Jump to content
RubbeR DuckY

IOBit Steals Malwarebytes' Intellectual Property

Recommended Posts

IOBit's forum is probably filled with posts similar to ours, supporting their cause. At least... are they still deleting posts about this that support the MBAM side?

From what I just read on their forum, looks like more MBAM support than Iobit support ;)

Share this post


Link to post

I really don't get their exact word Inocent.

Come on, perhaps in China, stealing still is an act of honor,

but why would a company still shout out about be innocent while their standing their naked with other people's property in

their hands, and making big money from it.

Does the 360 mean, collected from every other around us ?

Share this post


Link to post
IOBit's forum is probably filled with posts similar to ours, supporting their cause. At least... are they still deleting posts about this that support the MBAM side?

I think they have hit bottom as far as "damage control" goes. There are more posts supporting MBAM and none of their people have anything of substance to say/offer. Can't blame them for moving slow, in the face of such overwhelming evidence. As Swandog pointed out earlier, "stealing" the MBAM database is no easy task, so the "some unexperienced staff may have done this" excuse doesn't cut it ; you don't just open a file or grab the database from this site, no Sir. Someone other than sample collectors decided to do this and now they must face the music.

Cheers,

Share this post


Link to post

Whatever it may be, and how clear the evidence is, thinking souls do know

which side is the positive one and which is the negative one.

Let's not make it a flamefest, it actually ain't worth it, I just hope

this will not do harm on MalwareBytes proper and clean reputation.

In the end, incident after incident, the average Joe gets to know which

company to trust and which to stay away. ;)

Share this post


Link to post

WOT will not let me access the blog and iobit on WOT is now amber....

Share this post


Link to post

Added my thoughts in the WOT Scorecard.

On Tue 03 Nov 2009 03:51:52 PM UTC

Ethical issues on iobit.com |

Share this post


Link to post

Looks like they edited their first declaration to add screenshots and tests.

I'm not convinced by what they are telling about signatures.

http://blog.iobit.com/

Share this post


Link to post

Sorry, I did it too fast.

Share this post


Link to post
Looks like they edited their first declaration to add screenshots and tests.

I'm not convinced by what they are telling about signatures.

http://blog.iobit.com/

Tried your link. I got a full page WOT Warning..

Share this post


Link to post

Shame on them, they will eventually have to answer to this.

Hey just a thought, why don't we change our database to reflect there software as malware. (I know that may be stepping down to their level but at least people will know).

Share this post


Link to post

They have been red all along with Site Advisor (at least since this started) for having downloads that are considered dangerous. Not sure how long it has been that way because I had never been to their website before yesterday.

I added a bad review at Download.com also for bad ethics.

Share this post


Link to post

Here's an interesting reply from someone on the Iobit forum:

I do not mean to criticize or oanything, I just wish to make my stance on this known:

I am an independent tech who actively uses neither Malwarebytes nor IObit's Security 360. I do, however, keep tabs on news in the computer security sector.

After hearing this, I decided to do some independent research separate from Malwarebytes and IObit. I used two separate computers, one with Malwarebytes, and one with IObit Security 360. Each were provided with cloned drives to scan completely, with exactly the same spyware on each drive, gathered from various sources.

After scanning with Malwarebytes, and IObit Security 360, I realized a large number of the samples that were caught by Malwarebytes matched exactly the same descriptions as IObit Security 360 had, right down to the names. Other samples were different from each other, yes, but a large sample (maybe 60%) of the spyware that was on the drives had exactly the same descriptions.

Based on my independent research, I find it statistically improbable that IObit Security 360 and Malwarebytes would have exactly the same descriptions and names for detected spyware.

Feel free to ban me for posting the results of my independent research if you wish. It'll only reinforce my findings.

NOTE: I do not wish to cause an argument or anything, just wanted to get my own research results out there.

Share this post


Link to post

Right behind you MBAM, this is a despicable thing to do ;)

I suppose the only positive that can be gleaned from this, as court action is probably going to be very difficult and costly, is that you are going to get a lot of publicity with regards to your product and IObit and going to get the opposite.

This will hopefully expand your customer base and get the word out to a lot more, allthough most who follow security know about you anyway.

The fact they fell into your trap hook, line and sinker shows that they obviously weren`t making much of an effort to hide what they where doing, it`s pretty laughable if it wasn`t so serious!

Share this post


Link to post

Considering their Advanced System Care - (example log here) app, and the Security 360 app both use/incorporate HijackThis and rebranded it, I am not surprised by all this. Their excuse does not hold water. The evidence is damning.

They've been using shady tactics, and if you think they'll own up, you're all dreaming. They won't. Case in point, they removed the detections, or so they say, of the items you guys pointed out. If that doesn't scream "I'm gonna keep hiding and doing what I do no matter how much you throw at me", I don't know what does.

Curiously reminded of Spybot vs BulletProofSoft. Some of the real oldies around here probably will remember as well. Same thing happened then down to the fake trap defs. The thing is, even if you guys get them delisted and their reputation is ruined, they'll probably open up under another name and start over doing the same thing (except now they know what traps to avoid). All in all, a sad thing. But more proof that you guys are the ones to beat in the anti-malware software coding war. ;)

Share this post


Link to post
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

×

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.