Brand Protection

Sponsored
by

Noteworthy

Brand Protection / Most Commented

Nation Scale Internet Filtering — Do's and Don'ts

If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more

Multi-Stakeholder Debate at the IGF: Lessons from a Safari

Here at the IGF in Kenya, we're debating how governments, private sector, and civil society can improve the multi-stakeholder model that's helped the Internet become such a vital part of life around the world. Makes me think of another kind of multi-stakeholder model I saw last week on a photo safari in Kenya's Masai Mara National Reserve. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more

Regulating and Not Regulating the Internet

There is increasingly heated rhetoric in DC over whether or not the government should begin to "regulate the internet." Such language is neither accurate nor new. This language implies that the government does not currently involve itself in governing the internet -- an implication which is clearly untrue given a myriad of laws like CFAA, ECPA, DMCA, and CALEA (not to mention existing regulation of consumer phone lines used for dialup and "special access" lines used for high speed interconnection). more

CIRA Creates Backdoor WHOIS Exceptions for Police and IP Owners

Earlier this year, I wrote glowingly about the new CIRA whois policy, which took effect today and which I described as striking the right balance between access and privacy. The policy was to have provided new privacy protection to individual registrants - hundreds of thousands of Canadians - by removing the public disclosure of their personal contact information... Apparently I spoke too soon. more

A Brief Look at the Domain Attack Surface of Streaming Media Companies

The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. more

Should Domain Names be Considered 'Contracts for Service' or 'Property Rights'?

The legal status of domain names is one of the most hotly debated topics with regards to evolving property rights and how they should be applied to technological and intellectual property 'innovations' in cyberspace. At present, there are two opposing factions on this topic: On one hand, there are those who maintain that domain names should be considered as contracts for services, which originate from the contractual agreement between the registrant and the registrar. more

Thoughts on the Proposed Copyright Alternative Dispute Resolution Policy

A proposal from the Domain Name Association (DNA) would provide copyright owners with a new tool to fight online infringement -- but the idea is, like other efforts to protect intellectual property rights on the Internet, proving controversial. The proposed Copyright Alternative Dispute Resolution Policy is one of four parts of the DNA's "Healthy Domains Initiative" (HDI). more

ISPs to Enforce Copyright Law

A group of major ISPs and major content providers have agreed on a a mechanism to enforce copyright laws in the network. While full details have not yet been released, the basic scheme involves using previously designed IP flags to denote public domain content. That is, given general copyright principles, it is on average a shorter code path and hence more efficient to set the flag on exempt material. more

ICANN Senate Hearing: The Battle Between Intellectual Property and Multistakeholderism

The US Senate Committee on Commerce, Science and Transportation Hearing on ICANN's Expansion of Top Level Domain Names on December 8, 2001 was all about strategy. The strategy was simple: while the world has its attention turned to the debate on the copyright legislative proposals of the Stop Online Piracy Act (SOPA) and the PROTECT IP Act, let's have another ICANN hearing and try to re-open trademark protection for new gTLDs. more

Implications of ICANN's New TLD Disqualification Policies and Cybersquatting 3-Strike Law

ICANN's proposed final applicant guidebook unraveled some new policies that would disqualify applicants from the new TLD program. ICANN states that if you lose 3 UDRP cases, you will be disqualified from being a major shareholder, partner, officer, director of a new top-level domain registry... Has ICANN opened a new can of worms with the 3-strike rule? more

TLD Rights Protection Mechanisms

Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more

Revision3 and Media Defender

Lots of coverage in the last two days about a Memorial Day weekend attack that took down the servers of Revision3, an Internet video network. This story has a lot of ingredients -- P2P maneuvering, DDoS attack, copyright vs. piracy, talk of laws broken and the FBI investigating.  more

Criticism of Trademark Owner Deemed Legitimate Interest under ICANN UDRP

BioCryst Pharmaceuticals, Inc., of Birmingham, Alabama, challenged registration of domain name www.biocrystpharmaceuticals.com. Respondent used domain name to criticize the Complainant's business (BioCryst Pharmaceuticals, Inc. v. Kumar Patel, Case No. D2005-0674). Panelist Daniel Gervais denied relief, stating... more

What Are the Connected Assets of Confirmed Fake FBI Domains?

Two months ago, the Federal Bureau of Investigation (FBI) alerted the public to a list of domains that could easily be mistaken to be part of its network. The list of artifacts contained a total of 92 domain names, 78 of which led to potentially malicious websites, while the remaining 14 have yet to be activated or are no longer active as of 23 November 2020. more

Industry Updates

A List of Potential Attack Artifacts for the Top 3 Phished Brands in 2020

Why Protecting Your Brand from Online Fraud is More Important Than Ever

SolarWinds Cyber Intel Analysis Part 2: A Look at Additional CISA-Published IoCs

Brand Abuse is Systemic: The Role of Networks in Brand Abuse

Boosting Domain Protection Strategies with Typosquatting Domain Intelligence

Appdetex Accelerates Growth With $12.2 Million Financing Led by Baird Capital

Post-Riot Domain Registration Trends: Findings From Tracking Trump-Related Domains and Subdomains

The New .AU Domain Licensing Rules and Their Impact

Cyber Threat Intel Analysis and Expansion of SolarWinds Identified IoCs

All Roads Lead to… Domains: Why the Humble Domain Name is the Foundation of Your Online Security

Enriching Intrusion Detection and Prevention Systems with IP and Domain Intelligence

Attack Surface Discovery: A Review of FINRA-lookalike Domain and Linked IoCs

MarkMonitor Releases New gTLD Quarterly Report for Q4 2020

Mobile, Social, and Recommerce: The Top eCommerce Trends from 2020

How Much of a Fortune 500 Company's Digital Footprint Can Be Publicly Attributed to It?