Feeds

Sears admits to joining spyware biz

On page 10 of 54-page diatribe

The Power of One eBook: Top reasons to choose HP BladeSystem

A Harvard researcher has accused one of America's biggest retailers of sneaking privacy-stealing spyware from ComScore onto customers' machines.

Sears Holding Corporation, owner of Sears, Roebuck and Co. and Kmart, makes the pitch in an email sent to people shortly after they provide their address at Sears.com. Clicking the "Join" button invokes a dialog that requests the person's name, address and household size before installing ComScore spyware that monitors every site visited on the computer.

Sears' leap into the spyware business was first documented by Computer Associates researcher Benjamin Googins, who determined the notice to end users was inadequate. Yesterday, Harvard researcher Ben Edelman weighed in and came to largely the same conclusion.

It's not that Sears fails to notify users it intends to spy on them. Indeed, the email sent to users states that the application "monitors all of the internet behavior that occurs on the computer on which you install the application, including...filling a shopping basket, completing an application form, or checking your...personal financial or health information."

The rub is that this unusually frank warning comes on page 10 of a 54-page privacy statement that is 2,971 words long. Edelman, who is a frequent critic of spyware companies, said the Sears document fails to meet standards established by the Federal Trade Commission when it settled with Direct Revenue and Zango over the lack of disclosure about the extent of their snoopware.

"The Sears SHC installation of ComScore falls far short of these rules," Edelman writes. "The limited SHC disclosure provided by email lacks the required specificity as to the nature, purpose, and effects of the ComScore software."

He also criticizes the Sears installation because it identifies the software as "VoiceFive" and later claims it's coming from a company called TMRG, Inc." even though a packet sniffer confirms the software belongs to ComScore.

"If SHC used the company name 'ComScore' or the product name 'RelevantKnowledge,' users could run a search at any search engine," he argues. "These confusing name-changes fit the trend among spyware vendors."

Responding to the initial CA blog post, a Sears vice president vigorously defends the practice, saying the retailer "goes to great lengths to describe the tracking aspect" of the software. He also claims a progress bar during the installation of the software gives users an easy way to back out if they change their minds, but Edelman said no such bar was displayed during his tests. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.