{"id":2499,"date":"2013-10-24T10:00:09","date_gmt":"2013-10-24T14:00:09","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2499"},"modified":"2017-09-24T18:39:14","modified_gmt":"2017-09-24T14:39:14","slug":"the-threat-of-cybersquatters","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/the-threat-of-cybersquatters\/2499\/","title":{"rendered":"The Threat of Cybersquatters"},"content":{"rendered":"<p>Imagine if in the early days of the Internet boom someone other than Bruce Springsteen himself had purchased the domain brucespringsteen.com. Now imagine that that person used the website to use Bruce Springsteen\u2019s name and image in some way to make money. You actually don\u2019t have to imagine any of that because it really happened. The person who bought that domain was accused of cybersquatting \u2014\u00a0but successfully <a href=\"http:\/\/www.theregister.co.uk\/2001\/02\/09\/bruce_springsteen_loses_cybersquatting_dispute\/\" target=\"_blank\" rel=\"noopener nofollow\">defended their case<\/a> in court, which is presumably why the official Bruce Springsteen website is <a href=\"http:\/\/brucespringsteen.net\/\" target=\"_blank\" rel=\"noopener nofollow\">brucespringsteen.net<\/a>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05113346\/cybersquatters_title_EN.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2501\" alt=\"cybersquatters_title_EN\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05113346\/cybersquatters_title_EN.jpeg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>But that\u2019s the gist of cyberquatting: Snapping up a domain before another person or company does in the interest of leveraging it for profit.<\/p>\n<p>Cybersquatters are, in short, the people who got there first on a given domain name and, by buying it, hold its title. But what separates a cybersquatter from an innocuous domain owner is that they have no intention of using the domain for legitimate purposes.<\/p>\n<div class=\"pullquote\">What separates a cybersquatter from an innocuous domain owner is that they have no intention of using the domain for legitimate purposes.<\/div>\n<p>There are essentially two categories of cybersquatters. First, there are those who buy domains to essentially hold them for ransom, hoping that more legitimate prospective owners will buy be forced to buy them. The pressure to buy such sites can increase if they are used in ways that will embarrass the legitimate owner. Two years ago the governing body of Internet domains released a new field of domains, including .xxx. This promptly set off a flood of cybersquatting and a corresponding wave of legitimate purchases in an attempt to head them off in an effort to avoid <a href=\"http:\/\/www.dailycamera.com\/cu-news\/ci_19588283\" target=\"_blank\" rel=\"noopener nofollow\">what happened<\/a> to the University of Colorado, which was left red faced when colorado.xxx became a porn site, prompting lots of other major universities to <a href=\"http:\/\/www.higheredtechdecisions.com\/article\/the_xxx_factor\" target=\"_blank\" rel=\"noopener nofollow\">buy up .xxx<\/a> domains that could remotely be affiliated with their names to avoid similar fates.<\/p>\n<p>The other kind of cybersquatting revolves around profiting directly from another\u2019s identity by using the names or images of corporations or well-known individuals to essentially mislead consumers into giving them money. Eminem one a landmark suit against a company selling ringtones through eminemmobile.com nearly a decade ago, and Gucci recently won a $144.2 million suit against a group of similar sites that was selling counterfeit merchandise.<\/p>\n<p>The trouble with cybersquatting is that there is a gray area between the legal and illegal, as seen with Bruce Springsteen. In that case it was determined that the owner of the site wasn\u2019t trying to profit off of Springsteen\u2019s name or image, which played a big hand in the determination of that case.<\/p>\n<p>For obvious reasons cybersquatting is a bigger threat to corporations than individual users. But those corporations also have a leg up in winning disputes, which <a href=\"http:\/\/www.icann.org\/en\/help\/dndr\/udrp\" target=\"_blank\" rel=\"noopener nofollow\">are handled<\/a> by the Internet Corporation for Assigned Names and Numbers, because of their trademark rights. Individuals who own their own companies or have their own personal websites should make sure they own any domains affiliated with their names or ones that they may wish to use in the future, and they should also be diligent about renewing those domains before they expire, lest they fall into the wrong hands.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine if in the early days of the Internet boom someone other than Bruce Springsteen himself had purchased the domain brucespringsteen.com. Now imagine that that person used the website to<\/p>\n","protected":false},"author":41,"featured_media":2500,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[461,462],"class_list":{"0":"post-2499","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersquatters","9":"tag-website-domains"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/the-threat-of-cybersquatters\/2499\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/the-threat-of-cybersquatters\/2608\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/the-threat-of-cybersquatters\/2766\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/the-threat-of-cybersquatters\/2598\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-threat-of-cybersquatters\/3008\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/the-threat-of-cybersquatters\/1857\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-threat-of-cybersquatters\/3008\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-threat-of-cybersquatters\/3008\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cybersquatters\/","name":"cybersquatters"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2499"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2499\/revisions"}],"predecessor-version":[{"id":9556,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2499\/revisions\/9556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2500"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}