Feeds

BSA flashes gums at 'online software scams'

Keeps teeth in jar by bed

The Power of One eBook: Top reasons to choose HP BladeSystem

The Business Software Alliance (BSA) claimed late last week to have issued nearly 50,000 takedown notices about BitTorrent files in the first half of this year.

The group, in its latest effort to crack down on what it describes as “online software scams”, claimed (pdf) that BSA members lost an estimated $525m in sales as a result of BitTorrent site users downloading their software.

It reckoned more than half a million (633,000) people favoured offerings of illegal software over legit via various websites and P2P networks.

The BSA said it hunted down 13,800 online auctions punting more than 50,500 individual software products with a total retail value of over $13.3m in 2007. It asked eBay et al to shut down the dodgy auctions, nearly two thirds of which were US-based.

In the first half of 2008 the trade group asked auction site providers to shutter 18,314 auctions flogging 45,000 products, worth a total of $22m, according to the report.

It also sent 471,694 non-BitTorrent takedown notices to ISPs in the first half of 2007. By the same period this year 782,832 takedown notices had been issued.

The BSA thinks that such a move against ISPs is helping it win the war on software piracy. However, the organisation ultimately has to rely on websites to play nice.

But the report fails to provide a breakdown of how many of those takedown notices led to successful prosecutions against individuals it accuses of selling dodgy software online.

Meanwhile, The Pirate Bay, which claims to be the world's largest BitTorrent tracker website, just last month claimed to have clocked up three million registered users. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.