SlideShare a Scribd company logo
1 of 2
Download to read offline
A Look at Cybersquatting and the Need for Brand Protection
Like any medium, the Internet has its share of benefits and risks for companies engaging in commerce online. On
one hand it offers a myriad of opportunities for companies and organizations to market their brands effectively
and successfully, like social networking, auction sites, email, blogs, to name a few. On the other hand, it throws
open a world of possibilities for criminals to misuse it for personal gains. The most common methods employed
by criminals to take advantage of companies’ hard earned brand reputations and brand equity include piracy,
phishing, cybersquatting, malware, domain kiting, search engine manipulation, traffic diversion, false association,
pay per click scams, framing, parody sites, negative newsgroup postings, counterfeit, gripe sites and others. Of
the above-mentioned techniques, cybersquatting is the most widely used tactic employed by cyber criminals to
deceive companies and online users alike.

What Is Cybersquatting?
Cybersquatting, or domain squatting, is defined as “registering, trafficking in, or using a domain name with bad-
faith intent to profit from the goodwill of a trademark belonging to someone else.” Cybersquatters employ
different tactics to swindle money from business owners and entrepreneurs. Their most common tactic is to
register a domain name similar to a popular brand and then put up offensive content about the company or the
person thereby forcing them to buy the domain from them. The following are some of the techniques employed
by cybersquatters:

        Renewal Snatching
        Domain name registrations last only for a small period of time. Therefore, domain name owners need to
        reregister before the expiry date otherwise it can be purchased by anybody. Often owners forget to
        reregister their domain names, and this failure is put to good use by cybersquatters. They purchase
        domain names as soon as they become available and then sell them back to the owner at an exaggerated
        price.

        Name Jacking
        Another tactic is registering a domain name after the name of an individual who is running a successful
        business. If those interested in doing business with that particular person do research on that person on
        the Internet, they would be directed to the name jacked site. Name jacking is used typically to sell
        products that need few purchases to be profitable.

        Typosquatting
        Also referred to as URL hijacking, this scheme takes advantage of the typos made by internet users when
        entering URLs. Cybersquatters register variants of a trademark, and, when a user accidentally enters a
        wrong address they are taken to the website owned by a cybersquatter.



How Does Cybersquatting Affect Business?
Most business owners and entrepreneurs are unaware of the serious effects of cybersquatting on their businesses.
Through cybersquatting, customers are directed to competitors’ sites instead of the true site, which results in loss
of revenue for the company. Sometimes customers are taken to sites selling counterfeited products thus causing
irrevocable damage to their products’ brand value.
Cybersquatting is a real threat to companies, and therefore it is important that enterprises and organizations put
in place effective measures for brand protection, one of which is brand protection software. Brand protection
solutions can help companies closely monitor the online world for any illegal activities and can enable companies
to take action before they can cause any real damage to their businesses.

More Related Content

Viewers also liked (8)

Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 

More from NEW Momentum

The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputation
NEW Momentum
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309
NEW Momentum
 

More from NEW Momentum (16)

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market Activity
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market Strategy
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brands
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales today
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputation
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud Protection
 
Brand Protection
Brand Protection Brand Protection
Brand Protection
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business case
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its Effect
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market sales
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - Overview
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

A Look at Cybersquatting and the Need for Brand Protection

  • 1. A Look at Cybersquatting and the Need for Brand Protection Like any medium, the Internet has its share of benefits and risks for companies engaging in commerce online. On one hand it offers a myriad of opportunities for companies and organizations to market their brands effectively and successfully, like social networking, auction sites, email, blogs, to name a few. On the other hand, it throws open a world of possibilities for criminals to misuse it for personal gains. The most common methods employed by criminals to take advantage of companies’ hard earned brand reputations and brand equity include piracy, phishing, cybersquatting, malware, domain kiting, search engine manipulation, traffic diversion, false association, pay per click scams, framing, parody sites, negative newsgroup postings, counterfeit, gripe sites and others. Of the above-mentioned techniques, cybersquatting is the most widely used tactic employed by cyber criminals to deceive companies and online users alike. What Is Cybersquatting? Cybersquatting, or domain squatting, is defined as “registering, trafficking in, or using a domain name with bad- faith intent to profit from the goodwill of a trademark belonging to someone else.” Cybersquatters employ different tactics to swindle money from business owners and entrepreneurs. Their most common tactic is to register a domain name similar to a popular brand and then put up offensive content about the company or the person thereby forcing them to buy the domain from them. The following are some of the techniques employed by cybersquatters: Renewal Snatching Domain name registrations last only for a small period of time. Therefore, domain name owners need to reregister before the expiry date otherwise it can be purchased by anybody. Often owners forget to reregister their domain names, and this failure is put to good use by cybersquatters. They purchase domain names as soon as they become available and then sell them back to the owner at an exaggerated price. Name Jacking Another tactic is registering a domain name after the name of an individual who is running a successful business. If those interested in doing business with that particular person do research on that person on the Internet, they would be directed to the name jacked site. Name jacking is used typically to sell products that need few purchases to be profitable. Typosquatting Also referred to as URL hijacking, this scheme takes advantage of the typos made by internet users when entering URLs. Cybersquatters register variants of a trademark, and, when a user accidentally enters a wrong address they are taken to the website owned by a cybersquatter. How Does Cybersquatting Affect Business? Most business owners and entrepreneurs are unaware of the serious effects of cybersquatting on their businesses. Through cybersquatting, customers are directed to competitors’ sites instead of the true site, which results in loss of revenue for the company. Sometimes customers are taken to sites selling counterfeited products thus causing irrevocable damage to their products’ brand value.
  • 2. Cybersquatting is a real threat to companies, and therefore it is important that enterprises and organizations put in place effective measures for brand protection, one of which is brand protection software. Brand protection solutions can help companies closely monitor the online world for any illegal activities and can enable companies to take action before they can cause any real damage to their businesses.