Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Featured Blogs

TLD Rights Protection Mechanisms

Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more

What Could the RIAA’s Switch in Strategy Mean?

The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more

ICANN Responsible for Domain Name Trademark Mess

It is ICANN's responsibility to make sure domain names do not infringe on trademarks. To determine infringement, ICANN should rely in the short term on predictive models. Thus, domain name and trademark owners must start putting pressure on ICANN to assume its trademark responsibility. more

Expansion of Top-Level Domain Names: Why Current Brand Protection Procedures Will Be Impractical

As ICANN introduces new generic top level domains (gTLDs) and separates itself from US oversight, it has the opportunity to distance itself from the taint of cybersquatting, brand abuse, and criminal activity involving domains... To underscore the scope of the issue, consider this research on just 30 top Interbrand-ranked global brands. The most recent MarkMonitor Brandjacking Index found cybersquatting incidents increased over 40% in the last year for the brands that were studied; these leading brands suffered as many as 15,000 incidents per brand... more

DMCA Reaches the Decade Mark

My friend Kevin Thompson over at Cyberlaw Central reminded me this morning in this post that President Clinton signed the Digital Millennium Copyright Act ten years ago today. Tempus fugit. It's interesting to reflect on how this critical piece of legislation has affected (I think fostered) the growth of the online infrastructure with its safe harbor provisions found at 17 U.S.C. 512. more

RIAA Loses Again: No Legal Wins Against P2P File Sharers So Far

The Recording Industry Association of America (RIAA) has been taking a lot of people to court -- basically, harassing folks in an attempt to curb file-sharing. The $220,000 verdict against Jammy Thomas got a lot of news (and probably worried a lot of folks). However, on appeal (i.e., after a new court not cherry-picked by the RIAA to try the case looked things over), the RIAA lost... again. ...At its heart, the verdict reaffirms that simply making a copyrighted work available is not the same as actually distributing the work. more

Domain Name Lessons from Napster

I first outline a brief history of free file-sharing technology, then draw some general and domain name lessons, then outline the what, how, and why that make your activism effective and necessary... The domain name industry is decentralized and atomic in that anyone from anywhere in the world can register a domain name, keep the ownershp name and address private, and host it from a country where the U.S. and European legal systems don't apply. Thus, legal action will only drive domain owners further underground. more

Public Sharing and a New Strategy in Fighting Cyber Crime

A couple of years ago I started a mailing list where folks not necessarily involved with the vetted, trusted, closed and snobbish circles of cyber crime fighting (some founded by me) could share information and be informed of threats. In this post I explore some of the history behind information sharing online, and explain the concept behind the botnets mailing list... we may not be able to always share our resources, but it is time to change the tide of the cyber crime war, and strategize. One of the strategies we need to use, or at least try, is public information sharing of "lesser evils" already in the public domain. more

Domain Name Lessons From iTunes

What do iTunes and a cooperative domain-name Intellectual Property (IP) regime have in common? They are market solutions to illegal activity: free downloading of music and free use of brands in domain names, respectively. The music industry tried to fight the free downloading of copyright-protected music by taking legal action against free downloaders under the pretext that their activity siphons industry revenue... more

Google, Viacom, Privacy and Copyright Meet the Social Web

In all the recent uproar (New York Times, "Google Told to Turn Over User Data of YouTube," Michael Helft, 4 July 2008) about the fact that Google has been forced to turn over a large pile of personally-identifiable information to Viacom as part of a copyright dispute (Opinion), there is a really interesting angle pointed out by Dan Brickley (co-creator of FOAF and general Semantic Web troublemaker)... more

Industry Updates

The Hidden Secret About Your DNS Zones and Combatting Phishing Campaigns

From URSNIF IoCs to Software Spoofing: Using DNS Intel to Connect the Dots

Does Your Supplier’s Domain Oversight Impact You?

What’s Your .AI Domain Strategy?

New CSC Research Indicates Launch of Threads by Instagram is Already a Growing Target for Fraud and Brand Abuse

AI Tool Popularity: An Opportunity for Launching Malicious Campaigns?

CSC Launches Groundbreaking Domaincasting Digital Blocking Network

Alleviating the Risks .zip and Similar Domain Extensions Could Pose via DNS Intelligence

New Global Initiative Aims to Strengthen Online Brand Protection

When Marketing Vendors Get Attacked, Clients Suffer: Third-Party Risk Discovery in the DNS

Dissecting 1M+ Malicious Domains Under the DNS Lens

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

2023 Update - How Are the Most-Spoofed Brands Represented in the DNS?

Shining the WHOIS and DNS Spotlight on International Fraud

Gauging How Big a Threat Gigabud RAT Is Through an IoC List Expansion Analysis