Feeds

Apple Schmucki to sue over fake iPods

Sham Swiss shuffles

Beginner's guide to SSL certificates

International financial heavyweights attending an economic conference in Switzerland were treated in their swag bags to a bright shiny iPod shuffle. One problem: It was a Chinese counterfeit.

And not even a fake talking third-generation shuffle, but instead a second-generation clip-on knock-off. And the impostor doesn't even have Apple's signature shuffle feature.

Counterfeit iPod shuffle (left), real iPod shuffle (right)

That's the logo-ed fraud on the left and the real Apple McCoy on the right

Perhaps if those 1,200 financial titans dig deeper into their goodie bags, they might also find a fake Swiss Rolex.

We learned of this embarrassing boo-boo at the swanky Swiss Economic Forum thanks to the Cult of Mac, which also noted that the wonderfully named head of Apple's Swiss operations, Adrian Schmucki, is none too happy about the provision of the sham shuffles by the equally wonderfully named Swiss insurance company, Schweizerische Mobiliar Versicherungsgesellschaft AG.

Schmucki wants to sue the schmucks at Mobilar.

However, according to what we can glean from the humorously convoluted Google translation of the original article from the Swiss news outlet, Berner Zeitung, Schmucki's threatened lawsuit doesn't stand much of a chance.

The same BZ, by the way, today coincidentally features photos and a video of an odd Swiss ritual performed at the opening of the new Zurich Apple Store.

And we thought the buttoned-up Swiss were both punctilious and proper. Here at The Reg we learn something new every day. ®

Remote control for virtualized desktops

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.