Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Quick reading reco – “carhacking”

Kim Boatman published an article I think you should read: Can Your Car Be Hacked?

“You might be behind the wheel, but increasingly, computers control your car’s every function.

Microprocessors direct braking, acceleration and even the horn these days. “Because they are hidden, people don’t often understand that there can be anywhere from 30 to 40 microprocessors in most cars and even up to 100 different ones running different functions in some vehicles,” says Stephan A. Tarnutzer, chief operating officer for DGE Inc., which provides electronic designs and consulting for auto manufacturers and suppliers.

But could a hacker compromise these systems? Recently, several news reports have raised the issue of car-hacking risks, including…”

The article raises some valid concerns, and also contains some prevention advice. Click here to read it.

March 12, 2011 Posted by | computers, security | , , , | 2 Comments

Clash of the Titans: China vs Google

Unless you live in a cave, you probably know that much todo is being made over a recent “hacking” incident – China hacked into some dissidents’ Gmail accounts, and Google responded by threatening to pull out of China.

While a threat is not the same thing as an act (at least, in most countries..), this event does have some very real implications and is worthy of your attention. (For instance, it underscores the inherent fatal flaw of “cloud computing“.) The best article on this topic I found so far is by ZDNet Editor in Chief Larry Dignan.

Assessing Google’s showdown with China: Does it make sense?

On the surface, Google’s threat to shut down its China operations after a cyberattack on its infrastructure looks like sheer business lunacy. How can the search giant give up on the world’s biggest growth market? It’s easier than you’d think.

Please click here to read the entire item.

[note: For those who are curious, it is my humble opinion that Google absolutely has to learn from this attack; and do what ever it has to do to maintain its current level of user trust.]

Copyright 2007-2010 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

January 15, 2010 Posted by | Google, Internet, News, tech | , , , | 4 Comments