Law & order
Claims are made that the Aurora hackers weren't just Chinese-sponsored hackers bent on messing with Tibetan activists.
Rather it was a Chinese counterintelligence operation that sought to discover if the US had uncovered the identity of clandestine agents operating within its borders.
Episode #109 of our popular Chet Chat podcast series is out.
Chet and Duck are back with their almost entirely reverent opinions on the latest computer security issues.
It's "a public service on a public connection to other public servers", the operator of RageBooter told Brian Krebs, and if sites don't like getting their socks knocked off in DDoS attacks, they should fix recursive DNS and default DNS server settings.
Oh, and yes, he says, he not only cooperates with the FBI, he works with them. He's busy on Tuesdays around 1 p.m., so try later if you need to to launch an attack.
Jeffrey Beall, a US academic librarian who uses his Scholarly Open Access blog to write about scholarly publishers' dubious practices, is being threatened with a $1 billion lawsuit by an Indian publishing group.
The US Congress sent Google a letter listing eight specific privacy areas concerning Glass that legislators would like to know quite a bit more about. As would many of us, now that you mention it.
In this podcast Chester interviews Parmy Olson author of "We are Anonymous" about her thoughts on LulzSec, their sentencing and the Anonymous movement. Parmy also shares some of her thoughts on Firefox OS and other developments from Mobile World Congress 2013.
Graham Cluley argues that it's not cool, or funny, to hack into companies, expose the private information of members of the general public, and to launch denial of service attacks.
LulzSec are about to be sentenced, which will tell us what the judge thinks.
But why not tell us what you think, right here, right now?
Four members of the notorious LulzSec hacking gang, who attacked websites belonging to the likes of the CIA, the NHS and the Serious Organised Crime Agency (SOCA), are due to be sentenced by the UK authorities.
Ever wondered how cybercriminals turn electronic trickery into cold, hard cash? What sort of person gets drawn into this sort of crime? Who bears the cost? And how do the cops arrest the perpetrators when they might be dozens of network hops away?
The AP reports that records for two months of calls to 20 lines were seized, including a phone line straight into the heart of the House of Representatives. Congress, to its credit, is not amused.
Identity thieves can't help but brag about all the food they consume with the money they're stealing... Too bad their smarts aren't as big as their appetite.
Crooks who swindled a woman out of her £1 million ($1.5 million) life savings, and blew their ill-gotten gains on cheeseburgers, gold and computers, are now facing jail time.
The Columbus, Ohio man has been sentenced to one year of house arrest for stymying an FBI investigation into the 2011 hacks, which saw millions of online players' data breached.
It's that time of the week again - here's your roundup of everything we wrote in the last seven days.
When you think of cybercrime, you probably imagine a hacker sitting far from his victims, breaking in digitally from a distance.
But when it comes to cashing out the proceeds of your crime, it's a question of "Go where the money is...and go there often."
Adrian-Tiberiu Oprea, a Romanian national and the alleged ringleader of the gang responsible for a multimillion-dollar hack of the Subway fast-food chain, has pleaded guilty.
It looks like internet access into and out of Syria has been shut down, cutting the country off from the rest of the internet.