{"id":35539,"date":"2020-06-15T20:38:09","date_gmt":"2020-06-15T20:38:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/"},"modified":"2020-06-15T20:38:09","modified_gmt":"2020-06-15T20:38:09","slug":"eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/","title":{"rendered":"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#8216;unwanted program&#8217; labeling"},"content":{"rendered":"<p><strong class=\"trailer\">Analysis<\/strong> Last week, fourteen cybersecurity experts, infosec biz ESET, and tech advocacy groups the Internet Association and TechFreedom filed friend-of-the-court briefs urging the US Supreme Court to review a 2019 appeals court ruling against antivirus maker Malwarebytes.<\/p>\n<p>The flurry of legal arguments represents an effort to ensure blanket immunity protections <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2019\/11\/13\/section_230_ironies\/\" rel=\"noopener noreferrer\">outlined<\/a> in <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.eff.org\/issues\/bloggers\/legal\/liability\/230\">Section 230<\/a> of America&#8217;s Communications Decency Act (CDA) \u2013 which Malwarebytes is relying on \u2013 remain as broad as possible.<\/p>\n<p>In 2017, a district court judge in San Jose, California, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2017\/11\/10\/malwarebytes_enigma\/\" rel=\"noopener noreferrer\">dismissed a complaint<\/a> brought by Enigma Software against its competitor Malwarebytes. Enigma filed its complaint because Malwarebytes&#8217; tools labelled Enigma&#8217;s anti-spyware app a &#8220;potentially unwanted program,&#8221; and asked users whether they wanted to remove it, if it was detected on a system.<\/p>\n<p>Enigma claimed that its Spyhunter software was legitimate and posed no threat to users. However, Malwarebytes prevailed in court when the judge dismissed the case, citing 2009&#8217;s <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2009\/07\/01\/kaspersky_zango_win\/\" rel=\"noopener noreferrer\">Zango v. Kaspersky<\/a> decision. The judge affirmed Malwarebytes was immune from liability under <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/47\/230\">47 U.S.C. \u00a7 230(c)(2)(B)<\/a> of the CDA.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/09\/13\/shutterstock_frustrated.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"frustrated\"><\/p>\n<h2 title=\"Section 230 has legal eagles split over censorship\">Malwarebytes back to square one as appeals court rules blocking rival antivirus maker isn&#8217;t on<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2019\/09\/13\/malwarebytes_enigma_blocking\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>That section of the law exempts service providers from liability for providing others with means to take action against material \u2013 identified in \u00a7 230(c)(2)(A) \u2013 &#8220;that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected.&#8221;<\/p>\n<p>In this case, that provider was Malwarebytes, which made the filtering technology that flagged Enigma software for users to then choose to remove or not. The (c)(2)(B) portion of the CDA is tied to the (c)(2)(A) section of the law that the Trump administration has <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/05\/29\/trump_executive_order\/\" rel=\"noopener noreferrer\">threatened to gut<\/a> over Twitter&#8217;s decision to flag presidential tweets for policy violations. Though related, the two sections are not the same.<\/p>\n<p>The Trump administration has it out for \u00a7 230(c)(2)(A), which applies to those who actually restrict content (e.g. Twitter), and \u00a7 230(c)(2)(B) applies to those like Malwarebytes who provide the technical means (e.g filters) by which content restrictions are carried out.<\/p>\n<h3 class=\"crosshead\"><span>&#8216;Objectionable&#8217;<\/span><\/h3>\n<p>A crucial difference between the two sections is that those taking action under section A are required to act in good faith while those providing the tools to take action are not subject to that requirement. Malwarebytes insists the law allows the company to take action against whatever it finds &#8220;objectionable,&#8221; which in this case was Engima&#8217;s software, without being sued for doing so. And the district court agreed.<\/p>\n<p>But the Ninth Circuit Court of Appeals, in a 2-to-1 ruling, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2019\/09\/13\/malwarebytes_enigma_blocking\/\" rel=\"noopener noreferrer\">overturned that decision<\/a> last September, asserting that the CDA is not limitless.<\/p>\n<p>So last week, the fourteen security experts, ESET, the Internet Association, and TechFreedom added their voices to other organizations like the Electronic Frontier Foundation to urge the Supreme Court to accept the case for review. The <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-1284\/145516\/20200612152748750_19-1284%20Malwarebytes%20v%20Enigma%20Cybersecurity%20Experts%20Amicus%20TO%20FILE%20REVISED.pdf\">security experts&#8217; brief<\/a> [PDF] notes that competing anti-threat software can itself be a genuine threat if it contains bugs (e.g. Symantec&#8217;s Norton Antivirus in 2016) or if it&#8217;s actually <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/perma.cc\/A727-6K5S\">malware claiming to be legitimate<\/a>.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/02\/25\/argument_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Argument\"><\/p>\n<h2 title=\"And that's why we flirted with your nemesis Symantec, Brit retailer claims\">Dixons hits back at McAfee&#8217;s \u00a330m antivirus sueball: Your AV didn&#8217;t work on Windows 10S<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2019\/08\/28\/dixons_mcafee_30m_antivirus_lawsuit\/\"><span>MORE LIKE THIS<\/span><\/a><\/div>\n<p>The security experts, mostly law and technology professors, argue that the Ninth Circuit decision &#8220;permits spurious legal claims based on mere allegations of &#8216;anticompetitive animus&#8217; by vendors whose products have been identified as threats,&#8221; thereby discouraging security vendors from aggressively identifying threats.<\/p>\n<p>ESET&#8217;s <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-1284\/145436\/20200611231453037_ESET%20Amicus%20Brief.pdf\">argument<\/a> [PDF] is similar, noting it is submitting a brief in support of a direct competitor because defending Section 230 protections are so important.<\/p>\n<p>&#8220;If the Ninth Circuit\u2019s opinion stands, anyone can manufacture a facially valid claim against a security software company simply by combining cyber security features with objectionable features,&#8221; ESET&#8217;s filing this month stated.<\/p>\n<p>And the ESET brief echoes a point made by the security experts about the prevalence of malware that claims to be security software. &#8220;In a recent analysis of 250 purported antivirus apps in the Google Play store, for instance, less than a third of the apps were even functional; the rest were at best ineffective and at worst harmful,&#8221; it stated.<\/p>\n<p>The briefs filed by the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-1284\/145554\/20200612202510260_IA%20Amicus%20Brief%20iso%20Malwarebytes%20Petition%20for%20Cert_WSGR%20MASTER.pdf\">Internet Association<\/a> [PDF] and <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.supremecourt.gov\/DocketPDF\/19\/19-1284\/145499\/20200612140037912_TechFreedom_Cert_Amicus_Brief.pdf\">TechFreedom<\/a> [PDF] cover similar ground, arguing that the Ninth Circuit has short-circuited the internet.<\/p>\n<p>If the Ninth Circuit decision is allowed to stand, it&#8217;s claimed, there will be more litigation \u2013 by companies that don&#8217;t like being blocked or filtered \u2013 and less innovation \u2013 as makers of security software, internet filters, or spam stoppers avoid making legally risky editorial decisions or providing tools that affect third-party content. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.com\/tl\/1940\/-8722\/ransomware-has-gone-nuclear?td=wptl1940\">Ransomware has gone nuclear<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/06\/15\/eset_malwarebytes_enigma_supreme_court\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security biz, academics, tech advocacy groups ask Supreme Court to review ruling that could derail antivirus industry Analysis\u00a0 Last week, fourteen cybersecurity experts, infosec biz ESET, and tech advocacy groups the Internet Association and TechFreedom filed friend-of-the-court briefs urging the US Supreme Court to review a 2019 appeals court ruling against antivirus maker Malwarebytes.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35540,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-35539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#039;unwanted program&#039; labeling 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#039;unwanted program&#039; labeling 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T20:38:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#8216;unwanted program&#8217; labeling\",\"datePublished\":\"2020-06-15T20:38:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/\"},\"wordCount\":798,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/\",\"name\":\"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at 'unwanted program' labeling 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg\",\"datePublished\":\"2020-06-15T20:38:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#8216;unwanted program&#8217; labeling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at 'unwanted program' labeling 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/","og_locale":"en_US","og_type":"article","og_title":"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at 'unwanted program' labeling 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-15T20:38:09+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#8216;unwanted program&#8217; labeling","datePublished":"2020-06-15T20:38:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/"},"wordCount":798,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/","url":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/","name":"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at 'unwanted program' labeling 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg","datePublished":"2020-06-15T20:38:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/eset-rushes-to-defend-rival-malwarebytes-in-legal-war-sparked-by-vendor-upset-at-unwanted-program-labeling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"ESET rushes to defend rival Malwarebytes in legal war sparked by vendor upset at &#8216;unwanted program&#8217; labeling"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35539"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35539\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35540"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}