Domain Names |
Sponsored by |
|
Is it really 2022? Is it? Although many might view 2021 as another "lost" year due to the pandemic, filled with Zoom™ meetings, virtual conferences, working from home and restricted travel - there were a number of notable domain name stories which deserve to be highlighted. So, without further ado, here are the top 10 biggest domain name stories of 2021 - let's go! more
Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. Read more for details if you are interested in being considered as a candidate or know of someone who should be considered. more
DOTZON presents the fourth edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how cities successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness" of a company. Purely digital company brands developed for the first time in the 1990s, with the emergence of Internet business models. Some of them were based solely on a generic Internet address, for example, www.hotel.de or www.amazon.com. more
Where outcomes depend on a word’s meaning, the first task is to define it. “Registers” which is one of the keywords in the Anticybersquatting Consumer Protection Act (ACPA), is still in the process of definition. Its statutory context provides that a domain name registrant is liable to the owner of a mark if “it has a bad faith intent to profit from that mark … and (ii) registers, traffics in, or uses a domain name [corresponding to a mark] that … is distinctive at the time of registration of the domain name [and] is identical or confusingly similar to that mark. more
In the 2021 Domain Security Report, we analyzed the trend of domain security adoption with respect to the type of domain registrar used, and found that 57% of Global 2000 organizations use consumer-grade registrars with limited protection against domain and DNS hijacking, distributed denial of service (DDoS), man-in-the-middle attacks (MitM), or DNS cache poisoning. On average, the adoption of domain security controls is two times higher for enterprise-class registrars than for those using consumer-grade registrars. more
Domain brand squatting can be defined as the unauthorized or dishonest use of a brand or company identifiers in domain names. It is often linked to the use of look-alike domains in bad faith, and we see it all the time. The threat actors behind these domains are called different names, though a prevalent one would be “typosquatters.” The Hot on the Trail of Compulsive Brand Squatters webinar showcased how these people are infiltrating the Internet. The first page of PhishTank’s valid phish search alone as of this writing tells us that domain brand squatting is a real and present danger. more
When we look at the intersection of cryptocurrency and domain data, we see something insidious: The prevalence of crypto-related threats. And it's not just cryptojacking. It's not even the use of cryptocurrency which has made ransomware attacks easier for threat actors to commit and all the more widespread. As with nearly every trend, there is always someone looking to capitalize on it and use it for their own, personal gain. Ever since cryptocurrency became the pandemic hobby of choice, threat actors have begun to target crypto novices for their schemes. more
ICANN has once again acceded to the wants of contracted parties and is at risk of abdicating its duty to act in the global public interest when it comes to WHOIS policy. Its inability or unwillingness to date to reign in bad WHOIS policy, driven by contracted party interests, flies in the face of its previously-expressed policy goal “to ensure the continued availability of WHOIS to the greatest extent possible while maintaining the security and stability of the Internet’s system of unique identifiers.” more
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more
CENTR has published the latest edition of its CENTRstats Global TLD report, a quarterly publication that presents statistics and trends in domain name registrations of European country-code domains and the wider global market. more
With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more
Domain names are registered by the thousands every day. In July 2021, 236,336 domains were newly registered daily on average across all top-level domains (TLDs). Tens of thousands were also newly expired. Other months could be just as busy. "Newly registered" and "newly expired." Those are two terms I often get questions about. Newly registered domains are domains that someone just reserved, typically through a registrar or web hosting company. Newly expired domains, meanwhile, are those domains that someone had reserved but decided to let go for one reason or another. more
Not infrequently mark owners in disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) claim that respondents should have been aware that the domain names they registered corresponded to their marks; and from this, urge panelists to draw the inference that the registrations were designed to take advantage of their goodwill and reputation. To test this premise, we need to take a step back for a quick look at UDRP provisions. All it takes to acquire a domain name is to sign a registrar’s registration agreement. more
Domain blocking mechanisms are an important element of an organization's defensive domain strategy. With the introduction of the New Generic Top-Level Domain (gTLD) Program by the Internet Corporation for Assigned Names and Numbers (ICANN) in 2013, brand owners were faced with a new challenge -- protecting their marks without overburdening their budgets. Defensive domain registrations were and still are an effective way in which a brand can protect itself in domain namespaces. more
The global internet, from the perspective of its billions of users, has often been envisioned as a cloud -- a shapeless structure that connects users to applications and to one another, with the internal details left up to the infrastructure operators inside. From the perspective of the infrastructure operators, however, the global internet is a network of networks. It's a complex set of connections among network operators, application platforms, content providers and other parties. more