Zango sues PC Tools for $35 million

Posted by   Virus Bulletin on   May 18, 2007

'Reformed' adware shippers upset by detection and removal.

Adware and sometime spyware maker Zango has brought a suit against anti-spyware firm PC Tools complaining that the Spyware Doctor product, a pared-down version of which is included in the freely available Google Pack set of utilities provided by Google, overestimates the dangers of the Zango product range and removes installed software without consent from the user.

Zango, formerly 180Solutions and incorporating Hotbar, produces adware-driven 'online media content', which has been the source of much controversy in recent years, with several lawsuits brought against the firm for employing deceptive practices, hiding its software or blocking removal, and gathering private data without consent. After several high-profile cases, including a payout of over $3 million to the FTC in November 2006, Zango has repeatedly stated its intention to reform its software to remove such spyware tactics, a requirement of the settlement made with the FTC.

However, the reputation earned by years of suspect behaviour, including allowing 'affiliates' to earn money from illicit distribution of Zango products to unsuspecting users, continues to dog the firm, and PCTools' recent decision to increase the threat rating applied to the company's software has led to the lawsuit, brought on Tuesday in a court in Seattle, Washington. Zango is demanding $35 million in damages for the harm caused to its profits by Spyware Doctor alerting on and removing their products.

Few details of the case have emerged, but a brief summary of the complaint can be found here and more analysis is here.

Posted on 18 May 2007 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.