Last week, more than 1,700 individuals from around the globe attended the first ICANN meeting of the year, hosted in Kobe, Japan. Members of our Domain, Sales, Marketing and GRM teams actively participated in the ICANN policy development and informat...ional working sessions and held important meetings with valued Japanese clients and business partners.
As has been the case for the last year, the most important discussions at ICANN last week involved the work of the Expedited Policy Development Process (EPDP) and the working group tasked with developing a new policy for the collection, storage, transfer, and display of registrant data, commonly...Read More
Last October, we posted an article describing the impacts of redacted registration data (“WHOIS”) on its domain name protection, anti-counterfeit, anti-piracy, and anti-fraud services.
As explained in that post, MarkMonitor uses WHOIS data for severa...l legitimate purposes, including investigating infringing domain names, identifying the source of phishing attacks, and issuing cease & desist letters to cybercriminals, counterfeiters, and infringers. When GDPR became effective, ICANN issued a Temporary Specification for the collection, storage and display of registration data and, since that time, MarkMonitor has been working with registrars and registries to obtain WHOIS data needed to stop infringement and other forms of...Read More
Most of us look at our payslips and bemoan the amount the government takes from our wages, but we also understand that the money helps fund public services.
So imagine receiving an email from a government tax collector informing you that you’re entit...led to a tax refund – or that you haven’t paid enough and need to do so immediately to avoid legal action. Either will likely elicit a dramatic response, and you might not stop to think before replying.
Fraudsters can use predictable responses to their advantage in phishing scams that hack personal and payment information. As the UK deadline...Read More
How effectively are you protecting your organization from brand misuse and consumer-targeted phishing attacks?
Brand owners can find out the answers to this question and more during the annual RSA Conference, as experts divulge the details on what ma...kes for the most impactful online strategies. Among the highlights, we’ll look at dual programs that combine both brand and fraud protection into a hybrid approach.
Brand infringements are defined as unauthorized uses of intellectual property that divert traffic with impersonation or false affiliation. This includes false association, non-phishing brand impersonation, cybersquatting, brand and logo confusion, partner compliance, and keyword hijacking. Fraud, on...Read More
From cryptocurrency schemes to counterfeit ploys, there’s no slowdown in sight for cybercrime.
Asia-based threats continue to surge. Counterfeit goods from China and Hong Kong combine to make up an estimated 86 percent of the world’s counterfeits, th...e value of which totals nearly $400 billion. A 2018 Internet Security Threat Report (ISTR), released by Symantec, indicates that IoT attacks saw a 600 percent increase in 2017, while coin-mining activity spiked 34,000 percent.
Watch these trends in the year ahead, and we’ll keep you up to speed as 2019 unfolds with whitepapers, webinars and events.
Keep your eye on the crypto-sphere