Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Most Viewed

Super Bust: Due Process and Domain Name Seizure

With the same made-for PR timing that prompted a previous seizure of domain names just before shopping's "Cyber Monday," Immigration and Customs Enforcement struck again, this time days before the Super Bowl, against "10 websites that illegally streamed live sporting telecasts and pay-per-view events over the Internet." ICE executed seizure warrants against the 10 by demanding that registries redirect nameserver requests for the domains to 74.81.170.110, where a colorful "This domain name has been seized by ICE" graphic is displayed. more

2013 Domain Name Year in Review

Well folks, it's that time of year again. It's time for our countdown of the top 10 biggest domain stories for 2013. And while my predictions from last year were accurate, in that we did see a record number of registry and registrar breaches, I had no idea that this year's biggest story would even appear on the list. So with that said, let's get started. more

Vendor Selection Matters in the Domain Registrar Ecosystem

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. Many of the largest companies in the world still lack basic domain security protocols, making them prime targets for bad actors. An attack on a domain can lead to the redirection of a company's website, domain spoofing, domain and domain name system (DNS) hijacking attacks, phishing attacks, network breaches, and business email compromise (BEC). more

Nation Scale Internet Filtering—Do’s and Don’ts

If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more

New Research from CSC on the Impact of COVID-19 on Internet Security and Safety

Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. more

The Digital Decade – A Look Ahead

As 2019 wrapped up, we took some time to reflect on some of the most impactful digital developments of the past decade and how they helped change our digital lives, including: the rise of mobile and tablet usage; the importance of mobile apps; the explosion of social media and online gaming; cloud computing; domain names, brand protection and the impact of GDP. Now that we've passed the New Year, it's time to look forward. more

Domain Seizures for Copyright Infringement Likely to Move Beyond U.S. Based Registries

Efforts to take down websites for copyright infringement are likely to move beyond U.S.-based domain name registries, with ICANN promising to more closely cooperate with global law enforcement agencies and governments. During an open session with the Government Advisory Committee (GAC), the ICANN board confirmed that it will enforce its contracts with registrars more effectively in order to meet expectations from governments and law enforcement authorities. more

The Highest Threat TLDs - Part 2

In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual top-level domains (TLDs) or domain extensions, using data from CSC's Fraud Protection services, powered by our DomainSecSM platform. In this second article, we analyze multiple datasets to determine the highest-threat TLDs, based on the frequency with which the domains are used egregiously for a range of cybercrimes. more

The Myth of the Unintended Infringer in SOPA and PIPA

In a recent op-ed piece in TheHill.COM, some friends and I described the futility of mandated DNS blocking as contemplated by the SOPA (H.R. 3261) and PIPA (S. 968) bills now working their way through the U.S. Congress: No Internet user is required to use the Domain Name servers provided by their ISP. And if millions of American citizens who for whatever reason want to engage in online piracy can no longer do so because Congress has passed this law and their ISP is now filtering the citizen's DNS lookups... more

Domain Registrations in New TLDs Overwhelmingly for Defensive Purposes, INTA Study

During the ICANN meeting in South Africa last week, the impact of new gTLD rights protection mechanisms (RPMS) was the subject of key discussions, and some concerns were voiced regarding trademark owners themselves registering domain names excessively and technically abusing the sunrise period. more

2018 Domain Name Year in Review

Well, it's that time of year again. The time of year when I look back at all of the biggest domain news stories from the last twelve months, and also reflect on my predictions from last year. As expected, GDPR has had a major impact on the ability to access domain ownership information. And we did indeed see a number of M&A transactions over this last year. However, there wasn't a lot of new .Brand activity. This is one prediction where I may have missed the mark... more

Feds Shut Down File-Sharing Website Megaupload.com, Seven People Charged

Federal prosecutors in Virginia have shut down one of the world's largest Internet file-sharing sites, Megaupload.com, charging its founder and others with violating piracy laws, the Associated Press reports today. "The indictment was unsealed Thursday, one day after websites shut down in protest of two congressional proposals [SOPA & PIPA] intended to thwart the online piracy of copyrighted movies and TV programs." more

Time of Registration in Determining Cybersquatting

While Panels under the UDRP and judges under the ACPA draw upon a similar body of principles in determining infringement -- both mechanisms, after all, are crafted to combat cybersquatting -- and though arbitration panels and judges undoubtedly view alleged tortious wrongdoing by abusive registrations of domain names through similar lenses and apply laws that may be outwardly similar, each protective mechanism has developed its own distinct and separate jurisprudence. more

Key Findings from the 2021 Domain Security Report

With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more

TLD Operators Should Not Police Content, Says EFF

Electronic Frontier Foundation (EFF) released a letter today stating "companies and organizations that run the Internet's domain name system shouldn't be in the business of policing the contents of websites, or enforcing laws that can impinge on free speech. more