While experts acknowledge that pacemaker hacks aren’t likely, the risk underscores a need for better communication among security researchers, doctors, the FDA, and medical-device manufacturers.
Using Wi-Fi with proper precautions can prevent hacks of your devices, as well as exposure of the sites you browse to the apps you rely on.
Our vital systems and seemingly frivolous daily communications are in need of technological scrutiny. And yet we often fail to see ourselves as targets and take action.
Organizations don’t necessarily need to pay for zero-days, experts say. First, they need to set up vulnerability disclosure channels and establish reasonable response times.
As the controversy-laden ride-sharing service unrolls new privacy controls for users, Uber's technological turns still seem slightly speedier than its customers’ perceptions, if not the law.
As ride-sharing giant Uber contends that it’s been tracking devices’ unique identifiers on legitimate grounds, security experts outline how they can be used to both protect and expose.
Even the most secure, stable, and well-positioned open-source messaging apps need a smart user interface to catch on. Look no further than Demonsaw’s demise—and Signal’s success.
While fitness apps and devices could help you improve your physical health, they could also jeopardize your personal privacy, career, or insurance rates. Here’s what to look out for.
Is there a difference between computer security in your home versus in a small business? Absolutely, says the founder of Townsquared. But it’s not as big as you might think.
Hacker group claiming to have millions of valid Apple log-ins and demanding $75,000 underscores risks of credential stuffing.
Interest in the software has skyrocketed as Trump rolls back consumer protections from Internet providers. But choosing a good VPN can require a little digging. Here’s what to look for.
The “biggest cyberthreat” of the year isn’t just a problem for big businesses. Eager to pluck the lowest-hanging fruit, cybercriminals are increasingly targeting small organizations and consumers.
Aiden Riley “Caezar” Eller, longtime CTO of Unium, explains how he’s working “to get the home network to be a meeting place for devices to all have an equal level of responsibility.”
Although you can’t necessarily increase how much privacy and security these voice-controlled personal-assistant devices provide, you can limit the info they collect and store. Here’s how.
Machine learning, enabled by finely tuned algorithms and a plethora of data, "artificial intelligence" is quickly growing in influence among security professionals, cybercrime rings, and data-probing government agencies. Here’s how.
At hacking contests like Pwn2Own, individual hackers can shine. Participating companies, meanwhile, can find and recruit badly needed talent, as they build hacker-friendly reputations.
As tech vendors downplay the risk to consumers, security experts explain why the “Vault 7” tranche is “increasing the amount of cyberinsecurity in the world, not decreasing it.”
Revision proposals for the international agreement to control weapons exports aim to address language that could have severe consequences for security researchers.
During World War II, the U.S. Office of War Information launched a “Loose Lips Sink Ships” campaign to reduce the chance that someone might inadvertently give u... Read More...
Granick, the director of civil liberties at Stanford Law School and recent author of “American Spies,” sounds off on the nature, effectiveness, and justness of U.S. surveillance today.
Bitcoin transactions are protected by a built-in “proof of work” system supported by economic incentives. Private record systems based on bitcoin’s public ledger need a similar setup, experts argue.
What was once an obscure app offering protection for which most people couldn’t contemplate a use is being rapidly adopted by tech titans and rebels alike. Here’s why.
Tools developed to create, acquire, and distribute data can also be used to gain influence, monitor, and persecute. These uses are two sides of the same coin.
Following revelations of two of the biggest user account breaches ever, ex-Yahoo engineers are advocating ditching all of its services, including Mail, Flickr, and Tumblr.
Far beyond Yahoo's services, it’s time to delete your archived email, private messages, contacts, files, photos—anything you can’t afford to find its way into a hacker’s hands and beyond.
First Amendment protections haven’t stopped attempts to regulate organized protests and other civic action. But effective community organization doesn’t have to sacrifice privacy.
Will Trump be able to fill key positions? Will he heed warnings about Russia? Will he look to force tech companies to create encryption backdoors? Here’s what several experts tell us.
Moving away from Yahoo isn’t trivial. But in light of recent security revelations, experts have decided that it’s time. Here’s how to back up, migrate away from, and shutter your accounts.
The assumption that all map search results for businesses are accurate, legitimate, and locked down “is wrong,” says hacker Bryan Seely. Here’s how fake listings can put you and businesses at risk.
More and more of your data is getting distributed through the browser. To prevent it from getting compromised, experts recommend taking these five simple steps.
With “flexibility and freedom” comes “multifaceted” threats to consumer safety. Here’s how browser developers ranging from Google to Mozilla are approaching today’s challenges.
Like other types of programs, antivirus software sometimes is vulnerable itself. And unlike others, it can hook into the core of your computer. Here’s why experts say you should still use it.
Communication algorithm researcher Christian Sandvig, who joined the lawsuit against the longtime antihacking law, tells The Parallax that regardless of its outcome, something has to change.
Billions of connected devices gaining in popularity don’t adequately address experts’ privacy and security concerns. Here’s a quick checklist to get through before purchasing one.
Vince Steckler, CEO of Parallax sponsor Avast, discusses why his company is planning to buy its biggest competitor for $1.3 billion.
Security expert Window Snyder’s new role has her defending website and Web content on a grand scale.
Counterterrorism expert John D. Cohen tells The Parallax that to tackle terrorists’ effective Internet recruitment efforts, we need to first understand the underlying issues.
As you install any app, be cautious about the data you share with its publishers and might expose to eavesdroppers. Here’s what to look out for this election season and beyond.
The social network says it isn’t listening to users’ conversations to better target ads. For good measure, here are several ways to limit app access to your voice and online interactions.
From Infant Optics to Graco, companies behind several popular radio frequency monitors are either overpromising or underdelivering on security claims, Independent Security Evaluators finds.
Craig Steven Wright, lacking proof, has backed away from his assertion that he’s bitcoin’s inventor. Here’s why any holder of the Internet currency should care who Satoshi really is.
As people and organizations pay larger sums to free their computers of the malware, The Parallax looks into what’s driving ransomware’s development—and where it’s spreading.
Itzhak “Zuk” Avraham, founder of Zimperium, has been confident that his Israeli colleagues at Cellebrite would successfully help the FBI unlock the iPhone 5C of Syed Farook. Here’s why.
From your wireless carrier to your favorite retailer, hundreds of businesses could be following your movements. Here’s how and why—and what they could be doing with your location information.
Although businesses can get insured against losses from online attacks, it’s almost impossible for consumers to do the same. Here’s why—and what you can do instead.
In the 30 years since President Reagan signed the Computer Fraud and Abuse Act into law, it’s been the subject of heated controversy and undergone many alterations. What’s next?