From cryptocurrency schemes to counterfeit ploys, there’s no slowdown in sight for cybercrime.
Asia-based threats continue to surge. Counterfeit goods from China and Hong Kong combine to make up an estimated 86 percent of the world’s counterfeits, th...e value of which totals nearly $400 billion. A 2018 Internet Security Threat Report (ISTR), released by Symantec, indicates that IoT attacks saw a 600 percent increase in 2017, while coin-mining activity spiked 34,000 percent.
Watch these trends in the year ahead, and we’ll keep you up to speed as 2019 unfolds with whitepapers, webinars and events.
Keep your eye on the crypto-sphere
As the threat landscape expands, online protection is no longer left solely to a single department. Implementing a strategy now calls for buy-in from top management along with involvement from multiple areas of business.
Advances in the interne...t and the proliferation of social media pose many dangers to your organisation - from counterfeiting and impersonation, to fraud and piracy - impacting consumer trust, your market reputation and your bottom line. Having a plan in place is more important than ever given the rapidly-changing threat landscape and the next generation of online criminals seeking new ways to take advantage of your brand....Read More
More than four months have passed since the General Data Protection Regulation (GDPR) became effective, resulting in many domain name registries and registrars moving to redact registrant information from their public WHOIS records (including informa...tion related to legal entities and persons not located in the European Economic Area; redactions that are beyond the scope of the privacy regulation).
Historically, domain name registrant information in WHOIS has been used by cybersecurity experts, brand protection service providers, law enforcement, intellectual property owners, and child protection advocates to identify, contact, and prosecute individuals who propagate websites that sell counterfeit goods and pirated movies, TV...Read More
With summer ending, and the first days of fall having passed, now is an ideal time to look back at piracy insights from the summer months.
From June 1 through August 31, we monitored more than 420 titles across the popular film and television landsca...pe through our Global Digital Piracy Index (GDPI). As part of our analysis, we looked at overall infringements, which regions accounted for the most piracy and what formats were most popular.
Our proprietary GDPI database generates detailed intelligence on how pirated content is consumed online. This unique form of monitoring creates a factual overview around file sharing...Read More
Jane Sunderland, of Sunderlaw Strategies, Inc., never imagined that studying biological evolution would someday lead her down a road to data analysis in online protection.
But she joined the MarkMonitor Forum as a speaker on that very topic last week.... Juxtaposing it with the an ever-developing intellectual property industry, she explained:
“It’s about figuring out what the data has to say about trends,” she said. “There have been a lot of changes.”
Among those changes – the fact that online protection challenges now span more business departments and industries than ever. In fact, a MarkMonitor report, slated for release this October,...Read More