Judge rules against accused spyware distributor
FTC to seize $4595.36 in ill-gotten gains
IDG News Service - A U.S. judge has granted a request by the Federal Trade Commission for a judgment against a company accused of distributing spyware and adware onto people's computers.
A judge in the U.S. District Court for the District of Nevada has ordered Timothy P. Taylor to give up $4,595.36, the money he made from a scheme that tricked consumers into downloading spyware by offering free screensavers and videos on his TeamTaylorMade.com Web site, the FTC said Monday.
Software on Taylor's site included spyware called Media Motor from ERG Ventures that changed consumers' home pages, tracked their Internet activity, altered browser settings, degraded computer performance and disabled antispyware and antivirus software, the FTC said.
ERG Ventures, based in Nevada, agreed to pay $330,000 as part of a settlement with the FTC last September. The default judgment against Taylor, who has lived in Tennessee, ends the November 2006 lawsuit the FTC filed against ERG Ventures, its owners and Taylor.
The FTC had accused ERG Ventures and Taylor of distributing spyware that infected 15 million computers. Many of the malware programs were "extremely difficult or impossible" for consumers to remove from their computers, the FTC said.
The judgment entered against Taylor bars him from distributing software that interferes with consumers' computers, including software that tracks consumers' Internet activity or collects other personal information; generates disruptive pop-up advertising; tampers with or disables other installed programs; or installs other advertising software onto consumers' computers.
The judgment also requires Taylor to disclose the name and function of all software he installs on consumers' computers in the future, and to provide consumers with the option to cancel the installation after viewing the disclosure.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts