Domain Management

Domain Management / Recently Commented

The Highest Threat TLDs - Part 1

A domain name consists of two main elements: the second-level domain name to the left of the dot - often consisting of a brand name or relevant keywords - and the domain extension or top-level domain (TLD) to the right of the dot. Domain names form the key elements of the readable web addresses allowing users to access pages on the internet and also allowing the construction of email addresses. more

The World of the Subdomain

A web domain name is the foundational piece of internet property allowing its owner (registrant) to construct and host an associated website. On a domain, the owner is also able to construct whatever subdomains they wish -- a process that is technically achieved via the configuration of records on the authoritative domain name system (DNS) server. more

Multistakeholderism Is Working: A Short Series of Articles

I was in a conversation with a close friend the other day, you know the kind where you have been friends for so long that you have endured each other experimenting with changed politics, evolving religion, and if you are unlucky, flirtations with multilevel marketing. We were discussing politics that day, which is not unusual given our ancient friendship and the recent change at the helm of the United States. more

Now We Know Why It’s Hard to Get a .COM

As executive director of CALinnovates, an organization that advocates for innovation and startups, as well as a new business owner myself, I know how important a .COM domain name can be to a new company's online presence and marketing strategy. That's why I read with interest a new Boston Consulting Group report on how the .COM market is changing. I have a much better understanding of why new businesses find it hard to get relevant .COM domain names. more

Cast Your .vote for the Most Interesting New gTLD Development in Q4

2020 has been extremely eventful, so it follows that the domain industry has continued to experience perpetual change, progress and uncertainty in the last three months of the year. In our Q4 New gTLD Quarterly Report, MarkMonitor experts analyze topical registration activity, launch information, .brand growth and DNS abuse, and share a list of upcoming industry meetings for 2021. more

A Brief Look at the Domain Attack Surface of Streaming Media Companies

The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. more

Innovation, Launches and Email: New gTLDs Deliver in Q3 2020

As the third quarter of 2020 winds down, the domain industry continues to show development and progression amid uncertain global economic conditions. From improvements in products and additional TLD launches to growth in .brand email usage and upcoming virtual meetings, the Q3 2020: New gTLD Quarterly Report from our MarkMonitor team has a little something for everyone. more

Only Bad Actors Should Worry About the URS

With DNS abuse a topic of increased concern throughout the community, any controversy over adopting the Uniform Rapid Suspension System (URS) for all generic top-level domains (gTLDs) seems misplaced. The URS was designed as a narrow supplement to the Uniform Domain-Name Dispute Resolution Policy (UDRP), applicable only in certain tightly defined circumstances of clear-cut and incontrovertible trademark infringement involving the registration and use of a domain name. more

Uniform Rapid Suspension Not Appropriate for .com Domain Names

The Internet Commerce Association has been actively involved for the last four years on the ICANN Working Group reviewing the Uniform Rapid Suspension (URS) policy and the Uniform Domain Name Dispute Resolution Policy (UDRP). The Working Group is currently wrapping up its review of the URS. The UDRP will be reviewed in an upcoming second phase. more

What Trademark Owners Need to Know to Avoid Reverse Domain Name Hijacking

A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more

The State of DNS Abuse: Moving Backward, Not Forward

ICANN's founding promise and mandate are optimistic -- ensure a stable and secure internet that benefits the internet community as a whole. Recent months, however, have highlighted the uncomfortable truth that ICANN's and the industry's approach to DNS abuse is actually moving backward, ignoring growing problems, abdicating on important policy issues, and making excuses for not acting. Further, the impending failure of ICANN's new WHOIS policy to address cybersecurity concerns will add fuel to the fire, resulting in accelerating DNS abuse that harms internet users across the globe. more

Beware of Abandoned Domain Names in this Turbulent Time and as the Global Economy Changes

The outbreak of COVID-19 has caused worldwide disruption -- for whole nations and their economies. Unfortunately, there will be some side effects for businesses. A number of brands will disappear from the streets and shelves, as businesses that fail to weather the storm will have to fold. Companies that do survive will likely focus more on their core markets, pulling brands out of higher risk, less profitable markets... more

Article 22 of the GDPR Should Not Preclude Contemplated Automation

There is an ongoing disagreement among various members and groups in the ICANN community regarding automation -- namely, whether and to what extent automation can be used to disclose registrant data in response to legitimate data disclosure requests. A major contributing factor to the complications around automation has been confusion about how to interpret and apply Article 22 of the GDPR. more

Your Domain Name Does Matter in Search Results – Microsoft Says So!

I stumbled upon a study conducted by Microsoft eons ago back in the paleolithic era of search; 2012... It is about how "premium domains" are perceived by the consumer when seeing them in the search results compared to a lower value "non-premium" domain. I like to use quotations sparingly, but I felt it was necessary because the varying opinions on premium v non-premium domains is a bridge I do not want to cross in this post.  more

Thumb on the Scales

Does the ICANN Board putting its thumb on the scale, change the status quo assumption of a Policy Development Process (PDP)? The primary assumption of most PDPs is that, in the absence of consensus for change, the status quo remains. Otherwise, Policy would be made by fiat by the PDP's Chair or Co-Chairs and there would be a mad rush to occupy those unpaid, thankless positions. more

Industry Updates

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

Uncovering Other DarkTortilla Threat Vectors

Supply Chain Security: A Closer Look at the IconBurst and Material Tailwind Attacks

RedLine Stealer: IoC Analysis and Expansion

Robin Banks May Be Robbing You Blind

Investment-Related Cybersquatting: Another Way to Lose Money?

The Business of Cybercrime: Does Malicious Campaign Planning Take as Long as Legitimate Marketing Campaign Planning?

2022 CSC Domain Security Report Finds Nearly Three-Quarters of Global 2000 Companies are at Alarmingly High Risk of Exposure to Security Threats

Dormant Colors IoC Expansion: Don’t Install Browser Extensions from These Domains

A Call for Help May Lead to Malware: BazarCall IoC Analysis and Expansion

Insights Into an Active Spam Domain Portfolio

Where Domain Security Meets the Supply Chain Crunch

Should Cracks and Keygens Remain a Cybersecurity Concern?

Is Your Software a Top Impersonation Target?

DIY Web Attacks Might Still Live on via WebAttacker