From cryptocurrency schemes to counterfeit ploys, there’s no slowdown in sight for cybercrime.
Asia-based threats continue to surge. Counterfeit goods from China and Hong Kong combine to make up an estimated 86 percent of the world’s counterfeits, th...e value of which totals nearly $400 billion. A 2018 Internet Security Threat Report (ISTR), released by Symantec, indicates that IoT attacks saw a 600 percent increase in 2017, while coin-mining activity spiked 34,000 percent.
Watch these trends in the year ahead, and we’ll keep you up to speed as 2019 unfolds with whitepapers, webinars and events.
Keep your eye on the crypto-sphere
According to the European Commission, “the General Data Protection Regulation (GDPR) was put into place to ensure one set of data protection rules for all companies operating in the EU, wherever they are based.”
The purpose of this important privacy ...regulation is to ensure that individuals, residing in EU member states, have more control over their personal data and that data collectors take required steps to protect that data.
No one can argue against the benefits of knowing the purpose for why personal data is collected and how it will be used, processed and disposed of; still, six months after the...Read More
We have seen a dramatic rise in online sales in recent years — the Office for National Statistics reports an increase from, 9.7% five years ago, to 18% today, as a percentage of all sales.
This represents a huge opportunity for retailers - but u...nfortunately, they are not the only ones benefiting. Counterfeiters, fraudsters and cyber criminals are cashing in too.
Just as the web can be used to promote, market and sell legitimate brands, it’s also an ideal tool for counterfeiters to sell fake goods. And this is especially true in the gift-giving season, with 91% doing at least some of our...Read More
Imposters can damage your reputation, impede consumer trust and put a dent in your sales numbers.
In today’s omni-channel environment, infringement threats have heightened more than ever. And brand impersonators are not exclusive to certain industrie...s. Historically, businesses selling luxury high value items would be targeted. But this is no longer the case — any brand in any sector can become a target, especially if much of the brand’s value lies in intellectual property. Areas most at risk include toys, medical instruments, perfumes and cosmetics, and electrical machinery and equipment.
We recently carried out research with 600 marketing decision makers, and...Read More
The MarkMonitor team is pleased to provide updates from the recent ICANN meeting in Barcelona, Spain.
This meeting marked the 20-year anniversary of ICANN’s existence and was ICANN’s 20th Annual General Meeting (AGM). The AGM format consists of seven... days of sessions and includes two open community sessions, during which the ICANN board makes itself available for questions and comments from anyone in attendance.
This year’s AGM kicked off with an additional daylong session of the Expedited Policy Development Process (EPDP) team, meeting to work on the state of WHOIS data post-GDPR. The MarkMonitor team was engaged in various sessions for...Read More