Government Technology

Personal Computing: Cybersquatting and Its Remedies

September 28, 2009 By

In addition to the tremendous amount of good that it has created, the Internet has also created its fair share of bad, along with those only too eager to cross the line and take unethical or unlawful advantage of others.

One of the more curious examples of Internet misbehavior this year celebrated its ten-year anniversary of being officially recognized. Cybersquatting, the using of a "domain name" for a Web site that rightfully belongs to someone else, was made illegal by the 1999 Anticybersquatting Consumer Protection Act.

A domain name is a Web site's address expressed in an individual and memorable way, typically using words or names, such as "" Companies and other organizations often use their trademarked name in their Web site's domain name.

Cybersquatters register domain names in hope of forcing a company or individual to buy it from them (at a huge profit), to gain online advertising revenue resulting from Web surfers mistakenly going to a fake site instead of a genuine one, and even as a "phishing" tool to trick surfers into revealing credit card and other personal financial information in order to steal from them.

Some of the findings of a new study about cybercrime in general by Symantec, maker of Internet security software, are startling:

  • Cybercrime has been roughly doubling each year since 2003, with roughly one in five people online having been victimized in some way.
  • Those behind cybercrime, typically, are no longer teenage hackers using their skills for mischief but career criminals along the lines of the Mafia.
  • Cybercriminals are primarily after your money. One-third of items advertised on the Internet black market is stolen credit card information, which sell for anywhere between $.06 and $30 per card, depending on how much information is included. Bank account information accounts for one fifth of Internet black market items advertised.
  • For those victimized by identity theft such as stolen credit card information, the time needed to rectify matters averages 58 hours.

Reports like these issued by those selling protective products tend to emphasize worst-case scenarios. Instead of being a time-sapping hassle, recovering from the theft of credit card information may simply involve getting issued a new credit card and updating your information with any online vendors and payment services you use.

Still, being a savvy consumer means being aware of the potential downside; using up-to-date Internet security software; keeping your operating system, Web browser, and other programs up to date; and knowing the security threats that are out there.

Despite being outlawed ten years ago, cybersquatting unfortunately is still alive and well. The numbers in fact can seem astronomical. The telecommunications and broadband company Verizon Communications has had to shut down thousands of sites using domain names that were related to its businesses.

Because of numbers like this, it can take a while for a brand owner to find and go after bogus sites, according to a recent study by Mark Monitor, a domain registrar that also monitors domain-name abuse for corporate clients. The study found that 80 percent of abusive sites identified in 2007 were still active more than a year later.

Along with well-known companies such as Verizon and Microsoft, another frequent target of cybersquatters are celebrities such as rock star Bruce Springsteen and actor Kevin Spacey. But anybody can become a victim.

Companies and individuals can monitor the Web themselves for instances of cybersquatting. At the simplest, use Google to search for relevant terms. DomainTools lets you do various kinds of more specialized searches related to domain names. At the high end, "

| More


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
View All

Featured Papers