Security issues dominated the headlines last week on V3, not least the intriguing claim from a senior FireEye exec that nation states may well have injected malware into rival nations' industrial systems 'just in case' of future conflicts.
In another head-spinning bit of news, the director of GCHQ went as far as calling the anonymous browsing service Tor a "brilliant invention", if only for the small fact it wasn't used by criminals and terrorists for all sorts of nefarious purposes.
Meanwhile V3 cast its critical eye over the Microsoft Surface Book to see what we thought of the device and while we definitely think it has potential, there were some shortcomings that left us a tad underwhelmed.
Nations have injected malware into industrial control systems 'just in case'
FireEye SVP believes nations are planning for the future
GCHQ director: Tor is a brilliant invention that highlights the perils of encryption
Robert Hannigan a surprising fan of anonymous service
Microsoft delivers more changes in Build 14279 preview of Redstone release for Windows 10
Another week, another set of updates
TalkTalk CEO admits firm did not take security seriously enough
Dido Harding in frank admission firm was caught unprepared
Surface Book review
Has Microsoft created the ideal laptop-tablet hybrid?
Cloud providers and customers must change to comply with new EU regulations
Lots to like about cloud but don't ignore the details
Specsavers global CIO: Devops is not just another 'Gartner gimmick'
Phil Pavitt admits there is merit to the method
Microsoft aims to tempt customers from Oracle to SQL Server with free licences
Customers need to be part of Microsoft's Software Assurance licensing scheme
Eight IoT tips to ensure project success
V3 collates some key tips for this new area of digital transformation
Ford developing driverless car systems that defy snowy weather
Snow a major challenge for driverless systems
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software