Ebuyer caught pinching content from rival site

Naughty, very naughty


Online retailer Ebuyer has been caught copying content from a rival website.

We were sent several pages which contained identical words and images as the same product pages on Broadbandbuyer. Even worse this page (last para) on Ebuyer suggested customers should call Broadbandbuyer's pre-sales team if they wanted more information.

Not only that but they didn't even bother to copy the pictures across so anyone browsing the Ebuyer website was actually looking at images hosted on Broadbandbuyer's servers.

Giles Essame, technical director at Broadbandbuyer, told the Reg: "We noticed because our firewall was showing a constant link to to Ebuyer's IP address. So they were not only copying our content but they weren't even hosting it themselves. They had even copied our pages for stuff which we had removed from the site because we were getting too many pre-sales queries."

Essame said: ""Perhaps I should feel flattered that the likes of Ebuyer would want to copy our content layout for use on it’s own site… but ultimately I’m disappointed, particularly to have discovered that they’re even using our bandwidth, which we pay for, to display the content to their own customers!"

Back in September of last year Ebuyer laid off its whole development team and its quality assurance team.

Mike Naylor, director of IT and marketing at Ebuyer, told us in a statement: "In the specific instance that you have highlighted it would appear that a member of our junior product management team has inadvertently obtained product information from an incorrect source. We apologise for this and have removed any reference made on the specific example given to the supplier.”

“We do, of course, monitor our website to ensure that all content is correct and properly authorised, but, as you will appreciate, individual errors can be missed on a site that carries information about such a large number of products. I therefore thank you for drawing this error to our attention, as a result of which we have re-inforced our message to the Product Management team that only content provided by suppliers and manufacturers should be replicated on our site to avoid a repeat of this situation."®


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021