Language Selection

English French German Italian Portuguese Spanish

Software patent case defendant seeks support of FOSS communit

Filed under
Legal

Barracuda Networks is actively seeking the support of the free and open source software (FOSS) community in its battle against a patent suit brought against it by Trend Micro. The suit revolves around Barracuda's distribution of Clam Antivirus (ClamAV), the well-known FOSS security software, with its firewall and Web filter hardware appliances.

The case is the second piece of software patent litigation to directly involve FOSS. The first was a case brought against Red Hat and Novell by IP Innovation for the inclusion of virtual workspaces in their Linux distributions.

Although the ClamAV project is not directly involved, the issues in the Barracuda case have already enlisted the support of such figures in the community as Eben Moglen of the Software Freedom Law Center (SFLC) and Richard Stallman, founder of the Free Software Foundation (see sidebar). Trend Micro, though, insists that the case is a narrowly focused one, and that the concerns of the FOSS community are premature and unfounded

More Here and Here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News