Joshua Alder

63 Added | 3 Magazines | 1 Like | 3 Following | 6 Followers | @bishbosh05 | Keep up with Joshua Alder on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Joshua Alder”

Ski-World Problems

The guilty pleasure of living in The Bubble.<p>Author:<p>Drew Pogge<p>Publish date:<p>Social count:<p>40<p>The guilty pleasure of living in The Bubble.<p>40<p>SHARES<p>There’s …

Outlook, Skype, Hotmail, Messenger

See your recent documents, or start one for free with Office Online.<p>Sign in to your Microsoft account to see recent notes.<p>Sign in to your Microsoft …

A New Army Of Chinese Hackers Is Stealing Secrets From U.S. Companies, Researchers Say

The researchers told Business Insider that they don't know what the hackers are doing with stolen IP, or how much money this has cost U.S. companies so far. But, they say, the group has been busy in 2013.<p>Most of the attacks have been on tech, financial services and telecom companies. They seemed …

Intellectual Property

Smartphone cameras can give away PIN codes, researchers warn

Advertisement<p>6 Comments<p><i>Correction: This article originally said the user’s eyes were what gave away the code, but it is in fact the orientation</i> …

12-year-old boy admits to hacking government sites for Anonymous

A 12-year-old boy in Montreal has pleaded guilty to breaking into multiple government and police websites in the name of the hacker collective Anonymous, reports the <i>Toronto Sun</i>. The attacks were not politically motivated, however; the boy testified that he traded information to members of Anonymous …

Ten Steps You Can Take Right Now Against Internet Surveillance

One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can …

Information Systems

Think You Can Live Offline Without Being Tracked? Here’s What It Takes

We asked the most privacy-aware people we could find what it would take to go off the radar. Hint: You’re going to need to do more than throw away your laptop.<p>Nico Sell, the cofounder of a secure communication app called Wickr, has appeared on television twice. Both times, she wore sunglasses to …

Privacy

Want to Evade NSA Spying? Don't Connect to the Internet

Since I started working with Snowden's documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared …

Snowden spy row grows as US is accused of hacking China

Whistleblower charged with espionage reportedly claims US authorities accessed millions of private text messages in China<p>Edward Snowden, the former CIA technician who blew the whistle on global surveillance operations, has opened a new front against the US authorities, claiming they hacked into …

EX-NSA DEVELOPER: Hackers Can Take Over Security Cameras To Spy On You

Craig Heffner, a former software developer with the National Security Administration who now works for a private security firm, said he discovered the previously unreported bugs in digital video surveillance equipment from firms including Cisco Systems Inc, D-Link Corp and TRENDnet.<p>"It's a …

Cybersecurity

Three Steps You Can Take to Protect Yourself From Online Spying

The recent PRISM scandal has validated both the general public's growing unease with federal law enforcement agencies, and many of the fringe …

Silent Circle Launches Management Console

<b>Silent Circle</b>, a startup providing private encrypted communications solutions, this week released <b>Silent Circle Management Console</b>, a secure web-based …

How Hackers Beat The NSA In The ’90s And How They Can Do It Again

<i>The CrunchGov Essential is a scannable roundup of technology’s influence on the day’s big issues. Below a feature post, we present the most thoughtful, outrageous, and inspiring stories told through the web’s best content. Sign up for the morning newsletter here.</i><p>While the world parses the …

14 Infamous Computer Virus Snippets That Trace a History of Havoc

Computer viruses are almost as old as personal computers themselves, and their evolution was only hastened by the birth of Internet. And within each …

SIM card hacked, could affect "millions of phones"

German cryptographer Karsten Nohl claims to have broken the encryption standard on certain types of SIM cards. The exploit could allow a virus to be …

Feds tell Web firms to turn over user account passwords

Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted form.<p>"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?" <br …

Surveillance

Where Young Entrepreneurs Meet and Start Up | Young Entrepreneur | Entrepreneur.com

Feedback can be an incredible tool to help your business grow.<p>Rose Leadem 2 min read<p>BOXFOX co-founder and COO Sabena Suri wants to help other young women find their confidence.<p>Nina Zipkin 10 min read<p>Melanie Perkins, the co-founder and CEO of popular design platform Canva, and her team are …

Entrepreneurship

Stock Quotes, Business News and Data from Stock Markets

Tor Anonymity Comes Under Attack

article<p>http://www.symantec.com/connect/blogs/tor-anonymity-comes-under-attack<p>Symantec Security Response

U.K. Ordered Guardian to Destroy Snowden Files Because Its Servers Weren't Secure

It's the kind of justification that only a government agency could make.<p>After NSA insider Edward Snowden absconded with thousands of sensitive U.S. …

How to Encrypt Your Email and Keep Your Conversations Private

Between constant password breaches and the NSA looking in on everything you do, you've probably got privacy on the mind lately. If you're looking for …

NSA Has 50,000 ‘Digital Sleeper Agents’ Via Computer Malware, Says Latest Snowden Leak

Sleeper agents are among the most sinister spy assets: they lie in wait, wolves in sheep’s clothing, and then deliver a critical blow when activated. The NSA has 50,000 of those waiting for the literal push of a button, according to the latest batch of leaked Snowden documents, as seen by Dutch …

Call Yourself A Hacker, Lose Your 4th Amendment Rights

Battelle asserts generally that defendants who have the technical ability to wipe out a hard drive will do precisely that when faced with allegations …

Promising secure and easy-to-use email evolution, Dark Mail scores $212K in Kickstarter cash

Advertisement<p>2 Comments<p>The problem with encrypted email is that it’s hard to use – if it weren’t, everyone would be using it. So rather than mucking …

Report: NSA Considered Revealing Porn Habits To Discredit Radicals

I feel like when people freak out about the unknown threat of mass government surveillance, they’re secretly worried a clandestine agent will reveal their naughty web-surfing habits to friends and family. Today, that fear was revealed. At least for suspected terrorists.<p>The Huffington Post* reports …

The 3 Biggest Mistakes I Made at The Start Of My DJ Career

• <i>Mike Monday is a veteran music producer and DJ, who now helps beginners to big names like Claude VonStroke to enjoy making more music in less time</i> …