This Week's Top Story: PSN Fiasco This Week’s Top Story: PSN FiascoPlayStation Network lurches to life. Sony’s slogan “make.believe” will no longer apply to network security.After hack, Sony offers freebies to unhappy gamers. Let me guess: Free personal info about other players?5/14/11 Alibaba transferred Alipay ownership without Yahoo approval. On the plus side, 40 thieves seem delighted.Tech gadgets for the absurdly wealthy. I’m still looking for a reasonably priced iPad 2 embedded in a 36-foot yacht. Lady Gaga fans descend on FarmVille. Diva enthusiasts hope to learn how to grow meat dresses.5/15/11Senators introduce PROTECT IP bill. House counters with a bill banning cutesy acronyms.Companies explore private virtual worlds. Isn’t that just another term for “employees’ cubicles”?5/16/11Is the cellphone killing honeybees? I hope they aren’t talking on their phones while flying… Playing video games preps you for tomorrow’s global workplace. Assuming that your job will involve flinging birds at pigs.Scammers empty African victims’ bank accounts. Ruse begins “Greetings. I am Alan Greenspan, former chairman of US Fed…”iOS developers threatened with patent lawsuits. I wonder if anyone has a patent on patent lawsuits.5/17/11 Researchers test robot toughness with a bat. We’ll be notifying PETA (People for the Ethical Treatment of Androids).Homebrew computer plays homebrew Asteroids. Alert me when they add homebrew beer to the equation.Windows scareware fakes impending diaster. Want to really scare users? Threaten to revert to Vista.Starbucks shares lessons of going mobile. Goal, we suspect, was to shift attention away from the coffee.Moving to the cloud isn’t for everyone. We recommend living in Seattle for a week as a simulation first.5/18/11FTC targets entrepreneur who charged for phony “free trials”. We hope he’ll get his own free trial.UK businesses warned to comply with EU cookie law. British must immediately stop calling them “biscuits.”Couple names baby after Facebook “Like” button. Kid should be thankful she wasn’t named “Poke.”5/19/11N. Korea pulls Internet domain from German operator. “We never should have abandoned nepotism,” says some guy named Kim.Editor asks: “Are you exposing your private Facebook lists?” Better, we assume, than exposing your Facebook privates list.Helium-filled robotic blimp is a stalker. Plans to look up old girlfriend “in the cloud.”Plants vs. Zombies heads to China with new game versions. Politburo vs. Gang of Four is sure to be a hit.Self-inflating earbuds could save ears–and tunes. May also be used as a flotation device in case of a water landing.5/20/11Playboy unloads wares on the iPad. Does this mean that the rumored “Bachelor iPad” may be released after all?Google intends to resist antipiracy law efforts. Citing principled interests in free speech, free booty?Group seeks to form Apple retail workers union. The Brotherhood of Longshoremen & Geniuses is a natural.Google plans expanded 24/7 phone support. Expansion to 25/8 support is based on an idea from Spinal Tap.Your blood could tell how long you’ll live. Especially if most of it is on the ground next to you.Want more tweets, as they happen? Follow us on Twitter every day, at @PCWPluggedIn. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe