Tagged articles
42 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 28, 2026 · Industry Insights

Beijing Engineer Sentenced to 5 Years for Deleting 89 TB of AI Training Data

In September 2024, a Beijing algorithm engineer illegally accessed his company's server cluster, executed a notorious delete command that erased over 89 TB of AI training data and 3D model assets, causing system paralysis and more than 200,000 yuan in losses, and was sentenced to five years and ten months in prison for destroying a computer information system.

aicomputer crimedata deletion
0 likes · 4 min read
Beijing Engineer Sentenced to 5 Years for Deleting 89 TB of AI Training Data
Black & White Path
Black & White Path
Feb 17, 2026 · Information Security

High Salaries Not Enough: 3 Big‑Tech Engineers Caught in fnOS Black‑Market Hacks

Police in Zhejiang dismantled a full‑cycle black‑market operation that stole, cracked and resold rental smartphones, arresting three high‑paid engineers from major internet firms who earned over ten million yuan by exploiting fnOS vulnerabilities, highlighting both technical methods and legal consequences.

IoT securityblack marketdevice hacking
0 likes · 12 min read
High Salaries Not Enough: 3 Big‑Tech Engineers Caught in fnOS Black‑Market Hacks
Java Tech Enthusiast
Java Tech Enthusiast
Sep 26, 2025 · Information Security

How a Fired Engineer Crippled Eaton's Global Systems with Malicious Java Code

A senior Java developer at Eaton Corporation sabotaged the company's global production system with malicious code before his dismissal, causing a massive outage, data loss, and a four‑year prison sentence, highlighting the severe risk of insider threats and the need for robust access controls and monitoring.

access controlcybersecurityinsider threat
0 likes · 7 min read
How a Fired Engineer Crippled Eaton's Global Systems with Malicious Java Code
IT Services Circle
IT Services Circle
Sep 4, 2025 · Information Security

How a 55‑Year‑Old Engineer Sabotaged Eaton’s Global Network – Key InfoSec Lessons

A senior programmer at Eaton, fearing layoff, secretly embedded Java malware that created endless threads and a kill‑switch, causing a worldwide outage and costing tens of thousands of dollars, ultimately leading to a four‑year prison sentence and highlighting the critical risk of insider threats.

access controlcybersecurityinsider threat
0 likes · 7 min read
How a 55‑Year‑Old Engineer Sabotaged Eaton’s Global Network – Key InfoSec Lessons
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Beijing Chaoyang Court Rules Unfair Competition in Navigation Data Scraping, Awards 12.5 Million Yuan Compensation

The Chaoyang District People's Court in Beijing found that a technology company illegally scraped the "congestion delay index" from a navigation map, used it for commercial purposes, and ordered it to stop the infringement and pay a total of 12.5 million yuan in damages, highlighting the legal protection of competitive data rights.

Chinadata-scrapinginformation security
0 likes · 5 min read
Beijing Chaoyang Court Rules Unfair Competition in Navigation Data Scraping, Awards 12.5 Million Yuan Compensation
Java Tech Enthusiast
Java Tech Enthusiast
Jul 7, 2024 · Industry Insights

What the Beijing Court’s Ruling on Navigation Data Reveals About Unfair Competition

A Beijing court ruled that a financial software firm’s illegal scraping and commercial use of a navigation‑derived congestion‑delay index constituted unfair competition, ordering an injunction and a 12.5 million‑yuan damages award, highlighting the legal protection of high‑value traffic data.

data competitionindustry insightlegal case
0 likes · 6 min read
What the Beijing Court’s Ruling on Navigation Data Reveals About Unfair Competition
Efficient Ops
Efficient Ops
Jun 16, 2024 · Information Security

How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison

A Singapore court sentenced former NCS employee Kandula Nagaraju to over two years in prison after he illegally accessed his ex‑employer’s QA system, deleted 180 virtual servers, and caused more than $670,000 in damages, highlighting serious cybersecurity and legal repercussions.

Data losscybercrimeinformation security
0 likes · 6 min read
How a Former NCS Engineer’s Revenge Hack Caused $670K Loss and Prison
21CTO
21CTO
Feb 24, 2024 · Fundamentals

When Open‑Source Licenses Fail: What China’s Supreme Court Ruling Means for Developers

A landmark Supreme People’s Court decision clarified that GPL‑v2 licensing does not automatically shield developers from copyright infringement, detailing a high‑profile case where former employees copied proprietary code, the court rejected the GPL defense, and set new precedent for software‑related IP disputes in China.

ChinaGPLv2legal case
0 likes · 13 min read
When Open‑Source Licenses Fail: What China’s Supreme Court Ruling Means for Developers
Java Architect Essentials
Java Architect Essentials
Jan 3, 2024 · Information Security

Shanghai Police Arrest 14 Suspects in Chip Technology Trade Secret Infringement Case Involving Huawei Hi1152 V100

Shanghai police, with cooperation from Jiangsu authorities, arrested 14 individuals suspected of infringing Huawei's Hi1152 V100 Wi‑Fi chip trade secrets, detailing the seized chips, legal actions, company backgrounds, and the broader implications for semiconductor intellectual‑property security in China.

ChipHuaweiWiFi
0 likes · 10 min read
Shanghai Police Arrest 14 Suspects in Chip Technology Trade Secret Infringement Case Involving Huawei Hi1152 V100
Selected Java Interview Questions
Selected Java Interview Questions
Dec 24, 2022 · R&D Management

The EDA Century Battle: Cadence vs Avant – A Tale of Corporate Espionage and Legal Warfare

This article recounts the dramatic saga of the EDA industry’s century‑long rivalry between Cadence and Avant, detailing the background, aggressive talent poaching, a pivotal bug that exposed code theft, the ensuing legal battle, and the ultimate financial and strategic fallout for both companies.

Corporate EspionageEDASilicon Valley
0 likes · 12 min read
The EDA Century Battle: Cadence vs Avant – A Tale of Corporate Espionage and Legal Warfare
Java Architect Essentials
Java Architect Essentials
Oct 23, 2022 · Information Security

Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring

A Dutch employee was awarded €75,000 (≈ ¥520,000) after a Dutch court ruled that his dismissal for refusing to keep his webcam on during remote work violated his privacy rights, highlighting legal limits on employer surveillance and prompting broader debate on remote‑work monitoring practices.

Data Protectionemployee monitoringlegal case
0 likes · 7 min read
Dutch Employee Wins €75,000 Compensation After Being Fired for Refusing Webcam Monitoring
21CTO
21CTO
Jun 20, 2022 · Information Security

How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison

A U.S. hacker known as "icloudripper4you" infiltrated thousands of iCloud accounts, stole massive amounts of nude photos and videos, and was sentenced to nine years in prison, highlighting the severe impact of cyber‑crime and the FBI's commitment to prosecuting such offenses.

cybercrimedata breachiCloud hack
0 likes · 4 min read
How an iCloud Hacker Stole Thousands of Nude Photos and Got 9 Years in Prison
21CTO
21CTO
May 18, 2022 · Information Security

Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence

A former Lianjia database administrator was sentenced to seven years for deleting critical financial data, revealing how insider misuse of root privileges, inadequate security response, and ignored vulnerability reports can cripple a multi‑billion‑dollar enterprise, while similar incidents underscore the broader risks of insider threats.

Database Securitydata deletioninformation security
0 likes · 8 min read
Why a Database Admin’s Data Deletion Led to a 7‑Year Prison Sentence
Architecture Digest
Architecture Digest
Feb 19, 2022 · Information Security

Case Study: Illegal Web Crawling and Criminal Conviction in China

This article recounts how a corporate web‑crawling tool designed to automate housing‑loan data collection overloaded a municipal residence‑permit system, triggered a large‑scale denial‑of‑service attack, and led to the CTO and programmer being prosecuted for damaging a computer information system.

Web Crawlingcomputer crimecyberlaw
0 likes · 8 min read
Case Study: Illegal Web Crawling and Criminal Conviction in China
Java High-Performance Architecture
Java High-Performance Architecture
Feb 18, 2022 · Information Security

When Web Crawlers Cross the Line: A Legal Case Study on Unauthorized Data Scraping

This article recounts how a Chinese fintech company's automated web‑crawler, built to query a municipal residence‑permit system, overloaded the server, triggered police action, led to criminal charges for the CTO and programmer, and offers lessons on the legal risks of large‑scale data scraping.

Web Crawlingcloud computingcomputer crime
0 likes · 9 min read
When Web Crawlers Cross the Line: A Legal Case Study on Unauthorized Data Scraping
Java Backend Technology
Java Backend Technology
Feb 14, 2022 · Information Security

When a Developer Deletes Their Own Code: Legal Consequences and Lessons for Information Security

A 29‑year‑old programmer who left a Beijing IT firm on the day of a major sales event deleted the coupon, budgeting, and subsidy code he wrote for the JD.com delivery platform, was later sentenced to ten months in prison and fined, sparking widespread discussion about code‑ownership, permission management, and the criminal liability of destroying computer information systems.

code deletioncomputer crimelegal case
0 likes · 9 min read
When a Developer Deletes Their Own Code: Legal Consequences and Lessons for Information Security
21CTO
21CTO
Feb 5, 2022 · Information Security

When Web Crawlers Turn Criminal: A Real‑World Data Scraping Case Study

This article recounts how a fintech company's automated web‑scraping tool overloaded a municipal residence‑permit system, leading to massive data leakage, legal prosecution of its CTO and programmer, and highlights the severe legal risks of unchecked crawling practices.

Web Crawlingcomputer crimedata-scraping
0 likes · 9 min read
When Web Crawlers Turn Criminal: A Real‑World Data Scraping Case Study
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 18, 2021 · Information Security

Case Study: “Da Niu Assistant” Location‑Spoofing App, Its Business Model, and Legal Consequences

The article recounts how a developer created the “Da Niu Assistant” app to spoof DingTalk check‑ins, generated several hundred thousand yuan in revenue, was analyzed by Alibaba security engineers, and ultimately led to a five‑year‑six‑month prison sentence, highlighting the risks of security‑related startups.

DingTalkLocation SpoofingSoftware Piracy
0 likes · 5 min read
Case Study: “Da Niu Assistant” Location‑Spoofing App, Its Business Model, and Legal Consequences
21CTO
21CTO
Oct 15, 2021 · Information Security

How a WeChat Payment System Was Hijacked: A Code‑Injection Theft Case Study

This article details how a former technical director inserted malicious code into a company's WeChat payment platform, diverting millions of yuan to his own account, the subsequent investigation, witness testimonies, and the court's judgment sentencing him for large‑scale theft.

Code InjectionWeChatinformation security
0 likes · 7 min read
How a WeChat Payment System Was Hijacked: A Code‑Injection Theft Case Study
Top Architect
Top Architect
Sep 20, 2021 · Information Security

Case Study: Violation of Computer Information System Laws by Yang Mou – Court Judgment and Legal Analysis

The article details how Yang Mou, a former ticketing system programmer, remotely accessed and sabotaged a bus company's ticketing platform in October 2020, leading to a court conviction for destroying computer information systems under Chinese criminal law, with a nine‑month prison sentence and references to relevant statutes.

Chinese lawcomputer crimeinformation security
0 likes · 6 min read
Case Study: Violation of Computer Information System Laws by Yang Mou – Court Judgment and Legal Analysis
ITPUB
ITPUB
Jun 17, 2021 · Information Security

How Illegal Web Crawlers Stole Over 1 Billion Chinese Users’ Data and Got Sent to Prison

A recent Chinese court case reveals that a university graduate used a custom web‑crawler to harvest more than 1.18 billion Taobao user records, which were then sold to a partner who ran fraudulent WeChat groups, leading to both perpetrators’ conviction for violating personal information protection laws.

ChinaWeb Crawlerdata-scraping
0 likes · 10 min read
How Illegal Web Crawlers Stole Over 1 Billion Chinese Users’ Data and Got Sent to Prison
ITPUB
ITPUB
May 29, 2021 · Information Security

When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case

The article recounts a high‑profile Chinese case where a former developer, after a salary dispute, exploited server vulnerabilities to delete critical user data and application files, leading to massive user impact, a court trial, and an eleven‑month prison sentence under computer‑information‑system sabotage laws.

computer crimedata breachdata deletion
0 likes · 6 min read
When a Resigned Developer Deletes Company Data: A Real‑World InfoSec Crime Case
Programmer DD
Programmer DD
Jan 8, 2021 · Information Security

When Deleting Data Becomes a Crime: DBA Sentenced to 7 Years

A former database administrator at Lianjia was convicted of deliberately deleting 9 TB of financial data, leading to a seven‑year prison sentence after forensic evidence linked his root‑access actions to the breach, highlighting the severe legal consequences of insider data sabotage.

computer crimedata deletiondatabase admin
0 likes · 7 min read
When Deleting Data Becomes a Crime: DBA Sentenced to 7 Years
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Efficient Ops
Efficient Ops
Nov 23, 2020 · Information Security

When Revenge Becomes a Crime: A Programmer’s OBS Sabotage Case

A Chinese programmer, angry over an unpaid bonus, altered Huawei Cloud OBS storage code, crippling a consumer platform for hours, leading to a conviction for destroying a computer information system and sparking a broader discussion on developer respect and security safeguards.

cloud storagecode sabotagedeveloper misconduct
0 likes · 7 min read
When Revenge Becomes a Crime: A Programmer’s OBS Sabotage Case
21CTO
21CTO
Sep 21, 2020 · Information Security

Why a Programmer Deleted 300M Users' Data – Lessons on Cloud Security

The article recounts the 2020 “delete‑and‑run” incident where a disgruntled employee erased all data from the SaaS platform Weimeng, causing over 300 million users to lose access, a market‑value plunge of over HK$1 billion, and a six‑year prison sentence, while exposing critical flaws in data‑security practices and the risks of insufficient cloud adoption.

SaaScloud computingdata security
0 likes · 8 min read
Why a Programmer Deleted 300M Users' Data – Lessons on Cloud Security
Open Source Linux
Open Source Linux
Mar 18, 2020 · Information Security

How a Baidu Ops Engineer Was Sentenced for Mining Crypto on 155 Servers

A former Baidu operations engineer illegally mined Bitcoin and Monero using 155 of the company's search servers, earning about 100,000 CNY before being caught, fined, and sentenced to three years in prison, highlighting severe risks of abusing corporate computing resources.

Baiducryptocurrencyinformation security
0 likes · 9 min read
How a Baidu Ops Engineer Was Sentenced for Mining Crypto on 155 Servers
21CTO
21CTO
Mar 17, 2020 · Information Security

When Ops Turn Rogue: Inside Baidu’s 2018 Crypto‑Mining Scandal

A Baidu operations engineer illegally mined cryptocurrency on more than 150 company servers in 2018, netting over 100,000 RMB, was caught, sentenced to three years in prison and a fine, and the case now serves as a stark reminder of insider threats and the need for strict access controls in IT operations.

Operations Riskcrypto mininginformation security
0 likes · 7 min read
When Ops Turn Rogue: Inside Baidu’s 2018 Crypto‑Mining Scandal
ITPUB
ITPUB
Feb 14, 2020 · Information Security

How a Former Tech Director Sabotaged a SaaS Database: A Real‑World InfoSec Case Study

In June 2018, a disgruntled former technical director of a Zhejiang company used retained Alibaba Cloud credentials to delete database indexes and tables, crippling a SaaS platform for over five hours, causing millions in losses, and was later convicted of destroying computer information systems with a suspended sentence.

Alibaba Cloudcloud securitycomputer crime
0 likes · 8 min read
How a Former Tech Director Sabotaged a SaaS Database: A Real‑World InfoSec Case Study
21CTO
21CTO
Apr 27, 2019 · Information Security

What Happens When a Drone Company’s Source Code Leaks? Legal and Security Lessons

A former DJI software engineer uploaded proprietary agricultural drone code to a public GitHub repository, leading to a criminal conviction for commercial‑secret theft, a six‑month prison term, a fine, and a detailed look at the legal penalties and security implications of such leaks.

DJIGitHubcommercial secret
0 likes · 5 min read
What Happens When a Drone Company’s Source Code Leaks? Legal and Security Lessons
21CTO
21CTO
Mar 21, 2019 · Information Security

Why Tencent Demanded Duoshan Remove Your WeChat Avatar: A Data Privacy Showdown

The article examines Tencent's legal push to force ByteDance's Duoshan app to stop using users' WeChat/QQ avatars and nicknames, detailing the data‑sharing dispute, the PR tactics that spiked Duoshan's DAU, and the provisional court injunction that halted the practice.

ByteDanceTencentdata privacy
0 likes · 6 min read
Why Tencent Demanded Duoshan Remove Your WeChat Avatar: A Data Privacy Showdown
DevOps
DevOps
Mar 25, 2016 · Operations

Case Study: The 2005 Mizuho Securities Fat‑Finger Trading Error and Its Legal Aftermath

The 2005 Mizuho Securities “fat‑finger” incident, caused by a trader’s input error and a hidden bug in the Tokyo Stock Exchange’s Fujitsu‑built trading system, led to a ¥400 billion loss, sparking extensive litigation that highlighted responsibilities for software bugs, system testing, and operational risk management.

Software Testingfinancial systemslegal case
0 likes · 12 min read
Case Study: The 2005 Mizuho Securities Fat‑Finger Trading Error and Its Legal Aftermath