Language Selection

English French German Italian Portuguese Spanish

Software pirates tap into technology

Filed under
Misc

Criminal gangs are increasing taking advantage of the internet to peddle counterfeit software, say experts.

According to an investigator for the trade body, the Business Software Alliance (BSA), criminals hawking counterfeit or cracked software are tapping into the e-commerce potential of the net.

The internet helps the software pirates reach a much bigger pool of customers; it boosts profits because the code can just be downloaded instead of burned on to a CD; it is also cheap and easy to set up so-called warez sites.

Moreover, the chances of being caught are pretty low. It all adds up to a serious problem for those tackling the selling and pirating of software online.

It is an issue acknowledged by the BSA investigator, known only as Mr X. He has to keep his identity secret so he can do his job effectively and avoid the real threats of harm he regularly receives.

"It's getting harder," he says. "Organised crime has definitely picked up on this trend."

Faking it

There is no doubt that many of those peddling pirated programs are from organised crime gangs, said Mr X.

Recent raids on pirates have turned up bundles of cash, fake driving licences and passports as well as counterfeit software.

And it is not just the experienced criminals that are using web technology to distribute the pirated warez.

Some pirates are using peer-to-peer software such as BitTorrent to share the load of downloading what can be very big programs.

They use sophisticated techniques such as Distributed Hash Tables to make it more difficult to track down where the files are held.

Others have turned to older systems such as Usenet and label files using the NZB format to make sure that downloaders pick up all the different parts of the program they are after.

Software and entertainment products were the second most counterfeited category of goods according to a report released in late July by Canada's Gieschen Consultancy.

For the first time, the names of Microsoft and Adobe joined those of Prada, Adidas and Nike in the names of the top 10 most counterfeited brands.

Full Story.

More in Tux Machines

More AMD Radeon R9 Fury Linux Benchmarks

Continuing on from yesterday's first Linux review of the AMD Radeon R9 Fury, here are some more Catalyst Linux benchmarks from this $550 graphics card. Since yesterday's review of the R9 Fury on Ubuntu Linux I have run some more tests covering a few other test profiles as well as delivering some more 1920 x 1080 and 2560 x 1440 (rather than 4K) benchmarks for those wishing to run their own side-by-side comparisons against this air-cooled Fiji graphics card with 4GB of High Bandwidth Memory. Read more

Lubuntu 15.10 Alpha 2 Is Ready for Download, Still Using the LXDE Desktop Environment

The development team behind Lubuntu, an open-source and freely distributed flavor of the popular Ubuntu Linux operating system, announced a few minutes ago the release of the second Alpha build for the upcoming Lubuntu 15.10 (Wily Werewolf) distribution. Read more

Ubuntu Kylin 15.10 Alpha 2 Is Out for Testing with Linux Kernel 4.1, More

The development team behind the Ubuntu Kylin computer operating system have announced earlier today the immediate availability for download and testing of the second Alpha build of the upcoming Ubuntu Kylin 15.10 (Wily Werewolf) distro. Read more

Linux-powered smart sniper rifle can be hacked

Two years ago, TrackingPoint burst on to the scene with a Linux-powered smart sniper rifle that took the guesswork out of killshots. Now, however, a pair of hackers have figured out how to make it miss every single time. Read more