Domain Management

Domain Management / Most Viewed

Criminal Checks Needed for Domain Name Tasting, Kiting, Spying

International organisations should step in to prevent the "tasting," "kiting" and "spying" related to Internet domain names, say representatives from the US telecommunications and trademark industries. These new activities are dramatically altering online commerce and impacting legitimate businesses, and the United States Federal Trade Commission (FTC), World Intellectual Property Organization (WIPO) and the Internet Corporation for Assigned Names and Numbers (ICANN) should take action, they say. The US Anti-Cybersquatting Consumer Protection Act (ACPA) had too many loopholes given the actual trends in the domain name secondary market, said Sarah Deutsch, vice president and associate general counsel for Verizon, and Marilyn Cade, former AT&T lobbyist and now consultant on Internet and technology issues... more

So, You Claim to Have an Unregistered Mark! Is there Cybersquatting?

Complainants have standing to proceed with a claim of cybersquatting under the Uniform Domain Name Dispute Resolution Policy (UDRP) if the accused "domain name is identical or confusingly similar to a trademark or service mark in which the complainant has rights" (4(a)(i) of the Policy). Quickly within the first full year of the Policy's implementation (2000) Panels construed "rights" to include unregistered as well as registered marks, a construction swiftly adopted by consensus. more

Undesirable Consequences of Empirical Studies on Cybersquatting

Empirical studies on cyber- and typosquatting (for example, Moore and Edelman's "Measuring the Perpetrators and Funds of Typosquatting") may inadvertently encourage bad behavior. People tend to do what most other people are doing, even when the given act is presented to them as something wrong. more

Satisfying the Evidentiary Demands of the UDRP

It continues to surprise that some counsel in proceedings under the Uniform Domain Dispute Resolution Policy (UDRP) are unaware or oblivious of its evidentiary demands, by which I mean they file and certify complaints with insufficient evidence either of their clients' rights or their claims. Because the UDRP requires conjunctive proof of bad faith registration and bad faith use (as opposed to the disjunctive model of the Anticybersquatting Consumer Protection Act), it should be ingrained for counsel experienced in the jurisprudence to know they cannot hope to succeed with marks postdating registration of domain names. more

What It Takes to Prove Common Law Rights in UDRP Complaints

The Uniform Domain Name Dispute Resolution Policy now has seventeen years of history. A high percentage of disputes are indefensible and generally undefended. As the history lengthens, early registrants of dictionary word-, common phrase-, and arbitrary letter-domain names have been increasing challenged in two circumstances, namely by businesses who claim to have used the unregistered terms before respondents registered them and later by emerging businesses with no history prior to the registrations of the domain names. more

Defendant iREIT’s Answer in the Verizon Case

Defendant iREIT filed its answer on May 25, 2007, to the recent complaint by Verizon alleging cybersquatting. As in the prior article, these are the public court documents and nothing has been proven by either side in a court of law. more

SOPA Could Shutter Registrars and other Domain Name Industry Intermediaries

The Internet Commerce Association has just sent a letter to senior members of the House Judiciary Committee regarding the likely unintended but potentially devastating impact of H.R. 3261 ("SOPA") as introduced upon ICANN-accredited registrars and other participants in the broad domain name industry, as well as upon the domain registrants who use those services. more

End of Cybersquatting? The gTLD Advantage

On the other hand, major dot brand generic Top-Level Domains (gTLDs) are for internal and controlled sub registrations, they would not be open to first come public offerings and therefore it makes no sense for IBM to plan advance purchase of ibm.canon, as Canon, owner of their own gTLD dot canon, unless mutually agreed between two brands, would have no incentive to sell such a registration to a cyber squatter or to anyone else for that matter. more

Thoughts from ICANN’s Global Domains Division Summit in Vancouver

Last week, several hundred commercial parties involved in the ICANN ecosystem gathered in Vancouver for their annual Global Domains Division (GDD) meeting. Over 600 individuals took part in the meeting which brought together representatives from ICANN's contracted parties. This meeting differs from traditional ICANN meetings as no policy work takes place and discussions are more focused on commercial and operational matters. more

Vulcan Golf v. Google Class Certification Denied

This is a complex lawsuit by trademark owners attacking domaining and the role of the Google AdSense for Domains program in funding domaining activity. When I first blogged on the case in 2007, I wrote: "the lawsuit could effectively fall apart if the judge rejects formation of a class. Trademark class action lawsuits are rare for good reason..." Last week, the court ruled on class certification, and perhaps not surprisingly, the court denied certification -- giving Google and the other defendants an early Christmas gift. more

Wildcarding Subdomains Is OK; Reverse Domain Name Hijacking Isn’t - Goforit v. Digimedia

This is a super-interesting dispute involving two not-so-interesting litigants. The plaintiff Goforit runs a type of meta-search engine at goforit.com. After spending 5 minutes at the site, I couldn't identify a single reason why anyone would want to use it. Also inexplicably, Goforit appears to be quite pleased with its trademark rights in "Goforit," a term that seems more like an exhortation than a trademark. more

An Investigative Analysis of the Silent Librarian IoCs

The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. more

The Rise of a Secondary Market for Domain Names (Part 3/4): Domain Names as Virtual Real Estate

The way the Internet operates drove a wedge between strings of lexical and numeric characters used as marks and alphanumeric strings used as addresses. Domain names were described by Steve Forbes in a 2007 press release as virtual real estate. It is, he said, analogous to the market in real property: "Internet traffic and domains are the prime real estate of the 21st century." more

Leveraging Traffic Statistics to Manage Corporate Domain Portfolios

Corporate domain name portfolios often consist of domain names that do not resolve to relevant content. In fact, it's not uncommon for less than half of corporate domains to point to live content. Sure there are domains such as those that point to "sucks" sites or those registered anonymously for future use that purposely do not resolve, but those are the exception to the rule. more

Will ICANN Drop Its Biggest Revolutionary New Idea? Five Reasons

ICANN, the Internet Authority is up against the wall, and here are the top five reasons for which it may simply drop its greatest revolutionary idea of offering a brand new type of a designer domain name to fit the next generation of widely expanded Internet and cyber realities of tomorrow. This new proposed platform will surely revolutionize the marketing and branding for big and small businesses around the world, offering highly affordable tools for global reach than ever before but the strong opposition would like to kill this idea. more

Industry Updates

A New DNS Validation Method for Simplified Certificate Automation

WhoisXML API Launches First Watch Malicious Domains Data Feed with 97% Predictive Precision

Four Steps to Mitigate Subdomain Hijacking

CSC Partners with NetDiligence to Help Mitigate Cyber Risks and Support the Cyber Insurance Ecosystem

WhoisXML API Newly Registered Domains V2 (NRD2) Achieved Massive Coverage Growth

Domain Blocking: The Future of Brand Protection

Does Your Supplier’s Domain Oversight Impact You?

What’s Your .AI Domain Strategy?

New CSC Research Indicates Launch of Threads by Instagram is Already a Growing Target for Fraud and Brand Abuse

MOVEit Bug-CLOP Ransomware Threat Vector Identification Aided by DNS Intelligence

CSC Launches Groundbreaking Domaincasting Digital Blocking Network

New Global Initiative Aims to Strengthen Online Brand Protection

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

Uncovering Other DarkTortilla Threat Vectors

Supply Chain Security: A Closer Look at the IconBurst and Material Tailwind Attacks