start asking questions. But how can you make the most of those conversations, and ensure that you walk away with productive insights? Join Nick Noreña, educator, entrepreneur, and currently Innovation Coach and Advisor at Kromatic, as he covers how we can effectively action our findings from customer discovery conversations.

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

VANCOUVER—The last thing Emmanuel Vincent expected to do with his Ph.D. in oceanography and climate science was fact-checking news reports. But he found a compelling reason to dive into the fraught world of online journalism: He wanted to stop fake news.

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

CHERNOBYL EXCLUSION ZONE, Ukraine—The stray dog looking directly at me was hard to resist. Her ears perked up, her fur appeared clean—free of mange, at any rate—and she held a large stick firmly between her jaws. She looked like a good dog.

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series.

Hotels 207

How to wipe location data from mapping apps

The Parallax

As somebody who repeatedly got lost along the winding, poorly sign-posted alleys of Tokyo while living there before smartphones existed, I found great relief in having Google Maps on hand during a trip back to Japan in February. It was a lifeline of sorts.

How To 166

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking.

Build Product Progress with a Strong Data Culture

Speaker: Nima Gardideh, CTO, Pearmill

Have you ever thought your product's progress was headed in one direction, and been shocked to see a different story reflected in big picture KPIs like revenue? It can be confusing when customer feedback or metrics like registration or retention are painting a different picture. No matter how sophisticated your analytics are, if you're asking the wrong questions - or looking at the wrong metrics - you're going to have trouble getting answers that can help you. Join Nima Gardideh, CTO of Pearmill, as he demonstrates how to build a strong data culture within your team, so everyone understands which metrics they should actually focus on - and why. Then, he'll explain how you can use your analytics to regularly review progress and successes. Finally, he'll discuss what you should keep in mind when instrumenting your analytics.

Android Q adds privacy, fragmentation

The Parallax

MOUNTAIN VIEW, Calif.—Google’s Google’s Android mobile operating system has long been criticized for fragmentation , as millions of older devices no longer receiving regular security and feature updates continue to connect to the Internet.

How to tell you’re part of the 30 million user Facebook breach

The Parallax

The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t likely to comfort the tens of millions of consumers whose personal data they entrusted to the social-media juggernaut has been stolen.

How To 207

Make a resolution to clean up your digital act? Here’s how

The Parallax

Did you get hacked in 2017? Chances are you did, thanks to Equifax’s inability to protect the data of more than 143 million of its customers. As a result, you might be feeling frustrated, vulnerable, even angry—not exactly a positive way to ring in the new year.

Travel 260

Securing voting machines means raising funds

The Parallax

There likely isn’t a quick fix for complex U.S. election integrity challenges such as social-engineering interference on Facebook. Experts say there is a straightforward response, however, to vulnerable voting-machine software. The problem is that it involves cooperation in Congress.

Report 203

What Is (and Isn’t) Product Management?

Speaker: Steve Johnson, VP of Products, Pragmatic Institute

Product Management is one of the most exciting - and most misunderstood - functions in technical organizations. Is it strategic or tactical? Is it a planning role or a support role? Many product professionals are unclear about what is (and isn't) product management. After all, product management spans many activities from business planning to market readiness. In this session, we’ll examine many product activities and artifacts for product strategy, planning, and growth, and introduce a simple tool that you can use in your organization to clarify the roles of product management and others. Steve Johnson explores the many roles of Product Management in this fun talk focused on why product managers should obsess on problems instead of solutions.

New Zealand defends its border device search policy (Q&A)

The Parallax

What’s the cost of data privacy at the border? In New Zealand, it could be $5,000, if you resist an immigration official’s demand that you hand over your phone, tablet, or laptop before entering the country.

Open source the secret sauce in secure, affordable voting tech

The Parallax

SAN FRANCISCO—The fastest, most cost-effective way to secure direct-record electronic voting machines in the United States, according to cybersecurity experts, is to stop using them. Switch to paper ballots and apply risk-limiting audits to ensure that vote tallies are conducted properly.

Freshly (un)retired, Gary McGraw takes on machine-learning security (Q&A)

The Parallax

Tucked away in Building 43 of Google’s headquarters in Mountain View, Calif., hangs a large but otherwise unassuming mirror that, like Nietzsche’s monsters, will gaze back into you.

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out.

The 5 Levels of Analytics Maturity

Basic dashboards used to be enough to thrill end users. But over time, modern capabilities have emerged—and bare-minimum features are no longer cutting it. How have analytics changed? And where do your BI offerings fall short? Find out sophisticated ways to future-proof your application. Brought to you by Logi Analytics.

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

How to use your Android as a 2FA key

The Parallax

MOUNTAIN VIEW, Calif.—Google Google just made it much, much easier for Android device owners to protect themselves with one of the safest extra security layers available to consumers. If you have a phone or tablet running Android 7.0

How To 143

Harassed or stalked online? Follow these 5 steps

The Parallax

In 1998, a column published in The New York Times recommended that people who were worried about online stalking change their email address to something that would be “hard to guess” and not to submit personal information to “on-line directories.”.

How To 207

Done with Signal? Not so fast

The Parallax

In one revealing nugget of the Mueller Report , the Special Counsel says Trump administration officials used end-to-end encrypted messaging to conceal and delete communications that should be part of the public record.

How To 149

Make an Impact with Analytics and Journey Maps

Speaker: Kirui K. K., Co-founder and CEO of Tanasuk Africa

If you want to offer a better user experience, it can be tempting to track each and every data point in your product. However, this can quickly get complicated and overwhelming as you collect more and more data. How do you know which metrics will help you improve? Kirui K. K., Co-founder & CEO Tanasuk Africa, wants you to know that analytics don't have to be complicated to make an impact - no matter the size of your company. Join him as he explains how to create a customer journey map, then use that map to figure out the metrics you need to know - and how to use them.

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. Kids as young as 11 are able to hack voting machines in fewer than 10 minutes.

Your old router could be a hacking group’s APT pawn

The Parallax

VANCOUVER—If you’ve been looking for another reason to replace your old Wi-Fi router, here it is: A group of hackers could be using it to hide the origins of its online attacks.

Groups 221

When hackers target a conference code of conduct

The Parallax

NEW YORK—Can hackers effectively mitigate a hack of their own subculture? Confrontations between Circle of HOPE conference speakers and a small group of male attendees wearing “Make America Great Again” hats and shirts leave the question wide open.

How to check whether a link is safe

The Parallax

How To 188

The Magic of Intent: Start Knowing The Goals of Your Users

Speaker: Terhi Hanninen, Senior Product Manager, Zalando, and Dr. Franziska Roth, Senior User Researcher, Zalando

It's important to know your users - what are their preferences, pain points, ultimate goals? With user research and usage data, you can get a great idea of how your users act. The tricky part is, very few users reliably act the same way every time they use your product. Join Terhi Hanninen, Senior Product Manager, and Dr. Franziska Roth, Senior User Researcher at Zalando, as they explain how they were able to reach a new level of user understanding - by taking their user research and segmenting their users by point-in-time intent. You'll leave with a strategy to change how your product team, and organization at large, understands your users.

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met.

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming.

Trends 177

Porn extortion scam surfaces breached passwords

The Parallax

The email is alarming. Right there in its subject line is one of the recipient’s username-password pairings.

Report 195

Fragmentation likely to hinder Android P’s security chops

The Parallax

MOUNTAIN VIEW, Calif.—Google Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements.

Backup 207

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

How to stop calendar spam

The Parallax

Nestled on your calendar between a 1:30 p.m. lunch and a 2:30 p.m. phone call sits an appointment you weren’t expecting. You didn’t create it, and you certainly didn’t accept an invitation for it, but there it is: “$$$ Playmate Wanted $$$.”. Congratulations, you’ve been hit with Calendar spam.

How To 207