The Parallax

What to do when Customs asks for your social-media account info

The Parallax

After two years of preparation, the Trump administration is rolling out plans to require most U.S. visitors, including applicants for tourist and business visas, to disclose their social-media account identifiers when entering the country.

Media 208

6 cybersecurity revelations from the redacted Mueller report

The Parallax

From the earliest moves by Russian hackers to influence the 2016 U.S.

Report 188

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

This hack could take control of your Ford

The Parallax

Using a $300 software-defined radio , a security researcher says he has figured out how to take control of some of Ford’s newer and higher-end cars and trucks.

Hotels 185

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

VANCOUVER—The last thing Emmanuel Vincent expected to do with his Ph.D. in oceanography and climate science was fact-checking news reports. But he found a compelling reason to dive into the fraught world of online journalism: He wanted to stop fake news.

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Election hackers are ‘waiting for the bigger prize in 2020’ (Q&A)

The Parallax

LEIPZIG, Germany?Just Just days before heading to Australia for his wedding, University of Michigan computer science professor and electronic voting-machine security expert J.

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series.

Hotels 208

How to move your two-factor authentication app to a new device

The Parallax

Last week, at least three months ahead of expectations, Google leaked the design for its upcoming Pixel 4 phone. Why the tech giant prematurely exposed its plans isn’t entirely clear.

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking.

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

CHERNOBYL EXCLUSION ZONE, Ukraine—The stray dog looking directly at me was hard to resist. Her ears perked up, her fur appeared clean—free of mange, at any rate—and she held a large stick firmly between her jaws. She looked like a good dog.

BI Buyers Guide: Embedding Analytics in Your Software

The business intelligence market has exploded. And as the number of vendors grows, it gets harder to make sense of it all. Learn how to decide what features you need and get an evaluation framework for every technical and non-technical requirement you could imagine.

Securing voting machines means raising funds

The Parallax

There likely isn’t a quick fix for complex U.S. election integrity challenges such as social-engineering interference on Facebook. Experts say there is a straightforward response, however, to vulnerable voting-machine software. The problem is that it involves cooperation in Congress.

Report 206

How to tell you’re part of the 30 million user Facebook breach

The Parallax

The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t likely to comfort the tens of millions of consumers whose personal data they entrusted to the social-media juggernaut has been stolen.

How To 207

Open source the secret sauce in secure, affordable voting tech

The Parallax

SAN FRANCISCO—The fastest, most cost-effective way to secure direct-record electronic voting machines in the United States, according to cybersecurity experts, is to stop using them. Switch to paper ballots and apply risk-limiting audits to ensure that vote tallies are conducted properly.

How to wipe location data from mapping apps

The Parallax

As somebody who repeatedly got lost along the winding, poorly sign-posted alleys of Tokyo while living there before smartphones existed, I found great relief in having Google Maps on hand during a trip back to Japan in February. It was a lifeline of sorts.

How To 173

2019 State of Engineering Performance Management Report

More than 100 software leaders were asked how they manage and measure engineering performance. How do the findings stack up to your own experience? The report includes the top engineering challenges and the most used performance metrics.

New Zealand defends its border device search policy (Q&A)

The Parallax

What’s the cost of data privacy at the border? In New Zealand, it could be $5,000, if you resist an immigration official’s demand that you hand over your phone, tablet, or laptop before entering the country.

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out.

Android Q adds privacy, fragmentation

The Parallax

MOUNTAIN VIEW, Calif.—Google’s Google’s Android mobile operating system has long been criticized for fragmentation , as millions of older devices no longer receiving regular security and feature updates continue to connect to the Internet.

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Your old router could be a hacking group’s APT pawn

The Parallax

VANCOUVER—If you’ve been looking for another reason to replace your old Wi-Fi router, here it is: A group of hackers could be using it to hide the origins of its online attacks.

Groups 227

Harassed or stalked online? Follow these 5 steps

The Parallax

In 1998, a column published in The New York Times recommended that people who were worried about online stalking change their email address to something that would be “hard to guess” and not to submit personal information to “on-line directories.”.

How To 208

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. Kids as young as 11 are able to hack voting machines in fewer than 10 minutes.

When hackers target a conference code of conduct

The Parallax

NEW YORK—Can hackers effectively mitigate a hack of their own subculture? Confrontations between Circle of HOPE conference speakers and a small group of male attendees wearing “Make America Great Again” hats and shirts leave the question wide open.

The Essential Guide to Building Analytic Applications

Embedding dashboards, reports, and analytics in an existing application presents some unique opportunities—and poses unique challenges—to software teams. Download this eBook to hear 16 product experts share insights on business intelligence, UI/UX, security, and everything that goes into building a successful application with analytics at its core.

How to check whether a link is safe

The Parallax

How To 194

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met.

Porn extortion scam surfaces breached passwords

The Parallax

The email is alarming. Right there in its subject line is one of the recipient’s username-password pairings.

Report 202

Meltdown and Spectre: What they are, and what to do

The Parallax

Two newly discovered critical security vulnerabilities are very likely affecting your laptop and phone, security researchers revealed on Wednesday. The good news is that patches are coming to protect your devices.

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming.

Trends 184

Fragmentation likely to hinder Android P’s security chops

The Parallax

MOUNTAIN VIEW, Calif.—Google Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements.

Backup 208

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

How to stop calendar spam

The Parallax

Nestled on your calendar between a 1:30 p.m. lunch and a 2:30 p.m. phone call sits an appointment you weren’t expecting. You didn’t create it, and you certainly didn’t accept an invitation for it, but there it is: “$$$ Playmate Wanted $$$.”. Congratulations, you’ve been hit with Calendar spam.

How To 207

The Definitive Guide to Predictive Analytics

By embedding predictive analytics, you can future-proof your application and give users sophisticated insights. The Definitive Guide to Predictive Analytics has everything you need to get started, including real-world examples, steps to build your models, and solutions to common data challenges.

Biohacker’s latest answer to health care hurdles: Homebrew meds

The Parallax

NEW YORK CITY—File sharing saves lives, Michael Laufer argues. Especially when the files contain instructions on how to turn the common but destructive narcotic painkiller oxycodone into its best-known overdose antidote, naloxone.

Done with Signal? Not so fast

The Parallax

In one revealing nugget of the Mueller Report , the Special Counsel says Trump administration officials used end-to-end encrypted messaging to conceal and delete communications that should be part of the public record.

How To 154

Freshly (un)retired, Gary McGraw takes on machine-learning security (Q&A)

The Parallax

Tucked away in Building 43 of Google’s headquarters in Mountain View, Calif., hangs a large but otherwise unassuming mirror that, like Nietzsche’s monsters, will gaze back into you.

How to use your Android as a 2FA key

The Parallax

MOUNTAIN VIEW, Calif.—Google Google just made it much, much easier for Android device owners to protect themselves with one of the safest extra security layers available to consumers. If you have a phone or tablet running Android 7.0

How To 147

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.