Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Featured Blogs

Space Weather and Broadband

There was an interesting phenomenon that happened in September when Starlink launched 49 new satellites. The satellites were successfully deployed by the rocket, but as the satellites were being maneuvered to reach the final orbital slots, there was a geomagnetic storm that caused 38 of the satellites to fall back to earth. Space storms happen when radiation affects the magnetosphere that surrounds the earth.  more

Cuban Undersea Cable Politics

Undersea cables between the U. S. and Cuba have long been intertwined with politics. In 1887, The New York Times reported on the inauguration of a cable in support of the Cuban insurgents fighting for independence from Spain -- a precursor to the Spanish-American war. Phone service between the U.S. and Cuba began in 1921 with AT&T's installation of an undersea cable and AT&T dominated international telephony to Cuba until the 1990s. more

A New Definition of 6G

We now know how wireless carriers are going to continue the string of new G generations of cellular technology. 5G was originally defined to include spectrum up to 90 GHz or 100 GHz. In the last few years, international standards bodies have been developing new 6G standards in what is called the terahertz wavelengths between 100 GHz and 1 THz. more

How Safe Are Your .KIDS?

This year has been one of the busiest years for domain launches in quite a while. Before the end of 2022, we'll see one more significant domain launch, namely .KIDS, on November 29, 2022. This extension is being launched as a safe space on the internet for children and parents. The registry has set out some very strict use policies to make this happen. Some companies have already registered their brands during the Sunrise Period, while others have taken up names in the Community Sunrise. more

Three Reasons Why CISOs Need to Understand Domain Security

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

How Are You Solving the Digital Divide

One of the most common questions I'm being asked these days is from local politicians and economic development folks who want examples of other communities that are tackling and solving the digital divide. I'm able to trot out the big-picture stories because they come to my attention in reading about the industry. As an example, just before I wrote this blog, I read an article that says that the State of Maryland will be providing 150,000 laptops to homes... more

Economy-of-Scale for ISPs

I've worked with a number of small communities that want to explore the idea of having a community-owned ISP. My advice to small communities is the same as with all clients - economy-of-scale really matters for ISPs. Economy-of-scale is the economic term for describing how businesses get more efficient as they get larger. It's fairly easy to understand, and the classic example is to look at the impact of the salary and costs of the general manager of an ISP.  more

Turning the Tide of Online Scams: Interview With Prof. Jorij Abraham, Global Anti-Scam Alliance

Professor Jorij Abraham has been a part of the international eCommerce community since 1997. From 2013 -- 2017, he has been Director of Research & Advise at Thuiswinkel.org (the Dutch Ecommerce Association) and the European Ecommerce Association with 25.000+ members in 20 countries. He is now Managing Director of Global Anti-Scam Alliance, whose mission is to protect consumers from getting scammed. He is also e-commerce professor at the University of Applied Sciences, TIO. more

The Continued Rise of Phishing and the Case of the Customizable Site

We’ve noted in previous CSC studies that phishing continues to be an extremely popular threat vector with bad actors and shows no signs of subsiding in part, because of the COVID–19 pandemic and the rise in popularity of remote working. Indeed, the most recent figures from the Anti-Phishing Working Group (APWG) show that the numbers of phishing attacks are higher than ever before, with the quarterly total of identified unique phishing attacks exceeding 1 million for the first time in Q1 2022, and over 600 distinct brands attacked each month. more

Four Steps to an Effective Brand Protection Program

Internet use has become ever more pervasive. With around five billion global users, it generates an economy of around 15% of global gross domestic product (GDP); that's around $15 trillion and is a figure that's growing 2.5 times faster than GDP itself. This makes the internet an attractive channel for infringers. Phishing and other fraud tactics, selling counterfeit goods online, and digital piracy are primary areas of concern. more

Industry Updates

The Hidden Secret About Your DNS Zones and Combatting Phishing Campaigns

From URSNIF IoCs to Software Spoofing: Using DNS Intel to Connect the Dots

Does Your Supplier’s Domain Oversight Impact You?

What’s Your .AI Domain Strategy?

New CSC Research Indicates Launch of Threads by Instagram is Already a Growing Target for Fraud and Brand Abuse

AI Tool Popularity: An Opportunity for Launching Malicious Campaigns?

CSC Launches Groundbreaking Domaincasting Digital Blocking Network

Alleviating the Risks .zip and Similar Domain Extensions Could Pose via DNS Intelligence

New Global Initiative Aims to Strengthen Online Brand Protection

When Marketing Vendors Get Attacked, Clients Suffer: Third-Party Risk Discovery in the DNS

Dissecting 1M+ Malicious Domains Under the DNS Lens

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

2023 Update - How Are the Most-Spoofed Brands Represented in the DNS?

Shining the WHOIS and DNS Spotlight on International Fraud

Gauging How Big a Threat Gigabud RAT Is Through an IoC List Expansion Analysis