Trademark Overview
On Tuesday, October 15, 2024, a trademark application was filed for YOU DESERVE TO BE HACKED with the United States Patent and Trademark Office. The USPTO has given the YOU DESERVE TO BE HACKED trademark a serial number of 79413313. The federal status of this trademark filing is RESPONSE AFTER NON-FINAL ACTION - ENTERED as of Tuesday, August 5, 2025. This trademark is owned by CovertSwarm Limited. The YOU DESERVE TO BE HACKED trademark is filed in the Advertising, Business and Retail Services, Computer & Software Products & Electrical & Scientific Products, Education & Entertainment Services, Computer & Software Services & Scientific Services, Personal, and Legal & Social Services categories with the following description:
Education and training relating to computer, computer network and data security; education and training relating to security services; education and training relating to restricting unauthorised access to computer networks; staff training services relating to modern office technology; information, research, advisory and consultancy services relating to all of the aforesaid.
Downloadable and recorded computer software for use in performing computer network vulnerability assessment and penetration testing; Downloadable and recorded computer software for use in identifying computer and database vulnerabilities for use in preventing hackers or unauthorised users from accessing telecommunications and computer networks; Security software, namely, downloadable and recorded software for the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Software for network and device security, namely, downloadable and recorded software for identifying vulnerabilities by performing computer network vulnerability assessment and penetration testing; Computer software, namely, downloadable and recorded anti-spyware and anti-piracy software; Downloadable electronic articles in the field of data security and computer technology and downloadable electronic reports in the field of data security, threat asses...
Business risk management services; risk management consultancy; business investigations; business risk assessment services; information, research, advisory and consultancy services relating to all of the aforesaid.
Security consultancy, namely, physical security services for the protection of people and tangible property; security services, namely, the identification, monitoring and management of security threats to property and individuals; physical security services, namely, physical security assessments of physical locations, and physical working environments; monitoring of security systems; security monitoring services; namely, monitoring security systems for the physical safety of persons and physical security of tangible property; security risk assessments; security services for the protection of property and individuals; security services relating to people and the protection of real estate and intangibles; security services relating to commercial and residential buildings; security risk assessments relating to commercial and residential buildings; information, research, advisory and consultancy services relating to all of the aforesaid.
Software as a service (SaaS) services featuring software for use in performing computer network vulnerability assessment and penetration testing; Software as a service SaaS) services featuring software for use in identifying computer and database vulnerabilities for use in preventing hackers or unauthorised users from accessing telecommunications and computer networks; IT security services relating to vulnerability assessment and penetration testing, namely, testing of computer security systems; IT security services relating to preventing hackers or unauthorised users from accessing telecommunications and computer networks, namely, computer security threat analysis for protecting data and cybersecurity services in the nature of restricting unauthorized access to computer systems; Design, development, maintenance and updating of computer software; Computer security services, namely, Internet security consultancy; Computer security services for protection against illegal network access i...
