Feeds

Apple Store pillaged in 31 seconds

Five fanboi filchfest

Internet Security Threat Report 2014

On Tuesday, around 2 o'clock in the morning, a team of well-choreographed gadget-rustlers needed no more than 31 seconds to clear out an Apple Store in Marlton, New Jersey.

Taking only one second longer than it does for Justin Long to humiliate John Hodgman in a "Get a Mac" ad, five masked miscreants tossed a brick through the store's glass door; threatened a security guard with what may have been a gun; gathered up 23 MacBooks, 14 iPhones, and iPod touches; and skedaddled.

WPVI-TV in nearby Philadelphia obtained security-cam footage of the heist and reported on it with typically breathless Action News flair:

Adding insult to brick-induced injury, this was the second time that the same Apple Store had been hit in the past few months. In May, the same left-front door was shattered by a piece of concrete and robbed of eight MacBooks and eight iPhones

News of the 50-finger discount comes to us from ifoAppleStore, which keeps a running tab on Apple Store robberies, including ones in Seattle, Washington; Memphis, Tennessee; Pasadena and Rancho Cucamonga, California; Cherry HIll, New Jersey; Kansas City, Missouri; Ardmore, Pennsylvania; Austin, Texas; Las Vegas, Nevada; and more.

Clearly, premium pricing attracts more than merely well-heeled status symbol seekers. We'll be anxious to see if Microsoft can match Apple's popularity among the criminally minded when it begins opening its own stores this fall.

Apple's airy open-plan stores may make shopping an uncrowded, casual experience, but the wide aisles and lack of security tie-downs also give fast-moving gangs a clear pathway to success. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.