Feeds

Facebook sues 'Spamford' Wallace over spam scam

Bring in the usual suspects

Intelligent flash storage arrays

Facebook has launched a lawsuit against infamous junk mail merchant Sanford "Spamford" Wallace.

Wallace, along with co-defendants Las Vegas night club manager Adam Arzoomanian and Scott Shaw, face charges of violating the CAN-SPAM Act of 2003. Mediapost adds the the suit covers allegations that Wallace and his business associates spammed Facebook members with wall posts that posed as messages from their friends. The gang allegedly hacked into accounts using phishing techniques before sending the offending messages.

Facebook's legal action comes three months after the social networking site was awarded $873m in a suit against Adam Guerbuez and his firm Atlantis Blue Capital for violations of US federal anti-spam laws. Guerbuez did not contest the action, which would otherwise have cleared up the undecided legal point on whether or not the CAN-SPAM Act applies to messages sent through social networking websites.

Wallace is no stranger to accusation of malicious marketing activities on social networking websites. Wallace and business partner Walter Rines were ordered to pay $230m to MySpace last May after a court held them responsible for using malware and social engineering to promote porn and gambling sites. That action was also uncontested by the defendants. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.