Cybersquatting

Cybersquatting / Featured Blogs

A Bad Year for Phishing

Here at the Anti-Phishing Working Group meeting in Hong Kong, we've just released the latest APWG Global Phishing Survey. Produced by myself and my research partner Rod Rasmussen of Internet Identity, it's an in-depth look at the global phishing problem in the second half of 2013. Overall, the picture isn't pretty. There were at least 115,565 unique phishing attacks worldwide during the period. This is one of the highest semi-annual totals we've observed since we began our studies in 2007. more»

ICANN's Uniform Rapid Suspension: The Good, the Bad and the Ugly

With so many new gTLDs moving into their respective general availability periods, and incidents of cybersquatting beginning to appear, many companies are now looking towards the URS (Uniform Rapid Suspension) as a possible solution for quickly remediating abuse. As a reminder, domains that are the subject of a successful URS ruling are suspended for the remainder of the registration term, or can be renewed for an additional year at the current registrar. more»

Court Says gTLDs Aren't 'Domain Names' for Cybersquatting Purposes, Declines LRO Review of .delmonte

A Swiss Del Monte entity that had a license to use the "DEL MONTE" mark applies to operate the .delmonte generic top level domain (gTLD). Another Del Monte entity, based in Delaware, filed a "legal rights objection" (LRO) - under WIPO-established procedures - to the Swiss Del Monte's application. A three member panel sustained the Delaware company's LRO... The Swiss entity sued in federal court seeking a declaration that it had sufficient rights in the "DEL MONTE" mark to operate the TLD... more»

ICANN Opens GNSO Whois Study on Privacy/Proxy Abuse for Comment

ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more»

ICANN and Your Internet Abuse

In spite of the material we were presented with in Durban something has gone very wrong inside of ICANN Compliance. KnujOn has published a report which demonstrates that ICANN Compliance appears to completely collapse between September 2012 and December 2012. Following December 2012, ICANN seems to stop responding to or processing any complaints. It is around this time certain compliance employees start disappearing. This was not limited to the Sydney office as some would have us believe... more»

Wow. That's a Lot of Reserved Names

ICANN recently updated the list of reserved second level domain names. Those are names that you won't be able to register in any of the 1500 or so new domains they're planning to add. There's rather a lot of them, currently 629. The names are in three groups, the ICRC (the Red Cross), the IOC (the Olympic games) and everyone else. Several years ago the Red Cross and later the Olympics came to ICANN and insisted that they make a special list of forbidden names, separate from the various trademark registries. more»

More than 85% of Top 500 Most Highly-Trafficked Websites Vulnerable

Over the last 5 years, hacktivists have continued the practice of redirecting well-known domain names to politically motivated websites utilizing tactics such as SQL injection attacks and social engineering schemes to gain access to domain management accounts -- and that, in and of itself, is not surprising. But what IS surprising is the fact that less than 15% of the 500 most highly trafficked domains in the world are utilizing Registry Locking. more»

How Registrants Can Reduce the Threat of Domain Hijacking

Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more»

Why Trademark Owners Should Think Twice Before Reclaiming Domains

A recent kerfuffle around Italian chocolate and confectionery producer Ferrero SpA and fan Sara Rosso is the latest example of how important it is for companies to consider carefully the domain and user names they decided to reclaim. Sometimes, enforcing trademark rights online can go really wrong, really quickly. In 2007, Ms. Rosso chose February 5 to be "World Nutella Day" - a time when "Nutella Lovers Unite for One Day!" She built a web presence around Nutella Day that included a nutelladay.com website. more»

BlackBerry Z10: New Products and Old Domains Don't Mix

Type www.z10.com into your browser and you'll arrive at an Amazon page on which "Global Mobiles" sells unlocked BlackBerry Z10 phones. What? Did you expect to be directed to a BlackBerry (formerly Research In Motion) site just because the Z10 has been touted as the phone that will help make or break the struggling company? What happened? A savvy domain speculator realized that his or her domain name had become a hot commodity... more»