Feeds

Computer thieves as sophisticated as resellers

PC burglars swot up on latest market research, in-demand brands

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Computer thieves are stealing to order, selecting their prey by travelling around Britain, according to a new study commissioned by the Home Office. The study, Pulling the Plug on Computer Theft, found that fences selling stolen PCs are so sophisticated they research the market for hot equipment and meet dealers to assess demand prior to the crime. What's more, these techie tea-leaves take up about a third of the phone numbers in the computer sections of free ads newspapers like Loot, says Home office research. One in three were found to be numbers of already convicted dealers. The report said computer theft accounted for 18 per cent of non-domestic burglaries in Britain, costing businesses on average over £2600 per crime, and is as big a problem as credit card fraud. Professional teams are willing to travel to any part of the country, using anti-surveillance techniques to throw police off the scent, and committ repeat thefts. Out of a sample taken of 1048 items of recovered stolen property, there were 477 computers, 372 other items of hardware, 153 printers, 31 word processors, 14 pieces of software and one computer game. Six companies in Salford, Manchester, were investigated for the study, which also pinpointed the robbers' favourite brands of computer. Compaq came out top, accounting for around ten per cent of stolen kit. IBM came a close second with around nine per cent, followed by Hewlett-Packard with seven per cent. Orders for stolen Dells couldn't have been too hot in the North West -– the direct seller lagged behind at under five per cent. ®

5 things you didn’t know about cloud backup

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?