Hounded by spyware charges, Direct Revenue shuts down
Will company principals 'take the money and run?'
IDG News Service - Notorious adware maker DirectRevenue LLC has closed shop.
The company, which was recently doing business as Best Offers, gave no reason for its sudden closure, which was announced on its Web site. "Best Offers and Direct Revenue have ceased operations. To service legacy consumers we are maintaining this page of uninstall instructions, an uninstall software tool, and an e-mail based support service."
E-mail sent to the Gmail address listed on the company's Web site was returned as undeliverable.
DirectRevenue was founded in 2002, but it managed to make a lot of people unhappy during the course of its short life. Its software, which was often installed without user consent, would bombard victims with unwanted pop-up ads and was difficult to remove.
The company was fined $1.5 million by the Federal Trade Commission in February and it was also sued by the New York attorney general. Critics called the FTC fine a slap on the wrist, however, as the company is thought to have made more than $20 million from its questionable business practices.
"This is a business that never should have existed," said Ben Edelman, a critic of the company who is an assistant professor at the Harvard Business School. "They never did anything useful for users and merely preyed on victims too trusting or hurried to protect themselves from DirectRevenue's attacks."
Company management had recently positioned Best Offers as a legitimate software company, and Edelman said that he did not know if they were planning on continuing in business under a different name.
"The people behind this company walked away with tens of millions of dollars," he said. "They've got the money. If they're smart they'll take it and run."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts