The Parallax

What to do when Customs asks for your social-media account info

The Parallax

After two years of preparation, the Trump administration is rolling out plans to require most U.S. visitors, including applicants for tourist and business visas, to disclose their social-media account identifiers when entering the country.

Media 208

How to move your two-factor authentication app to a new device

The Parallax

Last week, at least three months ahead of expectations, Google leaked the design for its upcoming Pixel 4 phone. Why the tech giant prematurely exposed its plans isn’t entirely clear.

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

VANCOUVER—The last thing Emmanuel Vincent expected to do with his Ph.D. in oceanography and climate science was fact-checking news reports. But he found a compelling reason to dive into the fraught world of online journalism: He wanted to stop fake news.

6 cybersecurity revelations from the redacted Mueller report

The Parallax

From the earliest moves by Russian hackers to influence the 2016 U.S.

Report 178

Build Product Progress with a Strong Data Culture

Speaker: Nima Gardideh, CTO, Pearmill

Have you ever thought your product's progress was headed in one direction, and been shocked to see a different story reflected in big picture KPIs like revenue? It can be confusing when customer feedback or metrics like registration or retention are painting a different picture. No matter how sophisticated your analytics are, if you're asking the wrong questions - or looking at the wrong metrics - you're going to have trouble getting answers that can help you. Join Nima Gardideh, CTO of Pearmill, as he demonstrates how to build a strong data culture within your team, so everyone understands which metrics they should actually focus on - and why. Then, he'll explain how you can use your analytics to regularly review progress and successes. Finally, he'll discuss what you should keep in mind when instrumenting your analytics.

This hack could take control of your Ford

The Parallax

Using a $300 software-defined radio , a security researcher says he has figured out how to take control of some of Ford’s newer and higher-end cars and trucks.

Hotels 168

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

CHERNOBYL EXCLUSION ZONE, Ukraine—The stray dog looking directly at me was hard to resist. Her ears perked up, her fur appeared clean—free of mange, at any rate—and she held a large stick firmly between her jaws. She looked like a good dog.

How to wipe location data from mapping apps

The Parallax

As somebody who repeatedly got lost along the winding, poorly sign-posted alleys of Tokyo while living there before smartphones existed, I found great relief in having Google Maps on hand during a trip back to Japan in February. It was a lifeline of sorts.

How To 167

Android Q adds privacy, fragmentation

The Parallax

MOUNTAIN VIEW, Calif.—Google’s Google’s Android mobile operating system has long been criticized for fragmentation , as millions of older devices no longer receiving regular security and feature updates continue to connect to the Internet.

Election hackers are ‘waiting for the bigger prize in 2020’ (Q&A)

The Parallax

LEIPZIG, Germany?Just Just days before heading to Australia for his wedding, University of Michigan computer science professor and electronic voting-machine security expert J.

The Changing Role of CX Testing in Digital Transformation

Speaker: Diego Lo Giudice and Chad Hendren

With new competition emerging every day, businesses are transforming themselves, and using software as a means to drive differentiation. Digital transformation has become a key initiative for businesses across the globe, and CX is ground zero. Register now for this webinar and hear from Cyara and their guest speaker, Diego Lo Giudice of Forrester, how testing and QA practices are changing to enable and accelerate digital transformation.

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series.

Hotels 207

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking.

How to use your Android as a 2FA key

The Parallax

MOUNTAIN VIEW, Calif.—Google Google just made it much, much easier for Android device owners to protect themselves with one of the safest extra security layers available to consumers. If you have a phone or tablet running Android 7.0

How To 142

Securing voting machines means raising funds

The Parallax

There likely isn’t a quick fix for complex U.S. election integrity challenges such as social-engineering interference on Facebook. Experts say there is a straightforward response, however, to vulnerable voting-machine software. The problem is that it involves cooperation in Congress.

Report 204

What Is (and Isn’t) Product Management?

Speaker: Steve Johnson, VP of Products, Pragmatic Institute

Product Management is one of the most exciting - and most misunderstood - functions in technical organizations. Is it strategic or tactical? Is it a planning role or a support role? Many product professionals are unclear about what is (and isn't) product management. After all, product management spans many activities from business planning to market readiness. In this session, we’ll examine many product activities and artifacts for product strategy, planning, and growth, and introduce a simple tool that you can use in your organization to clarify the roles of product management and others. Steve Johnson explores the many roles of Product Management in this fun talk focused on why product managers should obsess on problems instead of solutions.

How to tell you’re part of the 30 million user Facebook breach

The Parallax

The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t likely to comfort the tens of millions of consumers whose personal data they entrusted to the social-media juggernaut has been stolen.

How To 207

Open source the secret sauce in secure, affordable voting tech

The Parallax

SAN FRANCISCO—The fastest, most cost-effective way to secure direct-record electronic voting machines in the United States, according to cybersecurity experts, is to stop using them. Switch to paper ballots and apply risk-limiting audits to ensure that vote tallies are conducted properly.

Done with Signal? Not so fast

The Parallax

In one revealing nugget of the Mueller Report , the Special Counsel says Trump administration officials used end-to-end encrypted messaging to conceal and delete communications that should be part of the public record.

How To 145

New Zealand defends its border device search policy (Q&A)

The Parallax

What’s the cost of data privacy at the border? In New Zealand, it could be $5,000, if you resist an immigration official’s demand that you hand over your phone, tablet, or laptop before entering the country.

Innovation: Five Signs You Might Be Faking It

Every company wants to be a leader in innovation, but how can you tell if your company is really innovating or just going through the motions? See the 5 signs you might be faking innovation and what to do if you are.

Make a resolution to clean up your digital act? Here’s how

The Parallax

Did you get hacked in 2017? Chances are you did, thanks to Equifax’s inability to protect the data of more than 143 million of its customers. As a result, you might be feeling frustrated, vulnerable, even angry—not exactly a positive way to ring in the new year.

Travel 260

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out.

Harassed or stalked online? Follow these 5 steps

The Parallax

In 1998, a column published in The New York Times recommended that people who were worried about online stalking change their email address to something that would be “hard to guess” and not to submit personal information to “on-line directories.”.

How To 207

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. Kids as young as 11 are able to hack voting machines in fewer than 10 minutes.

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming.

Trends 179

How to check whether a link is safe

The Parallax

How To 190

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met.

Ask the "Right" Questions: Your Analytics-Guided Product Strategy

Speaker: Yoav Yechiam, Founder and Head Instructor, productMBA

Analytics are highly important for product managers - and yet, analytic implementations often fail to actually help us. It's not the technology, and it's not the tactics. In most cases, it's our approach that's misguiding us! Analytics are there to answer important product questions, not just to collect data. How can we be mindful of our analytics so they enable us, rather than confine us? Join Yoav Yechiam, Founder and head instructor at productMBA, as he explains best practices for a data-guided strategy that helps product managers get to the "why" of their biggest product goals.

When hackers target a conference code of conduct

The Parallax

NEW YORK—Can hackers effectively mitigate a hack of their own subculture? Confrontations between Circle of HOPE conference speakers and a small group of male attendees wearing “Make America Great Again” hats and shirts leave the question wide open.

Privacy impact of Big Tech breakup far from clear

The Parallax

Over the last few weeks, Google and Facebook, the giants of search, social media, and a laundry list of other services, made public declarations of dedication to defending their users’ privacy. At the same time, U.S. presidential candidates , longtime privacy advocates , and even a Facebook co-founder voiced criticism and skepticism of the companies’ apparent efforts to protect user privacy.

Your old router could be a hacking group’s APT pawn

The Parallax

VANCOUVER—If you’ve been looking for another reason to replace your old Wi-Fi router, here it is: A group of hackers could be using it to hide the origins of its online attacks.

Groups 223

Porn extortion scam surfaces breached passwords

The Parallax

The email is alarming. Right there in its subject line is one of the recipient’s username-password pairings.

Report 196

The Magic of Intent: Start Knowing The Goals of Your Users

Speaker: Terhi Hanninen, Senior Product Manager, Zalando, and Dr. Franziska Roth, Senior User Researcher, Zalando

It's important to know your users - what are their preferences, pain points, ultimate goals? With user research and usage data, you can get a great idea of how your users act. The tricky part is, very few users reliably act the same way every time they use your product. Join Terhi Hanninen, Senior Product Manager, and Dr. Franziska Roth, Senior User Researcher at Zalando, as they explain how they were able to reach a new level of user understanding - by taking their user research and segmenting their users by point-in-time intent. You'll leave with a strategy to change how your product team, and organization at large, understands your users.