The Parallax

How to make your Zoom meetings more secure

The Parallax

Zoom , the video-conferencing app darling of the stay-at-home coronavirus era, is zooming through some cybersecurity growing pains alongside explosive growth.

Secure contact tracing needs more transparent development

The Parallax

Public-health officials have long relied on tracking infectious diseases as common as tuberculosis and as lethal as ebola as a way to stop their spread.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Facebook fails to curb coronavirus misinformation

The Parallax

As Mark Zuckerberg this week detailed the results of the company’s latest Community Standards Enforcement Report , he also revealed that Facebook is being inundated with coronavirus misinformation and disinformation—and that the company has been struggling to stop it.

How to protect your Ring from hackers (and Amazon partners)

The Parallax

The Ring doorbell spent much of 2019 getting buzzed by perceived security and privacy issues, from secret agreements with law enforcement agencies to cybersecurity practices that put its users at risk.

How To 184

Why Smoking Costs Employers More Than They Realize

Your employees are smoking, and at a cost of $7,000 per year for each employee who smokes, that adds up - fast! This free report will show you how an effective cessation program pays for itself.

Phishers target oil and gas industry amid Covid-19 downturn

The Parallax

The oil-and-gas industry has been taking a beating as severe as any other hit hard by the Covid-19 shutdown. Tanker ships loaded with crude idle in the ocean , traders struggle to store what has already been pumped , and prices per barrel have plummeted into negative sums.

Why stopping stalkerware confounds cybersecurity experts

The Parallax

SAN FRANCISCO—The greatest trick stalkerware, one of the most dangerous forms of malware , ever played was convincing the world that it didn’t exist.

CanSecWest, the last tech conference standing in the face of the coronavirus

The Parallax

What if someone threw a hacker conference, and nobody showed up? As I boarded a United flight at SFO on March 17, the first day of San Francisco’s shelter-in-place order , that question was on my mind.

Android’s facial-recognition future could rely on skin detection

The Parallax

The technology that might become the future of facial recognition started with a bucket of household paint.

3D 139

Kr00k Wi-Fi flaw exposes a billion devices to hackers

The Parallax

SAN FRANCISCO—Encryption is great for protecting data in transit, unless that data is encrypted in all zeroes. Unfortunately, that’s exactly what a newly revealed Wi-Fi chip vulnerability does, according to ESET researchers, who disclosed the flaw yesterday at the RSA Conference here.

Building Healthy Innovation Ecosystems for Your Projects

Speaker: Nick Noreña, Innovation Coach and Advisor, Kromatic

In this webinar, Nick Noreña will walk through an Innovation Ecosystem Model that he and his team at Kromatic have developed to help investors, heads of product, teachers, and executives understand how they can best support innovation in their own ecosystem. He'll also go over metrics we can use to measure the health of our ecosystems as we build more resources for innovators.

This hack could take control of your Ford

The Parallax

Using a $300 software-defined radio , a security researcher says he has figured out how to take control of some of Ford’s newer and higher-end cars and trucks.

Hotels 196

Make a resolution to clean up your digital act? Here’s how

The Parallax

Did you get hacked in 2017? Chances are you did, thanks to Equifax’s inability to protect the data of more than 143 million of its customers. As a result, you might be feeling frustrated, vulnerable, even angry—not exactly a positive way to ring in the new year.

Travel 260

How to move your two-factor authentication app to a new device

The Parallax

Last week, at least three months ahead of expectations, Google leaked the design for its upcoming Pixel 4 phone. Why the tech giant prematurely exposed its plans isn’t entirely clear.

Election hackers are ‘waiting for the bigger prize in 2020’ (Q&A)

The Parallax

LEIPZIG, Germany?Just Just days before heading to Australia for his wedding, University of Michigan computer science professor and electronic voting-machine security expert J.

Build vs Buy: 10 Hidden Costs of Building Analytics with UI Components

Many teams, as a logical first step, choose to build their own analytics with the help of UI components. But eventually you’ll find that doing it yourself and at scale has hidden costs. Consider these 10 factors when deciding whether you should build analytics features with UI components.

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking.

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series.

Hotels 208

How to wipe location data from mapping apps

The Parallax

As somebody who repeatedly got lost along the winding, poorly sign-posted alleys of Tokyo while living there before smartphones existed, I found great relief in having Google Maps on hand during a trip back to Japan in February. It was a lifeline of sorts.

How To 185

Securing voting machines means raising funds

The Parallax

There likely isn’t a quick fix for complex U.S. election integrity challenges such as social-engineering interference on Facebook. Experts say there is a straightforward response, however, to vulnerable voting-machine software. The problem is that it involves cooperation in Congress.

Report 207

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Open source the secret sauce in secure, affordable voting tech

The Parallax

SAN FRANCISCO—The fastest, most cost-effective way to secure direct-record electronic voting machines in the United States, according to cybersecurity experts, is to stop using them. Switch to paper ballots and apply risk-limiting audits to ensure that vote tallies are conducted properly.

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out.

How to tell you’re part of the 30 million user Facebook breach

The Parallax

The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t likely to comfort the tens of millions of consumers whose personal data they entrusted to the social-media juggernaut has been stolen.

How To 208

New Zealand defends its border device search policy (Q&A)

The Parallax

What’s the cost of data privacy at the border? In New Zealand, it could be $5,000, if you resist an immigration official’s demand that you hand over your phone, tablet, or laptop before entering the country.

BI Buyers Guide: Embedding Analytics in Your Software

The business intelligence market has exploded. And as the number of vendors grows, it gets harder to make sense of it all. Learn how to decide what features you need and get an evaluation framework for every technical and non-technical requirement you could imagine.

Your old router could be a hacking group’s APT pawn

The Parallax

VANCOUVER—If you’ve been looking for another reason to replace your old Wi-Fi router, here it is: A group of hackers could be using it to hide the origins of its online attacks.

Groups 233

Android Q adds privacy, fragmentation

The Parallax

MOUNTAIN VIEW, Calif.—Google’s Google’s Android mobile operating system has long been criticized for fragmentation , as millions of older devices no longer receiving regular security and feature updates continue to connect to the Internet.

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. Kids as young as 11 are able to hack voting machines in fewer than 10 minutes.

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

How to check whether a link is safe

The Parallax

The sharp flutter of momentary panic that stabs at you when a website link arrives in your inbox or by text message may not (yet) have a specific term in the Diagnostic and Statistical Manual of Mental Disorders , but that doesn’t mean you’re wrong to worry about whether that link is safe to click on.

How To 203

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming.

Trends 195

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met.

Harassed or stalked online? Follow these 5 steps

The Parallax

In 1998, a column published in The New York Times recommended that people who were worried about online stalking change their email address to something that would be “hard to guess” and not to submit personal information to “on-line directories.”.

How To 208

The Essential Guide to Building Analytic Applications

Embedding dashboards, reports, and analytics in an existing application presents some unique opportunities—and poses unique challenges—to software teams. Download this eBook to hear 16 product experts share insights on business intelligence, UI/UX, security, and everything that goes into building a successful application with analytics at its core.

Porn extortion scam surfaces breached passwords

The Parallax

The email is alarming. Right there in its subject line is one of the recipient’s username-password pairings.

Report 206