Feeds

Murdered Chinese students linked to online betting scam

Forum threats over football bets

Securing Web Applications Made Simple and Scalable

The two Chinese Newcastle University graduates murdered last weekend could be linked to a complex web betting scam, Northumbrian Police believe.

The couple, Xi Zhou and Zhen Xing Yang, were found dead by police on Saturday. Police said the two were tortured for some time before being killed. Bizarrely, the couple's cat was found dead in a bucket in the bathroom. Detective Superintendent Steve Wade said it was one of the worst crime scenes he'd ever seen.

Wade said: "A possible motive for the killing is beginning to emerge... Community intelligence supported by the examination of computer equipment and mobile call data has shown that both of the victims have been involved in fraudulent activity which has angered and upset a number of people. We are currently investigating this as a possible motive for the killings."

Local papers found Chinese language forum postings from Mr Yang asking for assistants to go to football matches and report back via mobile phones.

There is a slight delay before games are broadcast in China, allowing fast acting-gamblers to beat the bookmakers. Forum postings reveal several people who felt Yang owed them money. He was also offering fake degree certificates to Chinese students. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Boffins build FREE SUPERCOMPUTER from free cloud server trials
Who cares about T&Cs when there's LIteCoin to mint?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.