2013-06-25: Raspberry Pi bot tracks hacker posts to vacuum up passwords and more
2013-06-25: Cassini captures gigantic hurricane on Saturn in exquisite detail
2013-06-25: It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis: 1930s — 1960s
2013-08-01: Trusting iPhones plugged into bogus chargers get a dose of malware
2013-08-26: The Guardian's NSA Files collection of articles (also related, The Guardian's general NSA keyword articles)
2013-08-26: They Know Much More Than You Think
2013-08-27: Snowden Interview
2013-08-27: Firefox Security and Privacy Add-ons
2013-06-25: Computer cold call virus scam — scammers outsmarted!
2013-06-25: FEMA Cyberattack advice webpage
2013-06-26: Wireless Sensing
2013-06-26: Sony's New Smartwatch
2013-06-26: Finance CIOs sweat as regulators prepare to probe aging mainframes
2013-07-13: New Bluetooth, Audio, TPM Requirements Coming for Windows 8 devices
2013-07-13: Your Facebook Friends May Be Evil Bots
2013-07-18: Nations Buying as Hackers Sell Flaws in Computer Code
2013-07-18: Stuxnet (Wikipedia)
2013-07-18: GRC.com --- in particular, look at the new page on Fingerprinting
2013-07-18: DHS Eyes Sharing Zero-Day Intelligence With Businesses
2013-07-22: FBI Cyber-crime news archive
2013-07-22: Getting the message, at last
2013-07-22: Messages from the past
2013-07-24: The Coming Push to Open Source Everything
2013-07-24: The perfect Trojan horse
2013-07-24: The firewall threat you don't know
2013-07-24: Power Pwn
Most histories of computing leave out the contributions of the number theorists in the early 20th century who constructed specialized computing devices.
The most prominent of these were Derrick Norman Lehmer and Derrick Henry Lehmer.
Here are a few web pages with information about their computing devcies:
A recent talk given by Arjen Lenstra
Artificial Intelligence (usually called "AI") has long been a fascination of computer scientists and the general public.
Stanford Encyclopedia of Philosophy: The Turing Test
The Trouble with the Turing Test
Third-Party Web Tracking: Policy and Technology
November, 1977 edition of BYTE magazine
Another printing technology: Dye sublimation printer
Mike Shapiro Hidden Camera Cartoon
Computer and Information Ethics
Electronic Frontier Foundation
Electronic Privacy Information Center
Megaupload and the Government's Attack on Cloud Computing
GPL's list of Open Source Software Licenses
Meet the Machines that Steal Your Phone's Data
Difference Engine: Pay up or shut up
You're infected — if you want to see your data again, pay us $300 in Bitcoins
2014-01-22: What Secrets Your Phone Is Sharing About You
2014-01-23: 4 Ways to Keep Hackers Out of Your Refrigerator
2014-01-23: Food that texts 'eat me' could be on way, minister told
2014-01-28: BeWifi lets you steal your neighbor's bandwidth when they're not using it
2014-02-06: We Need to Re-decentralize The Web
2014-03-18: Who Needs to Know How to Code?