Domain Research Suite Blog & How To Guides & FAQ
Brand Monitor and Brand Alert API: How to Combat Brand Misrepresentation in the Retail Fashion Industry
Negative brand equity and misrepresentations are among the worst nightmares of today’s biggest brands — and more often than not, it’s connected to cybersecurity and data breaches.
For example, the latest stats show that one in every 99 emails you get each day has to do with phishing attacks, the majority of which come laced with malware specially crafted to harvest victims’ financial credentials or use popular brands as social engineering bait.
A great example would be an email offering a huge discount that the victim would find hard to resist. So she clicks on the link leading to a site where she’s asked to fill in personal details, including, for instance, her credit card that she plans to use to purchase goods. She never receives the items she supposedly bought and so complained to the store via all possible means — email, phone, and social media.
What’s worse, others who fell for the same ruse joined in the frenzy, dragging the brand’s name through the muck. What can the victim company do? Could it have prevented the phishing attack? These are just some of the things this article will answer, analyzing Zara’s real-life case study.Continue reading
Brand Monitor: Typo generation FAQ
Expand your monitoring field by adding automatically generated typos to all possibly misspelled domain names. Prevent abuse of your brand by identifying typosquatting and blocking IDN homograph attacks. Learn more about our new feature: automatic typos generation.Continue reading
Protecting Brands & Trademarks On The Internet!
The ease & gigantic potential that the Internet provides to businesses to expand their reach amongst their customers and tap markets that traditionally would have required way too much effort & resources is definitely remarkable. Being present on the Web via their websites has become a cornerstone for businesses to create brand awareness, showcase their products & service and also for selling their offerings directly online. And with each passing day, people are beginning to rely more and more on this virtual presence of brands and are increasingly interacting with them.
Domain names to that effect have become a very critical component for expanding and building a brand identity online. And just like any valuable asset in plain sight, there are a lot of bad guys who either want to cause harm or exploit your brand’s potential for their own benefit. Which is of course not a great news for you!Continue reading
Uncover Domain Spoofing Using AI Driven Predictive Monitors
Spoofing is a situation in which an entity (person or software program) successfully impersonates and masquerades as another successful one, with the purpose of gaining an advantage with regards to personal or business information or brand goodwill. Domain spoofing occurs when an attacker appears to use a company’s domain to impersonate and masquerade a company and or its products or brands. The domain spoofer may later use the deceived domain name to induce fraudulent practice like phishing i.e. sending deceptive emails pretending to be from a reputed company in order to induce individuals to reveal passwords, credit card numbers or download malicious files.Continue reading
Reverse WHOIS in action:
find all domains or websites of a company, and more
See Reverse WHOIS service in action by searching for all Internet domains a company owns or is related to. We shall use the web-based reverse WHOIS service. An alternative would be to use the reverse WHOIS API, a RESTful solution which is also available with the same capabilities. We shall pick a popular brand, the Eastman Kodak Company, as an example for our investigation, although it works for any other one you might be interested in. If you are a domainer, a marketer, a legal investigator, an IT security expert, or anyone interested in or working with Internet domains, you are in the right place. We present the Swiss Army knife designed to fit in your very pocket.Continue reading