Feeds

iPhone con man knifed to death in knock-off mobile brawl

Fraudster got more than he bargained for

Using blade systems to cut costs and sharpen efficiencies

A bloke was arrested after a brawl over a counterfeit Apple mobile led to the fatal stabbing of a con man.

The fight kicked off in Zhengzhou, northern China, according to Henan province newspaper The Dahe Daily [Chinese], which published grisly CCTV footage capturing the moment of the stabbing.

A 29-year-old cook surnamed Feng was out bargain hunting in a shopping district of the city when a man offered to sell him a brand new iPhone for only 2,000 yuan (£200). Realising too late that he’d been had and that the mobile was a knock-off, it is alleged that Feng returned to the area on a daily basis armed with a large knife in an attempt to find the con man.

In the end he didn’t find the miscreant who conned him, but happened upon a group of fraudsters who were trying to trick a young boy in the same way. Feng brandished his chopper and they dispersed, it is claimed.

A few days later Feng came across the same gang and, it is alleged, a scuffle broke out, during which he stabbed one of the crooks in the chest and severed a major artery in the right leg of another. The second victim died a day later due to excessive blood loss.

The market in shanzhai - China's counterfeit products - has reached astounding proportions, with the highly sought-after iPhone providing knock-off merchants with a good source of income.

In the end, it’s unlikely that this case will keep shanzhai pedlars off the streets, but it may teach a few consumers not to buy electrical kit from dodgy-looking chaps in anoraks. Cops are investigating the death after Feng told them he could not remember what happened during the chaos of the brawl. ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.