This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
I was expecting a slow week in the mobile world following Macworld and CES, but we can always count on corporate espionage to spice things up. It looks like an employee, or someone with access to company keycards, made off with some prototype cell phones from Sony Ericsson.
I was expecting a slow week in the mobile world following Macworld and CES, but we can always count on corporate espionage to spice things up. It looks like an employee, or someone with access to company keycards, made off with some prototype cell phones from Sony Ericsson.According to a translated report, a 35-year-old man with a "working relationship" with the phone manufacturer was busted by police with several prototype phones and company laptops at his house. Overall, police estimated the man had 100 mobile phones (not all prototype) that were worth about $90,000.
Now the question remains: What the heck was he going to do with these devices? I know getting a look at what the competition is working on can be worth serious bucks, but I hope (and believe) that the Samsungs and Nokias of the world are above working with criminals of this manner. Perhaps he could have a buyer with a smaller company that doesn't have qualms producing rip-off devices -- I'm looking at you iPhone Nano makers.
Maybe this guy just had a gripping addiction to tech. Sure, we all get a little rush getting the latest and greatest gadget, but this guy obviously took it too far. Sony Ericsson is facing a tough year as the economy falters and users resist replacing their handsets, but at least it knows one guy is still dying to get its phones.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!