The great iPad mini heist
- 15 November, 2012 16:47
(Of course, this would have been a much lower-value theft if Apple wasn't charging so much for the new tablet!)
The Post draws parallels between this theft of 3600 iPads, which took place on Monday shortly before midnight, and a 1978 Lufthansa cash and jewelry heist made more famous in the movie "Goodfellas." The thieves allegedly used one of the airports forklifts to nab two pallets of iPads into a truck, leaving a few other pallets behind after being confronted by an airport worker.
Law enforcement is investigating whether this might have been an inside job.
Apple iPhones and iPads have increasingly become targets of thieves, who have robbed stores and individuals most frequently.
Bob Brown tracks network research in his Alpha Doggs blog and Facebook page, as well on Twitter and Google +.
Read more about data center in Network World's Data Center section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
The Big Data Security Analytics Era is Here
Large organisations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!