Damian Neducic

47 Flips | 3 Magazines | 6 Following | @Damdidosch | Keep up with Damian Neducic on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Damian Neducic”

Aviate: an always-changing, intelligent home screen for Android

What if Google Now was made of the icons on your home screen?<p>"We want to connect people to personalized information at the moment it’s useful," reads the mission statement of Aviate, a replacement launcher for Android available today in private beta. It sounds almost exactly like the tagline of …

Senators Announce Bill That Ends NSA Phone Records Collection

Four U.S. Senators — Ron Wyden (D-Ore.), Mark Udall (D-Colo.), Richard Blumenthal (D-Conn.), and Rand Paul (R-Ky) — introduced legislation that would end the NSA's bulk collection of Americans' phone records.<p>"It will amend the Foreign Intelligence Surveillance Act to end dragnet domestic …

Major US security company warns over NSA link to encryption formula

A major American computer security company has told thousands of customers to stop using an encryption system that relies on a mathematical formula developed by the National Security Agency (NSA).<p>RSA, the security arm of the storage company EMC, sent an email to customers telling them that the …

Explaining the latest NSA revelations – Q&A with internet privacy experts

The Guardian's James Ball and cryptology expert Bruce Schneier answer questions about revelations that spy agencies in the US and UK have cracked internet privacy tools<p>Today, beginning at 3pm ET | 8pm BST, the Guardian's James Ball, who reported on the latest NSA and GCHQ revelations, and …

After NSA encryption-cracking revelation, can we trust Internet security?

Blue LEDs on a row of servers indicate that everything is running smoothly, at the Google data center in Douglas County, Georgia.<p>News that the NSA can break or bypass a variety of digital encryption tools has researchers second-guessing the strength of Internet security products they previously …

Angst und Schrecken im Tor-Netzwerk

Der Angriff auf das Anonymisierungsnetzwerk Tor vom vergangenen Wochenende macht Hacker und Aktivisten nervös. "Tor ist tot", schreibt der Hacker und …

Rückgrat des weltweiten Datenverkehrs

Wo kommen die Daten her, wenn eine Webseite aufgerufen wird, wo sausen sie hin, wenn eine E-Mail verschickt wird? Eine Reise quer durch Mitteleuropa: …

XKeyscore: NSA tool collects 'nearly everything a user does on the internet'

• XKeyscore gives 'widest-reaching' collection of online data<br>• NSA analysts require no prior authorization for searches<br>• Sweeps up emails, social media activity and browsing history<br>• NSA's XKeyscore program – read one of the presentations<p>A top secret National Security Agency program allows analysts …

Tor-Entwickler zu PRISM: "Das soll eine Demokratie sein?“

Der Gründer des Anonymisierungs-Netzwerks Tor, Roger Dingledine, und Tor-Evangelist Jacob Appelbaum haben bei einer Vorlesung (Video) an der …

Keine Chance für NSA-Schnüffler: So surfen Sie unerkannt durch das Internet

Seit der Enthüllung der NSA-Spähprogramme sollte Internetnutzern eines klar sein: Den Schutz der eigenen Privatsphäre nimmt man am besten selbst in …

IT-Sicherheit

US prosecutors indict hackers in largest ever online fraud case

The two Russians arrested in what prosecutors call the largest online fraud case brought in the United States were caught through a combination of hi-tech tools, dogged detective work and sheer luck.<p>The propensity of the wealthy young Russians to travel provided authorities with their big …

SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones

Smartphones are susceptible to malware and carriers have enabled NSA snooping, but the prevailing wisdom has it there’s still one part of your mobile phone that remains safe and un-hackable: your SIM card.<p>Yet after three years of research, German cryptographer Karsten Nohl claims to have finally …

750 million phones could be vulnerable in massive SIM security flaw

<i>The New York Times</i> reports that a security researcher has found a vulnerability in the encryption used by some mobile SIM cards that could let hackers remotely take control of a phone. The flaw relates to cards using DES (Data Encryption Standard) for encryption — it's an older standard that's …

Obama administration decides to keep spying on US phone records, says it's in the 'public interest'

Every 90 days, a secret court has to renew the controversial order that allows the FBI and NSA to spy on the telephone records of every call made in the United States. The last such order expired today, July 19th. But despite the fervor, protest, and lawsuits that have sprung up since whistleblower …

Die Mathematik des Terrorverdachts

Die Spähprogramme Prism und Tempora sollen Terroranschläge verhindern helfen. Doch den US-Geheimdiensten gehen dabei zwangsläufig auch Unschuldige …

U.S. Government Gets Approval to Keep Tracking Phone Records

Well, at least this time they are telling everyone their phone records are being collected.<p>The U.S. government said Friday that the secret foreign …

Wearable Computers Create New Security Vulnerabilities

Among other things, Google Glass is bringing to light how wearable computers and the new wave of web-connected objects collectively known as the …

Huawei tells ex-CIA director, UK government to 'put up or shut up' about spying claims

Though Huawei seems to spend just about as much time denying spying claims as it does building handsets and telecom equipment, it's just taken that rhetoric up a notch. The company's vice president, William Plummer, just demanded the US and UK "shut up" about such allegations unless they can prove …

Apple, Google, others seek to disclose more details on data snooping

The tech industry wants to come clean -- or at least cleaner -- about its role in providing user data to the government and is asking the feds for permission to do so.<p>In a letter sent Thursday to the White House and Congress, dozens of organizations involved in or concerned about the National …

Apple seeks to bulk up on security with fingerprint patent

Apple's iOS-based devices and maybe even Macs could eventually come with support for a fingerprint sensor directly on the display.<p>The U.S. Patent and Trademark Office (USPTO) on Thursday published a patent application that Apple filed with its offices on January 17. The patent describes a …

Apple, Samsung's latest phones face antitheft stress test

Apple and Samsung's latest smartphones will face the scrutiny of state and federal prosecutors in San Francisco on Thursday, who plan to test the latest in antitheft security.<p>San Francisco District Attorney George Gascón and New York Attorney General Eric Schneiderman are testing the latest …

Report: Cyber Attacks On Stock Exchanges Put Markets At Risk

The prevalence of attacks along with the interconnected nature of the markets creates the potential for widespread impact, said the joint staff working paper by the International Organization of Securities Commissions' (IOSCO) research department and the World Federation of Exchanges Office.<p>"There …

OS X Malware Demands $300 FBI Fine for Viewing, Distributing Porn

A new piece of malware is targeting OS X to extort money from victims by accusing them of illegally accessing pornography. Ransomware typically uses claims of breaking the law and names law enforcement (such as the CIA or FBI) to scare victims, but it is usually aimed at Windows users, not Mac …

Banks gird for battle against cyberattackers

It's a war game, Wall Street style.<p>Banks large and small are girding for an elaborate drill this week that will test how they would fare if hackers unleashed a powerful and coordinated attack against them.<p>The exercise is being called "Quantum Dawn 2," and if the name sounds like a video game, it's …

Dump those passwords and PINs: Nuance’s latest voice biometric tech is 50% more accurate than before

Why deal with a password when you can authenticate with a simple voice passphrase?<p>That’s the question behind Nuance’s next-generation voice biometric technology, which the company claims is 50 percent more accurate than its predecessor, as well as more secure with increased fraud detection. Nuance …

Everything you need to know about PRISM

Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information on both foreign subjects and US citizens. Some of these surveillance programs, including a secret program called PRISM, capture the …

American universities reeling from daily assaults by Chinese hackers

A culture of sharing ideas is being challenged by increasing security risks<p>When Bill Mellon, an associate dean at the University of Wisconsin, set out to update the school's security system, he was blown away by the incredible number of cyberattacks being directed at his campus each day. "We get …

Cyberattack aims at government agencies in Asia, Europe

Government agencies across several countries are on the hit list of a targeted cyberattack, according to security vendor Trend Micro.<p>Officials at agencies across Europe and Asia have been receiving an e-mail that lists the Chinese Ministry of National Defense as the source, Trend Micro revealed on …

Suche nach gefährlichen Wörtern

Amerikanische Behörden durchsuchen das Internet nach 377 verdächtigen Begriffen. Natürlich sind darunter Wörter wie "Terror" und "Angriff", aber …

Was Jay-Z's Magna Carta app bad design or a sleazy data grab?

The app gathered data that could be worth millions. Was that the plan all along?<p>Jay-Z's <i>Magna Carta Holy Grail</i> was supposed to be huge, the self-proclaimed Best Rapper Alive's entrée into the internet age. "We need to write the new rules," he said in the omnipresent pre-roll ad. Instead of counting …