Judge rules against accused spyware distributor
FTC to seize $4595.36 in ill-gotten gains
IDG News Service - A U.S. judge has granted a request by the Federal Trade Commission for a judgment against a company accused of distributing spyware and adware onto people's computers.
A judge in the U.S. District Court for the District of Nevada has ordered Timothy P. Taylor to give up $4,595.36, the money he made from a scheme that tricked consumers into downloading spyware by offering free screensavers and videos on his TeamTaylorMade.com Web site, the FTC said Monday.
Software on Taylor's site included spyware called Media Motor from ERG Ventures that changed consumers' home pages, tracked their Internet activity, altered browser settings, degraded computer performance and disabled antispyware and antivirus software, the FTC said.
ERG Ventures, based in Nevada, agreed to pay $330,000 as part of a settlement with the FTC last September. The default judgment against Taylor, who has lived in Tennessee, ends the November 2006 lawsuit the FTC filed against ERG Ventures, its owners and Taylor.
The FTC had accused ERG Ventures and Taylor of distributing spyware that infected 15 million computers. Many of the malware programs were "extremely difficult or impossible" for consumers to remove from their computers, the FTC said.
The judgment entered against Taylor bars him from distributing software that interferes with consumers' computers, including software that tracks consumers' Internet activity or collects other personal information; generates disruptive pop-up advertising; tampers with or disables other installed programs; or installs other advertising software onto consumers' computers.
The judgment also requires Taylor to disclose the name and function of all software he installs on consumers' computers in the future, and to provide consumers with the option to cancel the installation after viewing the disclosure.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts