Michael CooneyOnline News Editor, NetworkWorld

Cooney is an Online News Editor. He is also the author of the Layer 8 blog, Network World's daily home for the not-just-networking news. He has a Journalism degree from The Pennsylvania State University and has been working with Network World since 1992. Direct: 508.766.5421 NETWORK WORLD 492 Old Connecticut Path| Framingham, MA 01701

How NOT to Get a Job 101: Hack Marriott, Extort Execs for Work

Hacking and extortion will get you thrown in prison.

IRS Helps Bust 105 People in Massive Identity Theft Crackdown

The Internal Revenue Service and the Department of Justice teamed up for a coast-to-coast crackdown on identity thieves this week.

FTC Evaluates Mobile Payment Tools

A workshop will examine the security and feasibility of making payments on the fly via cell phone.

FBI Busts Programmer for Stealing US Treasury Code

The FBI said it arrested a computer programmer in New York this week and charged him with stealing proprietary software code from the Federal Reserve Bank of New York.

Do You Know Your Cyberthreats?

Federal watchdogs this week issued a report on what information is available to help government agencies and public sector companies bulk up their cybersecurity efforts.

FBI Warns of Malware Phishing Scam

Authorities warn of an increase in the use of Gameover, which e-mail phishing scheme that invokes the names of prominent government financial institutions.

The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2011

It was the year we found that horses help build the Internet, Apple has all the money in the world, and way more wackiness.

Picture This: Steve Jobs Gets Bronzed

Hungarian software maker Graphisoft commissions a life-size sculpture of Apple's Steve Jobs.

From Anonymous to Hackerazzi: The Year In Security Mischief-Making

It wasn't a good security year, from the RSA break-in to hacks on Sony, Google, and Facebook

IBM Predicts Five Big Technologies of the Future

IBM today issued its sixth annual look at what Big Blue thinks will be the five biggest technologies for the next five years.

on techhive.com

U.S. Cyber Chief Says Cloud Computing Can Manage Serious Cyber Threats

The security of cloud computing is often debated but such debates seem to be over for the general tasked with running the United States military's cyber command, who sees the technology not only as way to rein in IT costs but a way to more easily protect IT assets.

Robots vs. Humans: Real Steel or Dumb Metal?

Right from the start let's agree that the argument of humans or robots is getting close to being a dead heat in some areas.

on techhive.com

E-wallet vs. Traditional Wallet: Electronics Trump the Leather

Oncoming applications, communications technology and security make this a once-sided argument.

Gartner: The Top 10 Strategic Technology Trends for 2012

At the annual presentation of Gartner's popular Top 10 Strategic Technology Trends presentation, Cearley offered the following examples of the way the tech world is changing.

Romance Scams Pick on Divorced, Lovelorn

Research out of the UK says that perhaps as many as 200,00 people have been victims of online romance scams.