Domain Management

Domain Management / Most Viewed

A Short-Term Suspension of GDPR Enforcement on WHOIS May Be Necessary, Says U.S. Government

Implementation of European Union's General Data Protection Regulation, or GDPR, is a major concern of our government, said David Redl during a meeting held on Thursday in Washington DC. more

Domain Name Issues In Russia

How are domain names dealt with in Russia? This article discusses current issues related to the registration and assignment of domain names in ".ru" zone (Russian top level country code domain) and trademark protection on Internet. more

Accepting New Top-Level Domains As Suffix-Less Cyber Brands

First off all, still unknown to the masses, this newly proposed $185,000 USD generic Top-Level Domain (gTLD) scheme is in reality a suffix-less, custom-made, designer, globally exclusive domain name. Well done ICANN, as it is what the world needs now. However, ICANN has never mentioned this special marketing feature to date, as this suffix-less quality alone brings a major and a very positive revolution in cyber branding architecture for the net savvy marketers and dramatically changes the global thinking which has been primarily locked into a suffix based mentality when trying to reach for anything on the net; what name and what suffix? more

Why Brands Need Their Own TLD - The Mulberry-Sale Site that Scammed Me

As a seasoned internet user, even an old 'Domainer', I was there when ICANN launched the first round of New TLDs. I remember the criticism we received from the media back then. We were invited to countless roundtable discussions, press conferences, and local internet events at which we were expected to answer the key media question: "Why are new TLDs necessary?" Dot BIZ, .INFO, and four more were the test bed new TLDs -- I represented .BIZ in EMEA. more

WIPO Taking Screenshots of Filed UDRPs

Michael Berkens reporting in TheDomains.com: "WIPO has been taking Screenshots of whatever is on a domain name as soon as a UDRP Is filed and they have been furnishing the screenshot to the UDRP panel who has been taking the screenshot into account as evidence in making their determination... Mr. Berryhill has been working behind the scenes to confirm that WIPO has in fact has been taking a screenshot of the domain name upon receipt of a UDRP complaint and furnishing it to the panel without the knowledge of the domain holder and of course has been telling WIPO why its just plain wrong." more

No Barrier to Reading Across the Dot with New TLDs and Trademark Infringements

Even before the introduction of new top level domains in 2014, Panels had grappled with the before and after the dot issue with country code suffixes. The traditional procedure is to compare the characters of the accused domain names with the characters of trademarks for identity or confusing similarity. But this did not exclude the possibility of reading across the dot. more

New TLDs, Swiftly: This Is No Beauty Contest!

In response to ICANN's request for proposal (RFP) for the selection of new sponsored Top-Level Domains, Wendy Seltzer for the At-Large Advisory Committee (ALAC) urges ICANN to move quickly beyond "testing" to more open addition of a full range of new gTLDs in the near future and offers some general principles to guide that expansion. more

TLD Domain Abuse: Threat Report - First Half 2011

When it comes to building a robust globe-spanning network of crimeware and making the victims dance to a tune of the cyber-criminals' choosing, you're guaranteed to find domain name abuse at the heart of the operation. DNS provides the critical flexibility and underlying scalability of modern command-and-control (C&C) infrastructure. Cyber-criminals that master DNS (and manage to maintain the stream of new domain registrations that keep it fed) tend to find themselves in command of the largest and most profitable crimeware networks. more

More than 85% of Top 500 Most Highly-Trafficked Websites Vulnerable

Over the last 5 years, hacktivists have continued the practice of redirecting well-known domain names to politically motivated websites utilizing tactics such as SQL injection attacks and social engineering schemes to gain access to domain management accounts -- and that, in and of itself, is not surprising. But what IS surprising is the fact that less than 15% of the 500 most highly trafficked domains in the world are utilizing Registry Locking. more

Brand Impersonation Online is a Multidimensional Cybersecurity Threat

Brand impersonation happens much more often than people realize. In CSC's latest Domain Security Report, we found that 75% of domains for the Global 2000 that contained more than six characters from the brand names were not actually owned by the brands themselves. The intent of these fake domain registrations is to leverage the trust placed on the targeted brands to launch phishing attacks, other forms of digital brand abuse, or IP infringement... more

If It Walks Like A Duck And Quacks Like A Duck It’s Probably A…?

It is time to revisit the old question regarding whether or not a domain name is actually 'property' and what this means to domain name registrants, registrations, ISPs and ICANN itself. What type of rights does a domain name confer? What responsibilities will the act of registering domain names suddenly bestow? more

Rise in Cybercrime Exploiting Artificial Intelligence Hype Leads to Growing Threats Within the .ai Domain Space

Cybercriminals are leveraging the growing popularity of artificial intelligence to perpetrate attacks, capitalizing on the surge in interest following the release of chatbot technologies like ChatGPT. New research by Netcraft reports on the increasing use of .ai domain names where criminals use malicious websites around AI to draw in victims. more

Are We Attending the Right ICANN Meeting?

I have no idea who wrote that wonderful piece, Time for Reformation of the Internet, posted by Susan Crawford. (It wasn't me - I never use the word "netizen".) Elliot Noss of Tucows wrote a partial rebuttal, I must be attending the wrong ICANN meetings. Elliot's company, Tucows, has been a leader in registrar innovation and competition. And Tucows has constantly been among the most imaginative, progressive, responsible, and socially engaged companies engaged in these debates. ...But the points made by Time for Reformation of the Internet go far beyond registries and registrars. more

Bob Marley’s “WAILERS” Win Cybersquatting Lawsuit

Bob Marley's Wailers, who eventually became known simply as the "Wailers" after Bob Marley's death, successfully argued for dismissal of this cybersquatting and trademark infringement lawsuit brought by band members of another Wailers musical group who started using the band name 10 years before Bob Marley named his group in 1969... more

EFF Warns ICANN Not to Engage in Censorship, Says It Should Stick to Technical Role

A series of articles published by EFF, coinciding with ICANN's 60th meeting in Abu Dhabi this week, Jeremy Malcolm warns that domain name registrars, registries and ICANN can become "free speech week leaks" for online censorship. more

Industry Updates

A New DNS Validation Method for Simplified Certificate Automation

WhoisXML API Launches First Watch Malicious Domains Data Feed with 97% Predictive Precision

Four Steps to Mitigate Subdomain Hijacking

CSC Partners with NetDiligence to Help Mitigate Cyber Risks and Support the Cyber Insurance Ecosystem

WhoisXML API Newly Registered Domains V2 (NRD2) Achieved Massive Coverage Growth

Domain Blocking: The Future of Brand Protection

Does Your Supplier’s Domain Oversight Impact You?

What’s Your .AI Domain Strategy?

New CSC Research Indicates Launch of Threads by Instagram is Already a Growing Target for Fraud and Brand Abuse

MOVEit Bug-CLOP Ransomware Threat Vector Identification Aided by DNS Intelligence

CSC Launches Groundbreaking Domaincasting Digital Blocking Network

New Global Initiative Aims to Strengthen Online Brand Protection

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

Uncovering Other DarkTortilla Threat Vectors

Supply Chain Security: A Closer Look at the IconBurst and Material Tailwind Attacks