Brand Protection

Sponsored
by

Noteworthy

Five Years of Domain Security Insights: CSC's Latest Findings on Global 2000 Companies

Thousands of Third-Party Domains Target Super Bowl Betting Brands

A Guide to Navigating the Chinese Market

Brand Protection / Most Viewed

India’s Draft National E-Commerce Policy: A Bollywood Drama in Four Acts

India's recently published Draft National e-Commerce Policy, prepared by the Indian Commerce Ministry think-tank, can be read like the script of a four-act Bollywood drama... They were the dream couple: Princess India and Prince IT. She was full of cultural richness and diversity, with beauty, mystique and natural resources. She also a dark side. She harbored the world's largest number of impoverished people, with little infrastructure, and facing sparse economic prospects. more

Are Domain Names Contract of Services or Property Rights?

There are several perspectives from which one can give various answers to the question of 'what are domain names?'. Originally the domain name system started and continues to be a human-friendly way of addressing to a set of machines or specific machine connected to the Internet. Hence, from the technical perspective, a domain name is simply an address consisting of a combination of alphanumeric and symbols to communicate with a machine which also happens to be hosting certain services in form of data and information on it. more

The UDRP and Judicial Review

The courts of the United Kingdom have set themselves outside the mainstream of Internet consensus policies on trademark/domain name disputes. A U.K. court decision regarding the UDRP reflects an unfortunate tendency to overlook one of the fundamental principles of the UDRP, namely the opportunity to seek independent resolution of a trademark/domain name dispute by court proceedings. more

Identical or Confusingly Similar to Trademarks but Noninfringing Domain Names

Domain names may be confusingly similar to trademarks or even identical or but not infringing. This is particularly true of trademarks acquired later than the allegedly infringing domain names ArcBest Corporation v. Domains By Proxy, LLC, Registration Private / Vernon Troupe, D2016-2381 (WIPO January 13, 2017) (<arcbest.com>, in which "ark" is a contraction of "Arkansas"), but it can also apply to marks composed of common element that predate domain name registration... more

Assessing Intent to Cybersquat

It, perhaps, does not have to be said that cybersquatting is an intentional tort. No one would expect the respondent to admit unlawful intention, but complainant's proof must nevertheless support that contention. The Panel in Hästens Sängar AB v. Jeff Bader / Organic Mattresses, Inc. FA2005001895951 (Forum July 31, 2020) reminds us that it takes more than bad faith use of a domain name to find cybersquatting. more

Thoughts on the Proposed Copyright Alternative Dispute Resolution Policy

A proposal from the Domain Name Association (DNA) would provide copyright owners with a new tool to fight online infringement -- but the idea is, like other efforts to protect intellectual property rights on the Internet, proving controversial. The proposed Copyright Alternative Dispute Resolution Policy is one of four parts of the DNA's "Healthy Domains Initiative" (HDI). more

US Election-Related Web Properties Prone to Fraud and Misinformation Due to Lack of Domain Security

The risks of fraud and disinformation in the U.S. election process have been hiding in plain sight. CSC's new research finds that a large majority of web domains closely linked to the campaign websites for Joe Biden and Donald Trump lack basic domain security protocols and are prone to domain spoofing tactics. This makes them a potential target for hackers looking to spread disinformation ahead of the election, and criminals who want to take advantage of voter intentions... more

The World of the Subdomain

A web domain name is the foundational piece of internet property allowing its owner (registrant) to construct and host an associated website. On a domain, the owner is also able to construct whatever subdomains they wish -- a process that is technically achieved via the configuration of records on the authoritative domain name system (DNS) server. more

‘Notorious Hosting Providers’: An Overview of the Highest-Threat Hosts From IP-address Blacklist Analysis

One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement. more

Cybercriminals Benefitting from Stalled Privacy/Proxy Policy

We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more

What Trademark Owners Need to Know to Avoid Reverse Domain Name Hijacking

A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more

Chehadé Sends ICANN Board Farewell Letter

ICANN's current CEO Fadi Chehadé is leaving the organisation in a few weeks time. His replacement has been announced and the upcoming public meeting in Marrakech, Morrocco, will be Chehadé's final public engagement as ICANN CEO. A couple of days ago Chehadé sent the ICANN board a letter entitled "Summary of My Tenure". While the letter may have been addressed to the board, it was published on the ICANN website immediately. more

Public Sharing and a New Strategy in Fighting Cyber Crime

A couple of years ago I started a mailing list where folks not necessarily involved with the vetted, trusted, closed and snobbish circles of cyber crime fighting (some founded by me) could share information and be informed of threats. In this post I explore some of the history behind information sharing online, and explain the concept behind the botnets mailing list... we may not be able to always share our resources, but it is time to change the tide of the cyber crime war, and strategize. One of the strategies we need to use, or at least try, is public information sharing of "lesser evils" already in the public domain. more

Time to Take Stock: Twelve Internet and Jurisdiction Trends in Retrospect

With the growing tension between the cross-border Internet and the patchwork of national jurisdictions, it becomes crucial to keep track of key global trends that drive the debate on appropriate frameworks. One year ago, the Internet & Jurisdiction Project initiated a global multi-stakeholder dialogue process on these issues. To provide a factual basis for such discussions, it established an Observatory, supported by a network of selected international experts, to detect and categorize relevant cases via an innovative crowd-based filtering process in order to identify high-level patterns. more

Why the Pandemic Makes Domain Names More Valuable Than Ever

In the United States, at least 25,000 brick and mortar businesses will close in 2020 due to the Coronavirus (source: Coresight). I believe this will only be the tip of the iceberg. The businesses that fight to stay alive will become 100% dependent on the Internet to generate their revenue. No longer able to rely on foot traffic to their old brick and mortars, the popularity and brand-ability of their websites will solely dictate their ability to survive in the coming years. more