Feeds

Web cam images undo MacBook thieves

You've been iFramed

Remote control for virtualized desktops

A pair of clueless US crooks were brought to justice when they went online using an Apple employee's stolen laptop.

Edmon Shahikian, 23, of Katonah, and Ian Frias, 20, of the Bronx district of New York, were arrested and charged with burglary and possession of stolen property after their victim tracked them down. Kait Duplaga, who works in an Apple store, traced the duo thanks to software application installed on her stolen Mac, the New York Times reports.

Along with the Mac another laptop, flat-screen TVs and computer games, DVDs, MP3 players and a set of car wheel hubs were stolen in a burglary at the apartment Duplaga shared with two other people in White Plains last month. Almost all the stolen booty was recovered when police arrested Shahikian and Frias.

Duplaga used a feature called "Back to My Mac" to gain remote access to her laptop when the dynamic duo used it to surf the net. She saw that the pair of crooks were shopping for beds. Surreptitiously she activated a camera on her laptop which she used to take a picture of Frias, using an application called PhotoBooth. One of Duplaga's flatmates knew Frias, who attended a house party shortly before the break-in - a factor that led to his undoing when Duplaga turned over his picture to the police. ®

Internet Security Threat Report 2014

More from The Register

next story
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
'Cleantech' a dirty word for VCs? RUBBISH!
They just think the current schemes are terrible
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.