Feeds

Web entrepreneur accused of massive data heist

9,000 plus consumer reports lifted, suit says

Application security programs and practises

Consumer rating service Angie's List has accused a web entrepreneur of plundering thousands of its records so he could start a rival company that offers a similar service.

In a lawsuit filed in Indiana state court, attorneys for Angie's List claim Christopher "Kit" Cody became a paying member of the site and then used scraping software to mine reports it provided on plumbers, dentists and roofers. Cody allegedly used the records for a competing site that he called Trustys.com.

An attorney for Cody disputed the allegations.

"We consider it industrial espionage," a spokeswoman for Angie's List told IndyStar.com. "He came in to use technology to basically cut and paste reports."

Angie's List boasts more than 750,000 consumers who use the site to screen companies offering services in more than 400 categories. The site, which is something of a Yelp focusing on consumer services, has been expanding rapidly in the US. Members submit reports, which are then relied upon by other members.

The suit claims Cody accessed 9,278 service-provider files from the site using a bot during multiple sessions. During a single two-hour period in early December, he harvested more than 2,450 profiles, IndyStar.com reported.

"We dispute the allegations, and we intend to defend against them vigorously," an attorney for Cody said.

A hearing on the matter is scheduled for next month. ®

Mobile application security vulnerability report

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.