Feeds

Prosecutor resigns over hacked PC

Down in the Dumps

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

A leading Dutch prosecuter resigned yesterday after hackers entered his mail box and revealed yet another classified letter addressed to the public prosecutor's office.

This was the second security lapse in recent days for Joost Tonino, a specialist prosecutor in white collar crime. Just last week Tonino was left red faced after it emerged he had put his old PC out with the trash. The hard disk, which should have been destroyed, contained hundreds of pages of confidential information about high profile cases, as well as his credit card number, social security number and personal tax files.

A taxi driver who discovered the PC decided to sell the information to a Dutch TV crime reporter, who last week revealed on Dutch television what was on the hard disk. The reporter also managed to open his email box. Although Tonino changed his password immediately after this painful incident, Dutch hackers were able to get access his mail box and published yet another letter by Tonino on a Dutch weblog. In this letter Tonino downplayed the importance of the information found on his PC, claiming "it was material of little importance".

Although Dutch Justice Minister Piet Hein Donner did not intend to prosecute Tonino, the top justice official decided to resign as public prosecutor yesterday, because he believed his dignity had been compromised. Tonino says he will accept another job at the public prosecutor's office. ®

Related stories

Prosecutor leaves crime files on dumped PC
Beckham + strumpet pic actually Trojan
From DRM to Driving lessons

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.