Warning: file_put_contents(/opt/frankenphp/design.onmedianet.com/storage/proxy/cache/9a9f9e06f30dd2ccd7c5fdf8463e404b.html): Failed to open stream: No space left on device in /opt/frankenphp/design.onmedianet.com/app/src/Arsae/CacheManager.php on line 36

Warning: http_response_code(): Cannot set response code - headers already sent (output started at /opt/frankenphp/design.onmedianet.com/app/src/Arsae/CacheManager.php:36) in /opt/frankenphp/design.onmedianet.com/app/src/Models/Response.php on line 17

Warning: Cannot modify header information - headers already sent by (output started at /opt/frankenphp/design.onmedianet.com/app/src/Arsae/CacheManager.php:36) in /opt/frankenphp/design.onmedianet.com/app/src/Models/Response.php on line 20
Zango goes titsup • The Register
The Wayback Machine - https://web.archive.org/web/20121226014330/http://www.theregister.co.uk:80/2009/04/21/zango/

The Register® — Biting the hand that feeds IT

Feeds

Zango goes titsup

  • alert
  • print

End of desktop adware market

Free whitepaper – Media and Entertainment Goes Digital

Updated Controversial adware firm Zango has Zangone.

The adware maker was forced to pull down the shutters on its business after it was left unable to service its debts. Initially we, along with othe news outlets, incorrectly reported that video search engine firm Blinkx had acquired Zango. In fact Blinkx has only bought a proportion of its assets from administrators.

"The bank foreclosed on Zango and Blinkx purchased some technical assets from the bank, including some IP and hardware, which constituted about 10 per cent of Zango's total assets," a Blinkx spokeswoman explained.

Zango's closure effectively sounds the death knell of a controversial business model.

Zango began life as 180 Solutions, raising $40m from Spectrum Equity Investors in 2004 and growing to employ more than 230 workers at its peak. Accusations of deceptive installation practices and problems in removing its software once installed led to a lawsuit by US consumer watchdog the Federal Trade Commission.

Zango settled the lawsuit in November 2006, agreeing to pay a fine of $3m without formally admitting guilt. The firm said that its problems were due to rogue affiliates, who it was in the process of culling even before the FTC lawsuit.

The controversy didn't die there, with Zango repeatedly forced to defend itself against accusations that it installed its ad-serving software on PCs without the consent of users.

Security researchers Ben Edelman, an assistant professor at the Harvard Business School, and Chris Boyd, of Facetime Security, continued to document evidence of malpractice. Zango consistently denied any wrongdoing.

Security firms routinely labeled Zango's software as adware, or at least potentially unwanted. Zango's separate attempts to sue Kaspersky Lab and PC Tools over such listings both failed in 2007.

Last year the firm was forced to lay off 118 of its then 200-strong workforce in two tranches, as it focused on a new product called Platrium. This involved receiving ads in exchange for playing online games. That venture looks to be history, along with support and development for Zango's existing products, the Hotbar toolbar and Seekmo, an adware program users need to install to play premium content.

The end-game for Zango marks the end of the controversial adware business model. Other well known names in the field - including Claria (Gator), WhenU and DirectRevenue - ceased operations some time ago, leaving Zango as the last man standing.

A blog posting by Zango co-founder and former chief technology officer Ken Smith laments that Zango finished its life with a "fire sale". His posting provides an insider's view on a failed business endeavour and is well worth a read. ®

Free whitepaper – Shutterfly and Cleversafe Partner Case Study

Spotlight

anonymous logo
Hint: Sometimes gamer tags give the game away
We advertise to you next to your own content ... bitch
Teenager subtitles: App makes selfies safe BLAH BLAH BLAH
Body which issues CISSP tin stars set for shakeup?
Analysis How DID the super-weapon flee Iran's nuke plant?
image via SXC
Write Once, Exploit Everywhere
Analysis First hacktivist-style assault to use malware?