Google and Motorola: A Good Match?

On Monday Google unveiled a new strategy to gain ground in the mobile marketplace.  In their largest purchase to date, Google announced their intention to acquire Motorola Mobility for $12.5 billion.  So what does this mean for the consumers of mobile-phone and tablet computers? 

Facebook Facial Recognition: Amazing and a Little Scary Too

On Tuesday, June 7, Facebook quietly turned on a new feature called Tag Suggestions.  This new feature uses proprietary facial recognition software to automatically recognize friends in your uploaded photos and suggest that you tag them.  While some people may be a little nervous about privacy concerns related to this new feature, I can’t help but say “Wow, that’s pretty amazing!”

What is World IPv6 Day and Why Should I Care?

On June 8, 2011, a host of major Internet network providers and websites will be running a twenty-four-hour “Test Flight” of IPv6 on their networks.  While this will be transparent to most users of the Internet, it is definitely not an insignificant event.  So what is IPv6, and how does it affect you?


Hack Attacks Now an Act of War?

According to the Wall Street Journal, the Pentagon has begun to form a policy declaring cyber attacks an act of war if the results of the attack are similar to other acts of war.  While U.S. policy on this matter is not completely clear yet, it is clear that criminals have recently ramped up their use of computer hacking to reach their goals, and many organizations large and small do not have adequate defenses against this sort of attack. 

Man-in-the-Middle Attacks

Since the beginning of time scammers have been developing new and innovative ways to fool victims into giving away their secrets.  In today’s electronically-enabled world those scammers have gone high-tech.  One of the more surreptitious ways to electronically capture your private information is a man-in-the-middle attack.  A man-in-the-middle attack works a little like a high-tech version of the children’s game telephone, except that it is no game.  Your identity and financial information may be at stake.