Feeds

E-trade scammer pleads guilty to Office Space scam

We're not going to white-collar resort prison. No, no, no

Secure remote control for conventional and virtual desktops

A Californian man who raked in $50,000 after opening thousands of bogus accounts with online brokers, sometimes in the name of cartoon characters, has pleaded guilty to fraud.

Michael Largent, 23, of Plumas Lake, California pleaded guilty to computer fraud and wire fraud charges on Thursday over a scam that ran for six months between November 2007 and May 2008. Largent wrote a script that established an estimated 58,000 online accounts with brokers such as E-trade and Schwab, using false and sometimes fictitious names.

Some of the more noteworthy names used included Hank Hill and Rusty Shackelford, characters from animated series King of the Hill.

The brokerage firms made tiny test deposits into these accounts which Largent pocketed, in the style of similar scams from films such as Superman III and Office Space.

Largent faces up to five years' imprisonment over the scam at a sentencing hearing scheduled for 13 August, Computerworld reports. ®

Remote control for virtualized desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.