The Deseret News reports: A jury has found that Salt Lake Comic Con founders Dan Farr and Bryan Brandenburg, along with their company, violated a trademark when they named their fan convention a “comic con.” However, the jury decided that the trademark was not willfully violated, and only awarded $20, 000 of the $12 million that San Diego Comic-Con had asked for in damages. The decision came at the end of an eight-day jury trial and three years of legal maneuvering… And with an estimated 140 other fan conventions across the country calling themselves comic cons, the impact of the decision could be felt nationwide… The Salt Lake group also has an ongoing action with the U.S. Patent and Trademark Office seeking to invalidate San Diego’s “comic-con” trademark… San Diego Comic-Con, which has been holding events since 1970, has a trademark on “comic-con” with a hyphen, but was unsuccessful in its 1995 bid to trademark “comic con, ” with a space. The unhyphenated name “Comic Con International, ” as well as the event’s iconic “eye logo, ” are also protected by trademark. The event maintains that its trademarks cover the term “comic con” in all its forms… San Diego Comic-Con wanted more than $12 million in damages from Salt Lake, including over $9 million for a three-month “corrective advertising campaign” to dispel confusion… In his closing arguments, Michael Katz, an attorney for Salt Lake Comic Con, questioned the amount San Diego was seeking, noting that San Diego authorities said during trial the organization generally spends between $20, 000 and $30, 000 for a month of advertising. Slashdot reader AlanBDee writes: When I attended the Salt Lake City Comic Con I did assume it was the same organization that put on San Diego Comic-Con… But now I have to wonder how that will affect other Comic Cons around the nation? What should these comic based fan conventions be called if not Comic Con? Read more of this story at Slashdot.
Read More:
San Diego Comic-Con Wins Trademark Suit Against ‘Salt Lake Comic Con’
An anonymous reader writes: The Necurs botnet has been harnessed to fling a new strain of ransomware dubbed “Jaff”. Jaff spreads in a similar way to the infamous file-encrypting malware Locky and even uses the same payment site template, but is nonetheless a different monster. Attached to dangerous emails is an infectious PDF containing an embedded DOCM file with a malicious macro script. This script will then download and execute the Jaff ransomware. Locky — like Jaff — also used the Necurs botnet and a booby-trapped PDF, security firm Malwarebytes notes. “This is where the comparison ends, since the code base is different as well as the ransom itself, ” said Jerome Segura, a security researcher at Malwarebytes. “Jaff asks for an astounding 2 BTC, which is about $3, 700 at the time of writing.” Proofpoint reckons Jaff may be the work of the same cybercriminals behind Locky, Dridex and Bart (other nasty malware) but this remains unconfirmed. And Forcepoint Security Labs reports that malicious emails carrying Jaff are being cranked out at a rate of 5 million an hour on Thursday, or 13 million in total at the time it wrote up a blog post about the new threat. Read more of this story at Slashdot.