Brand Protection

Sponsored
by

Noteworthy

Where Domain Security Meets the Supply Chain Crunch

Is Your Domain Name Portfolio Governance Policy Up To Date?

Domain Registrar Selection: A Key Indicator of Overall Organization Security

Brand Protection / Featured Blogs

Super Bust: Due Process and Domain Name Seizure

With the same made-for PR timing that prompted a previous seizure of domain names just before shopping's "Cyber Monday," Immigration and Customs Enforcement struck again, this time days before the Super Bowl, against "10 websites that illegally streamed live sporting telecasts and pay-per-view events over the Internet." ICE executed seizure warrants against the 10 by demanding that registries redirect nameserver requests for the domains to 74.81.170.110, where a colorful "This domain name has been seized by ICE" graphic is displayed. more

Implications of ICANN’s New TLD Disqualification Policies and Cybersquatting 3-Strike Law

ICANN's proposed final applicant guidebook unraveled some new policies that would disqualify applicants from the new TLD program. ICANN states that if you lose 3 UDRP cases, you will be disqualified from being a major shareholder, partner, officer, director of a new top-level domain registry... Has ICANN opened a new can of worms with the 3-strike rule? more

The Web is Dead: What This Means to ICANN, New gTLD Program and the Domain Industry

While we are spending years figuring out how to create the perfect generic Top-Level Domain (gTLD) launch and guidebook, the Internet is moving along at an extraordinary pace without any care about ICANN policy-making. The fact of the matter is ICANN is a ghost to the ordinary person or Internet company. You can not imagine how many times I had to explain what ICANN is, what ICANN does and why ICANN is important. more

Digital Rights Management or Digital Restrictive Management?

We are all accustomed to purchasing and/or using copyrighted material in one fashion or another. From music, movies-(BluRay), e-books-(Kindle), computers-(software), mobile phones-(iPhone) and games; the umbrella of companies wanting to restrict access to its products continues to grow and become increasingly restrictive. more

Protection of Intellectual Property: The Core of the Net Neutrality Debate

It didn't take long for criticism of the Verizon/Google net neutrality proposal to start pouring in. "nterest groups, bloggers, and even Google fanboys [have started] discrediting the plan" according to one trade publication. Although most of the commentary simply echoes various groups' long-held positions, the Electronic Frontier Foundation, the nation's foremost cyber-rights watchdog, provided a crucial insight about the plan that goes to the core of the net neutrality issue. more

Google & eBay, Keywords & Domains, & ICANN

Sell a trademark as a keyword for directed search or online auctions and make $billions. But use a trademark in a domain name for direct search and lose the domain, or worse. The gap between how trademark law treats the two species of search has grown wider in the wake of several landmark 2010 trademark law decisions -- and provides another sound reason why ICANN should not establish any new rights protections for new generic Top-Level Domains (gTLDs) beyond those STI-RT compromise positions already included in the fourth version of its Draft Applicant Guidebook (DAGv4). more

Funky Ninth Circuit Opinion on Domain Names and Nominative Use - Toyota v. Tabari

Every time I see a federal appellate opinion on domain names, I'm vaguely reminded of the Country Joe song I-Feel-Like-I'm-Fixin'-To-Die Rag, whose course goes "And it's one, two, three, what are we fighting for?" Fortunately, domain name disputes do not lead to the senseless loss of life we experienced from the Vietnam War. Unfortunately, lengthy domain name litigation usually has little more strategic value. more

Regulating and Not Regulating the Internet

There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more

Old Dog, New Tricks: Gift Card Scams in Social Networks

In the past few months, a flurry of gift card scams leveraging such high-profile brands as Best Buy, Whole Foods and IKEA have emerged on Facebook. These scams often use the brand's logo, website URL, or general "look and feel" on Facebook "fan" pages to give the impression that these offers are legitimate. Some scams are even bold enough to include bogus, non-interactive fan comments to add a greater sense of authenticity to the gift card offer. To date, these scams have been successful at tricking tens of thousands of consumers. In just one day, for example, a fan page titled "IKEA Get a FREE $1000 IKEA Gift Card! (ONLY AVAILABLE 1 DAY)" registered 40,000 fans before being shut down. more

Take That Down Right Now - and Give Me That Too

Google has released a government requests tool. It's highly illuminating and may end up being quite disruptive. That's what surprising data visualizations can do for us. ... The tool allows us to see the number of requests from different countries that Google received during the last six months of 2009. More than 3600 data requests from Brazil during those six months and more than 3500 from the US. But just 40 or so from Canada and 30 from Israel. more

Industry Updates

What’s Your .AI Domain Strategy?

New CSC Research Indicates Launch of Threads by Instagram is Already a Growing Target for Fraud and Brand Abuse

AI Tool Popularity: An Opportunity for Launching Malicious Campaigns?

CSC Launches Groundbreaking Domaincasting Digital Blocking Network

Alleviating the Risks .zip and Similar Domain Extensions Could Pose via DNS Intelligence

New Global Initiative Aims to Strengthen Online Brand Protection

When Marketing Vendors Get Attacked, Clients Suffer: Third-Party Risk Discovery in the DNS

Dissecting 1M+ Malicious Domains Under the DNS Lens

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

2023 Update - How Are the Most-Spoofed Brands Represented in the DNS?

Shining the WHOIS and DNS Spotlight on International Fraud

Gauging How Big a Threat Gigabud RAT Is Through an IoC List Expansion Analysis

Catching Batloader Disguised as Legit Tools through Threat Vector Identification

Tracing Connections to Rogue Software Spread through Google Search Ads

Sifting for Digital Breadcrumbs Related to the Latest Zoom Attack