The Parallax

How tracking voters’ locations could improve future elections

The Parallax

Smartphone location data is a dream for marketers who want to know where you go and how long you spend there—and a general nightmare for privacy advocates. It may come as a surprise that this type of geolocation data could also be used to protect people’s voting rights on Election Day.

To improve your online privacy, consider what matters most

The Parallax

If you want to improve your online privacy, you’re supposed to “ use Signal, use Tor.” ” The clichéd phrase, now five or so years old, was meant to be a sardonic joke underscoring the need for more nuanced online-security and privacy advice.

How To 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The peculiar, persistent threat of bitsquatting

The Parallax

Typos have a long history, by turns serious and silly , going back to the dawn of the printed page.

Zero-day black market shifting from selling vulnerabilities to access

The Parallax

One of the software success stories of the Covid-19 pandemic era has been that of videoconferencing service Zoom.

The 7 Ways to Source and Attract Diverse Technology Talent

Just talking about diversity and inclusion won’t move the needle. Diversity, equity, and inclusion efforts are at the forefront for organizations looking to recruit and retain top talent, but nowhere does this remain more of a challenge and opportunity than in the tech sector. In this guide, we provide seven strategies organizations can use to source and attract diverse tech talent.

Is ad fraud a cybersecurity problem?

The Parallax

Deftly sliding from desktop browsers to mobile devices to smart TVs and other Internet of Things devices, ad fraud is a multibillion-dollar business problem that has been running rampant across the Internet for years.

Beyond Anonymous: Where Hacktivism is going in 2020

The Parallax

Hacktivism is alive and well, if a bit weird, in 2020, says Gabriella Coleman, a cultural anthropologist specializing in hacker culture at McGill University.

There’s more to bug bounty success than hacking skills

The Parallax

In Disney’s hit live-action Star Wars TV show The Mandalorian , bounty hunters join a guild in order to earn status and be assured of the best bounties available.

How To 130

Blacklight tracks the website trackers

The Parallax

Amy Jessel made the conscious decision not to buy Facebook or Google ads to promote her nonprofit company, ShapingYouth.

What EARN IT and LAED mean for encryption

The Parallax

Is encryption the biggest impediment to law enforcement’s ability to stop sexual predators of children? For the advocates of the EARN IT Act, which would loosen the rules protecting Internet services’ use of encryption, it most certainly is.

Deliver Effective Online Education and Events Your Members Will Love

This guide identifies the biggest challenges for associations moving their training online and provides practical solutions so that you can hit the ground running. Download now to keep your members engaged and growing even in times of COVID-19.

How to make your Zoom meetings more secure

The Parallax

Zoom , the video-conferencing app darling of the stay-at-home coronavirus era, is zooming through some cybersecurity growing pains alongside explosive growth.

How to protect your Ring from hackers (and Amazon partners)

The Parallax

The Ring doorbell spent much of 2019 getting buzzed by perceived security and privacy issues, from secret agreements with law enforcement agencies to cybersecurity practices that put its users at risk. Given that Ring, a subsidiary of Amazon.com, bills its devices as helping to build “safer neighborhoods,” its apparently lax approach to protecting customer data struck a number of people as more than ironic.

How To 158

Tough tumbler: Lock-picking vs. the pandemic shutdown

The Parallax

Hackers may be stereotyped as introverts, but at hacker conventions as big as DefCon to more local confabs, you’re almost certain to run across at least a few, and sometimes dozens, of hackers hunched over tables of metal locks and key cylinders, poking at their innards with thin metal picks and rakes.

Sport 130

Set your iPhone up as a Google 2FA key in 5 steps

The Parallax

You don’t need for an app for this. Google has made it possible to use your iPhone as a two-factor authentication key, just as it did last year for Android phones. Two-factor authentication adds an extra layer of security to account log-ins. It’s most commonly encountered as a one-time passcode texted to your phone. That form of 2FA, while certainly more secure than single-factor authentication, is susceptible to SIM card jacking.

How To 155

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Increased scrutiny forces tech to clean up its language

The Parallax

Hackers generally love to embrace change, from executing new exploits to reconsidering past paradigms.

Why stopping stalkerware confounds cybersecurity experts

The Parallax

SAN FRANCISCO—The greatest trick stalkerware, one of the most dangerous forms of malware , ever played was convincing the world that it didn’t exist. Until recently, cybersecurity experts could overlook stalkerware because of the personal nature of how it spreads, its muddled legal status—and how it is detected. Part of the problem, cybersecurity experts at the Enigma Conference in San Francisco last month said, is that until recently, stalkerware has been hard to even define.

Phishers target oil and gas industry amid Covid-19 downturn

The Parallax

The oil-and-gas industry has been taking a beating as severe as any other hit hard by the Covid-19 shutdown. Tanker ships loaded with crude idle in the ocean , traders struggle to store what has already been pumped , and prices per barrel have plummeted into negative sums. With all that going on, the industry is ripe for hackers to exploit. In some cases, that’s already happening, says Tom Murphy, chief technology officer at network security provider Nuspire.

Secure contact tracing needs more transparent development

The Parallax

Public-health officials have long relied on tracking infectious diseases as common as tuberculosis and as lethal as ebola as a way to stop their spread. But manual contact tracing requires boots on the ground — people to track down patients, interview them about where they’ve been and with whom they’ve met, then find those people and let them know that they’ve been in contact with someone who has tested positive.

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

Android’s facial-recognition future could rely on skin detection

The Parallax

The technology that might become the future of facial recognition started with a bucket of household paint. Ingmar Bruder was researching organic photovoltaics—and how to make paint that could absorb sunlight and turn it into electricity—at German chemical giant BASF, when he hit upon an unexpected discovery. When he pointed infrared beams at various objects, they would reflect the beam back in different ways, depending on what they were made of.

3D 133

How to move your two-factor authentication app to a new device

The Parallax

Last week, at least three months ahead of expectations, Google leaked the design for its upcoming Pixel 4 phone. Why the tech giant prematurely exposed its plans isn’t entirely clear. What the design itself does make clear is that when security-minded consumers upgrade their devices, they will have to take a few extra steps to migrate their two-factor authentication apps.

Employer data goes AWOL under Covid-19 lockdowns

The Parallax

Covid-19-era data breaches go beyond unemployment insurance fraud, medical-research hacks, and other hot topics. And unfortunately for public organizations and private companies, the data loss — from theft or otherwise — is getting worse. That’s according to several studies published this month, including the Digital Guardian Data Trends Report , published today, which paints an increasingly dire picture for organizations.

Data 119

This hack could take control of your Ford

The Parallax

Using a $300 software-defined radio , a security researcher says he has figured out how to take control of some of Ford’s newer and higher-end cars and trucks. Through a radio frequency capture-and-manipulation technique he described to The Parallax, Dale “Woody” Wooden, the founder and president of Weathered Security , says a hacker could unlock a Ford vehicle, interfere with its onboard computer systems, and even start its engine.

Hotels 159

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

How to wipe location data from mapping apps

The Parallax

As somebody who repeatedly got lost along the winding, poorly sign-posted alleys of Tokyo while living there before smartphones existed, I found great relief in having Google Maps on hand during a trip back to Japan in February. It was a lifeline of sorts. GPS-connected navigation apps such as Google Maps, Apple Maps, Google’s own Waze, and their competitors have given people like me a major sense of freedom.

How To 158

How to tell when your government shuts down your Internet access

The Parallax

Since the death of George Floyd at the hands of Minneapolis law enforcement on May 25, millions of people worldwide have taken to the streets to protest police violence. But one oft-used government tactic in some countries to limit the ability of their citizens to communicate and organize has been absent so far: There have been virtually no reports of state-mandated Internet shutdowns in response to the protest.

Android Q adds privacy, fragmentation

The Parallax

MOUNTAIN VIEW, Calif.—Google’s Google’s Android mobile operating system has long been criticized for fragmentation , as millions of older devices no longer receiving regular security and feature updates continue to connect to the Internet. Privacy-focused changes (and one big security improvement) in the upcoming Android Q will undoubtedly add to the criticism, as they take years to trickle out to the majority of Android devices.

Make a resolution to clean up your digital act? Here’s how

The Parallax

Did you get hacked in 2017? Chances are you did, thanks to Equifax’s inability to protect the data of more than 143 million of its customers. As a result, you might be feeling frustrated, vulnerable, even angry—not exactly a positive way to ring in the new year. If you want to channel those feelings into getting safer in 2018, follow these seven steps, garnered from how-tos we’ve published this year, to better secure your digital life. Step 1: Use two-factor authentication.

Travel 200

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Kr00k Wi-Fi flaw exposes a billion devices to hackers

The Parallax

SAN FRANCISCO—Encryption is great for protecting data in transit, unless that data is encrypted in all zeroes. Unfortunately, that’s exactly what a newly revealed Wi-Fi chip vulnerability does, according to ESET researchers, who disclosed the flaw yesterday at the RSA Conference here.

How to use your Android as a 2FA key

The Parallax

MOUNTAIN VIEW, Calif.—Google Google just made it much, much easier for Android device owners to protect themselves with one of the safest extra security layers available to consumers. If you have a phone or tablet running Android 7.0 or later, you are a few steps away from turning it into a two-factor authentication key , the company announced at its annual I/O developer conference here on May 7.

How To 149

Election hackers are ‘waiting for the bigger prize in 2020’ (Q&A)

The Parallax

LEIPZIG, Germany?Just Just days before heading to Australia for his wedding, University of Michigan computer science professor and electronic voting-machine security expert J. Alex Halderman shipped an AccuVote electronic voting machine via FedEx to Germany, then flew here, to the 35th annual Chaos Communication Congress, to update the gathered hackers on the state of election security in the United States. The voting machine has been held up in German customs for more than a week.

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking. The attending physician, Dr. Paul Pugsley, called for a CT scan to see if the stroke was caused by bleeding of the brain or a blood clot.

What is Contextual Analytics? The Next Evolution of Embedded Analytics

Download this white paper to learn what contextual analytics is, how BI platforms like Yellowfin revolutionize the way users discover insights from their data with native contextual analytics, and how it adds value to your software solution by elevating the user experience.

Freshly (un)retired, Gary McGraw takes on machine-learning security (Q&A)

The Parallax

Tucked away in Building 43 of Google’s headquarters in Mountain View, Calif., hangs a large but otherwise unassuming mirror that, like Nietzsche’s monsters, will gaze back into you. Among its many features, the Artemis mirror can change your hair color, gamify your hygiene routines, and potentially help you figure out whether your eyesight is getting worse.

Your old router could be a hacking group’s APT pawn

The Parallax

VANCOUVER—If you’ve been looking for another reason to replace your old Wi-Fi router, here it is: A group of hackers could be using it to hide the origins of its online attacks. Inception Framework’s attack methodology has evolved since it was first detected in 2014 in part by Waylon Grange, senior threat researcher at computer security company Symantec.

Groups 182

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out. It’s called Confidential Mode, and you can think of it as self-destructing email. Confidential Mode, which is available in Web browsers, as well as Gmail apps on iOS and Android, offers several privacy-forward features.

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series. The year was 2014, and from then until November 2018, hackers have been stealing data from computers controlled by Starwood Hotels and Resorts ( now owned by Marriott Hotels). All told, records belonging to as many as 500 million guests were stolen, the company said in a statement November 30.

Hotels 160

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.