More than four months have passed since the General Data Protection Regulation (GDPR) became effective, resulting in many domain name registries and registrars moving to redact registrant information from their public WHOIS records (including informa...tion related to legal entities and persons not located in the European Economic Area; redactions that are beyond the scope of the privacy regulation).
Historically, domain name registrant information in WHOIS has been used by cybersecurity experts, brand protection service providers, law enforcement, intellectual property owners, and child protection advocates to identify, contact, and prosecute individuals who propagate websites that sell counterfeit goods and pirated movies, TV...Read More
Jane Sunderland, of Sunderlaw Strategies, Inc., never imagined that studying biological evolution would someday lead her down a road to data analysis in online protection.
But she joined the MarkMonitor Forum as a speaker on that very topic last week.... Juxtaposing it with the an ever-developing intellectual property industry, she explained:
“It’s about figuring out what the data has to say about trends,” she said. “There have been a lot of changes.”
Among those changes – the fact that online protection challenges now span more business departments and industries than ever. In fact, a MarkMonitor report, slated for release this October,...Read More
Once upon a time, a phishing email would nearly always impersonate a financial organization, would be poorly written and easily recognizable.
Today, there are many ways that phishers can target organizations, employees and consumers – and multiple av...enues that they take to do so. As society becomes increasingly dependent on online processes, phishers become more innovative in capitalizing on those practices.
Case in point? Cryptophishing, a new form of online phishing that has surfaced with the advent of cryptocurrency in online financial practices. We’ll delve into this, but first, let’s review some background on cryptocurrency.
What Is cryptocurrency?
As of this...Read More
There’s no question that intellectual property is at stake online. The question is how it’s being compromised.
Infringements, malware, phishing – one thing these threats have in common is that they leverage your brand equity. To defend yourself again...st this shapeshifter, you’ll need to understand your attacker’s intent – are they out to siphon your money, or your traffic?
Is it the brand they’re after?
Brand reputation can be influenced by many factors. The inevitable exposure that comes with doing business online heightens the risk to both an organization’s reputation and to its security. Damage to reputation, lost revenue and increased...Read More
According to the Food and Drug Administration, 97 percent of online pharmacies are illegitimate and unsafe.
Many of these online pharmacies involve highly sophisticated criminal enterprises and sell medicines that don’t work or are harmful to your he...alth. Beyond serious health dangers, many of these illegitimate online pharmacy schemes also utilize malware to steal consumer credentials (such as credit card numbers and identities) – which further heightens the gravity of the situation. What's more, these threats of imposter medical products can also bleed into online reputation and domain management issues.
For pharmaceutical companies, being associated with these types of illegitimate online...Read More