A high-roller and hacker accomplices made off with about $33 million after they gamed a casino in Australia by hacking its surveillance cameras and gaining an advantage in several rounds of high-stakes card games.
The Ocean’s Eleven-style heist played out over eight hands of cards before the gambler was caught, though not before the money was gone, according to the Herald Sun.
The gambler, described only as a foreigner, was a known “whale” — a high-roller who regularly bet and lost large amounts of money.
He was staying with his family in an opulent villa at the Crown Towers in Melbourne, Australia a few weeks ago, when the scam occurred.
According to authorities, accomplices gained remote access to the casino’s state-of-the-art, high-resolution cameras to spy on card hands being played by the house and other guests in the casino’s VIP high-roller’s room, and fed the gambler signals based on the cards his opponents held.
The gambler was still staying in the villa when the casino discovered the fraud and sent security to his abode to boot him from the premises during the night. He’s banned from ever returning.
U.S. gambling expert Barron Stringfellow told ABC Melbourne that accessing a casino’s internal video monitoring system is “not as hard as you would think.”
With a generation that has become very savvy with how the Web works, one of the obsessions we have is with how people interact with our updates and posts.
It’s understandable really, humans are designed to seek acknowledgement from others and as sad as it sounds, people liking and sharing our content validates our ideas and thoughts.
It’s completely narcissistic but it’s something that’s ingrained into our psyche.
Yet the one thing we know from how we interact with other people’s content is that we’re quite passive. For every post we interact with, there are perhaps 20 or 30 posts that we gloss over and there are
Read more: http://www.simplyzesty.com/social-media/will-we-ever-want-to-know-who-viewed-our-social-profiles/
One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.
Two: Hector Monsegur, one of the leaders of the LulzSac hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up.
And three: Paula Broadwell,who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels — and hers was the common name.
The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we’re being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period.
Katie Price has reportedly called the police about ex-husband Alex Reid.
The model is alleging that the ‘Celebrity Big Brother’ winner stole her mobile phone when they divorced last year.
The ongoing feud is said to have resulted in Price reporting the incident, citing breach of privacy.
Her claims are now apparently being investigated by detectives under Operation Tuleta, the Met Police probe into allegations of computer hacking.