Feeds

Microsoft burgled, only the APPLE iPADS stolen - cops confirm

Choosy thief leaves Redmond gear on the table

Top three mobile application threats

A savvy sneak slipped into a Microsoft campus, stole five iPads and left all the Microsoft products untouched, according to cops.

More than $3,000 in Apple kit was nicked from the research and development complex in Mountain View, California, over Christmas. There was no sign of a forced entry at Building 5 on La Avenida Street, whose staff use electronic cards to enter the offices, said Sgt Sean Thompson.

The five fondleslabs - two iPad 2s, two third-generation iPads and an "iPad 4" - were taken from three offices. The latter is understood to be the latest generation of Apple's tablet rather than a secret new device.

Microsoft reported the crime to the police on 2 January but believes the electronics were stolen between 19 and 26 December. Police are waiting for CCTV footage from the campus.

Word of the theft spread after a photograph of a report in the Palo Alto Daily Post - strap line: "news you can't get on the internet" - appeared on websites Imgur and Reddit. The article was not available online, but the story was confirmed to The Reg by the Mountain View Police Department this afternoon. Many netizens had assumed the tale was yet another web hoax.

Daily Post story, iPad Theft, credit Daily Post

Friday's local paper report - click to enlarge

Meanwhile, Daily Post writer Angela Ruggiero, whose byline appeared on the story, has also confirmed that the above clipping is not a mock-up.

The iPads may have been the obvious thing to steal in Building 5: that's the place where Microsoft, whose headquarters are in Redmond, develops software for Apple hardware. It's possible the thief has got hold of some unreleased Microsoft apps with his or her Apple devices. The office also houses Microsoft Exchange hosting servers, a less tempting target for a light-fingered thief.

Microsoft did not respond to a request for comment. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.