Police tracked McFarlin down through the use of the stolen computer equipment, Tsui said.
Police investigating computer hacking and stolen mobile phones have arrested a 48-year-old man.
Toting around a computer filled with valuable data, however, is a growing risk: If the computer is lost or stolen, the user loses everything -- from a prized doctoral thesis to bank account numbers to records of passwords.
It's a little like LoJack -- the car security system that tracks down and recovers stolen vehicles -- for your computer.
Nadeem Kashmiri, a data operator, was charged with hacking into the computer system which allegedly led to money being stolen from customer accounts.
The stolen goods are a Sony FX401 laptop computer and a JVC camcorder.
Airlines exclude valuables and computer equipment from liability and reimbursement if luggage is lost or stolen, and travelers should always carry computers, cameras and jewelry with them onboard rather than checking it in luggage.
However, I share a general scepticism that the greater amount of personal data which are centrally held, the greater the chance of them being lost, stolen, hacked into or accessed by lonely or bored computer geeks.
He writes actual letters, physical objects that can be stolen by someone who does not know how to hack a computer, a novel concept in 2013.
Certainly other players have stolen a good deal of the Rio's light, notably the Apple Computer (nasdaq: AAPL - news - people ) iPod series of players that have their own devoted fans.
Hackers create computer viruses just to wreak havoc on unsuspecting people, and those same types of people can post stolen information anywhere.
Scotland Yard said the arrest - under Section 1 of the Computer Misuse Act 1990 - relates to a "suspected conspiracy" involving the gathering of data from stolen mobile phones.
The sophisticated operation used "forged document specialists, " a locksmith and a portable computer to sync a key to the vehicle's unique code, allowing the vehicle to be stolen without damage, authorities said.
It also throws in a "Find my Phone" feature, a remote wipe and a camera option that will let you see your phone's front or rear camera views -- as well as snap pictures remotely and store them directly on your computer -- without activating the display (a very useful feature in case your prized possession gets stolen).
Recently the computer-security company RSA (a division of EMC) was penetrated by an intrusion which appears to have stolen the secret sauce behind the company's SecureID.
应用推荐