Feeds

Apple identifies alleged lead secrets leaker

Worker Bee discovered

  • alert
  • submit to reddit

Updated Apple has discovered the identity of at least one of its employees who's been craftily passing company secrets to the press.

The Mac-maker filed a suit alleging violation of company copyrights and trade secrets earlier this month. The complaint targeted 25 unnamed individuals, but Apple said it would run each of them to ground, and once it had identified them it would add their names to the suit.

Apple wants to prevent the 25 from leaking further information. It also wants monetary damages off them for business it claims to have lost thanks to the leaks.

Top of the wanted list was an individual identified only by the handle Worker Bee. Apple specifically claimed Bee leaked details of the its new Pro mouse and dual-processor Power Mac G4s before their launch, along with details of a machine the company has yet to unveil - probably the upcoming next-generation iBook.

The suit now names Bee, though in a fit of holier-than-thou zeal, CNet refuses to name him or her, noting there may be other Apple employees of the same name - a point it could easily have made had it named the individual.

Indeed, there may be other employees called Juan Gutierrez, and we'd caution Apple staffers to make sure they've got the right one before taking any action. ®

Related Stories

Apple anti-leak action shifts to Yahoo!
Apple raises legal sword over rumour sites

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.