Feeds

Stealth-cam software snaps laptop looter

What a mug

Boost IT visibility and business value

A laptop thief has been busted after a security application activated the computer's built-in camera, snapped shots of the crook and sent them back to the original owner.

A few months ago, Joshua Kaufman had his Macbook nicked from his apartment in Oakland, CA. Instead of wallowing in despair, though, he started to blog images of the thief captured using tracker app Hidden.

Hidden snaps thief

Getting away with it, for now

Hidden trails stolen laptops, collecting photographs of the rustler and screenshots of the computer in use. After posting pics online, Kaufman's blog soon grew popular and the feds started to listen.

The $15 (£9) Kaufman paid for the application turned out to be worth every cent yesterday after Oakland police swooped, arresting the man in question, based on the evidence supplied.

It's nice to see some tracking software on an Apple that brings no cause for concern. Unless you're a criminal, of course. ®

The essential guide to IT transformation

More from The Register

next story
Top Gun display for your CAR: Heads-up fighter pilot tech
Sadly Navdy kit doesn't include Sidewinder missile to blast traffic
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
NVIDIA claims first 64-bit ARMv8 SoC for Androids
Mile-High 'Denver' Tegra K1 successor said to rival PC performance
XBOX One will learn to play media from USB and DLNA sources
Hang on? Aren't those file formats you hardly ever see outside torrents?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.