Risk
5/12/2008
11:35 AM
50%
50%

Mac Notebook Catches Suspects In Laptop Theft

A burglary victim helped police catch suspected thieves by logging on to her Mac remotely and snapping photos with its Webcam.

Remote access and a Webcam helped police catch two people suspected of stealing a laptop.

Thieves stole a Westchester, N.Y., woman's laptop and then accessed the Internet with the stolen computer, according to a report in The Journal News. A friend of the victim was online and noticed that it appeared the victim was logged onto the Internet. The friend called the victim to ask if that was the case. The victim, an Apple Store employee, was not online.

She logged on to her computer remotely using the Back to My Mac program. She discovered that someone was shopping online with her computer, police said. She activated the Webcam and waited for the suspects to appear in front of the monitor. The victim snapped photos of the suspects and turned them over to the White Plains Police Department.

Police arrested to two men, Edmon Shahikian of Katonah and Ian Frias of the Bronx. Police said they retrieved about $5,000 worth of electronics, including two laptops, two flat-screen televisions, two iPods, gaming equipment, and DVDs taken from the victim's home.

The suspects face felony charges of second-degree burglary and fourth-degree criminal possession of stolen property, according to The Journal News.

Back to My Mac allows Leopard-based Mac owners to find their computers on the Internet. The application provides access to an owner's entire hard drive. A Screen Sharing feature allows for remote control of the machine and all its applications, documents, and folders.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.