• Search
  • News Features
    • All News Features
    • SPECIAL REPORT: Election Security
    • Special Report: Medical security
    • SPECIAL REPORT: Web Browsers
    • SPECIAL REPORT: Data Brokers
    • SPECIAL REPORT: Encryption Debate
    • SPECIAL REPORT: Facial Recognition
  • How To
  • Q&A
  • Opinion
  • Contact Us
  • Newsletter
 logo
Lost your password?
  • News Features
    • All News Features
    • SPECIAL REPORT: Election Security
    • Special Report: Medical security
    • SPECIAL REPORT: Web Browsers
    • SPECIAL REPORT: Data Brokers
    • SPECIAL REPORT: Encryption Debate
    • SPECIAL REPORT: Facial Recognition
  • How To
  • Q&A
  • Opinion
  • Contact Us
  • Newsletter
    • personalization

      How much personalization is too much?

      Dan TynanJanuary 25, 2019
    • Wi-Fi router

      How Wi-Fi router security has deteriorated since 2003

      Seth RosenblattJanuary 24, 2019
    • customer data

      What happens to your data when a company dies?

      Dan TynanJanuary 18, 2019
biometric

Despite ruling, pro-privacy biometric laws still face long road to change in U.S.

Seth RosenblattJanuary 17, 2019
A California judge’s ruling might give weight to privacy advocates’ arguments in future cases regarding forced device log-ins. But it isn’t expected to change much in the near term.
Features
predictions

How cybersecurity forecasts got 2018 wrong

Rob PegoraroJanuary 10, 2019
Three patterns surface from a look at expectations for the year that turned out wrong: We got lucky, we expected too much, or we were looking in the wrong direction.
Features
DNA

How to delete your DNA from popular genetics sites

Kristin BurnhamJanuary 8, 2019
How easy is it to destroy the DNA samples held at genetic-testing labs, or delete the resulting genealogical profile? We compare some of the most popular services’ policies.
How To
Halderman

Election hackers are ‘waiting for the bigger prize in 2020’ (Q&A)

Seth RosenblattDecember 28, 2018
At Chaos Communication Congress, election security expert J. Alex Halderman describes the United States’ rough yet vital road toward securing its many vulnerable voting systems.
Q&A
support

How to talk to tech support about malware (and other hacks)

Rafe NeedlemanDecember 26, 2018
Even when we’ve exposed our bank log-in credentials through a phishing attack, we need to cap our emotions and respect the rep on the line. Here’s how to get efficient help on the call.
How To
Facebook data

Here’s what Facebook shared about you in its latest scandal

Seth RosenblattDecember 21, 2018
Facebook might not sell user data. But it has been trading deep access to it with tech powerhouses Amazon, Netflix, Huawai, and others, according to a New York Times report.
Features
personalization

How much personalization is too much?

Dan TynanJanuary 25, 2019
If you'd rather not get personalized offers from brands—or at least have more control over the sensitive data used to generate them—your options are pretty limited.
How To
Wi-Fi router

How Wi-Fi router security has deteriorated since 2003

Seth RosenblattJanuary 24, 2019
It’s no secret that few Wi-Fi routers have strong security. It might be alarming, however, to hear that many of today’s high-rated routers have fewer protections than those of 15 years ago, says the CITL research lab at ShmooCon.
FeaturesNews
customer data

What happens to your data when a company dies?

Dan TynanJanuary 18, 2019
When a company goes under or gets sold, its customer data is often the most valuable asset it holds—one it can usually sell or transfer to another entity, depending on the terms of its privacy policy.
Features
medical cybersecurity

How hackers are approaching medical cybersecurity

Seth RosenblattDecember 19, 2018
At the CyberMed Summit in Arizona, simulated hospital emergencies highlight today’s medical-cybersecurity challenges. At their heart: education, collaboration, and advocacy.
News
U2F

Primer: How to lock your online accounts with a security key

Rob PegoraroDecember 14, 2018
Major sites and browser vendors are increasingly supporting physical two-step authentication keys, known as U2F keys. Could they remedy your account security anxiety?
How To
Google CEO

On privacy, Google CEO’s congressional hearing comes up short

Rob PegoraroDecember 13, 2018
Google CEO Sundar Pichai’s first congressional hearing—a milestone he probably wished he could have postponed for a few more years—did not ... Read More...
News
Confidential Mode

Is Gmail’s Confidential Mode a safe bet?

Seth RosenblattDecember 10, 2018
The new Gmail feature Confidential Mode gives senders several ways to protect their messages, including timed deletion, passcode-required opening, and blocked forwarding. But experts are wary.
News
 
  • About Us
  • Editorial Disclosure
Copyright 2016 The Parallax | Publishing since 2015