Feeds

Feds find pro-Napster hacker

Pimpshiz' computers seized by police, but no charges made

  • alert
  • submit to reddit

The Power of One Infographic

'Pimpshiz', the hacker who sprayed pro-Napster messages on hundreds of Web sites last year, may have been caught.

US police raided the home of a 17-year-old last month after being tipped off by the FBI, a fact they confirmed to CNet late last week.

There's certainly no doubt that Pimpshiz broke into and deface a host of big-name Web sites last year. But whether the target of the police action is the hacker in question isn't known for sure. The police seized a stack of computer equipment which is now being investigated by the FBI, who hope to find proof that the lad is indeed Pimpshiz.

The police are also hoping to learn whether the boy also illegally obtained others' credit card details, which could lead to more serious charges than the hacking rap.

The teenager himself admitted to the newswire that he is 'Pimpshiz', but it appears he has yet to be charged by police with the site defacement, the credit card thing or both. According to the local DA's office, no decision has yet be taken as to whether charges will be proferred.

Related Stories

Napster fan hacks 50 more sites
Pro-Napster hacker claims 60 site scalps

Mobile application security vulnerability report

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.