Podcasts about Cybersquatting

  • 32PODCASTS
  • 44EPISODES
  • 32mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Sep 2, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Cybersquatting

Latest podcast episodes about Cybersquatting

Monde Numérique - Jérôme Colombain
Attention aux faux sites ".gouv.fr" (Actu)

Monde Numérique - Jérôme Colombain

Play Episode Listen Later Sep 2, 2024 4:22


Un nouveau cas de typosquatting menace les internautes français : un domaine en .qouv.fr, très similaire aux sites officiels en .gouv.fr, a été enregistré, en remplaçant le « g » par un « q » minuscule, rendant les deux presque identiques.Ce domaine pourrait être utilisé pour des attaques de phishing, dirigeant les utilisateurs vers de faux sites pour voler leurs informations personnelles. Bien que pour l'instant le domaine ne soit pas encore actif, l'AFNIC surveille la situation de près. Les internautes sont appelés à la vigilance.Bonne écoute ! -----------♥️ Soutenez Monde Numérique : https://donorbox.org/monde-numerique

Total Information AM
Cybersquatting on political website names

Total Information AM

Play Episode Listen Later Aug 14, 2024 9:16


KMOX Legal Analyst Brad Young explains the legality of "cybersquatting" on web domains.

political names cybersquatting
WWL First News with Tommy Tucker
What exactly is "cybersquatting"?

WWL First News with Tommy Tucker

Play Episode Listen Later Aug 12, 2024 11:03


Don Dubuc in for Tommy. Don talks with John Rizvi, The Patent Professor. He's an Adjunct Professor of Patent Law at Nova Southeastern Law School in Florida and the author of two books on patents

WWL First News with Tommy Tucker
Something needs to change with the Sewerage & Water Board: Full Show 8-12-24

WWL First News with Tommy Tucker

Play Episode Listen Later Aug 12, 2024 95:15


Don Dubuc was in for Tommy Tucker this Monday morning. Here's just a few of the things Don discussed. Steve Scalise on the problems caused by illegal immigration Cybersquatting...what the heck is that? How the City Council wants to address issues at the Sewerage & Water Board There's a new strain of pneumonia going around. Do we need to worry? Do you have a memory of your favorite school lunch from when you were a kid?

IP Fridays - your intellectual property podcast about trademarks, patents, designs and much more
Challenges Enforcing Trademarks Online and Cybersquatting – Interview with Celeste Butera – UPC Caseload – USPTO AI Guidance – IP Fridays – Episode 149

IP Fridays - your intellectual property podcast about trademarks, patents, designs and much more

Play Episode Listen Later Feb 23, 2024 24:44


Challenges Enforcing Trademarks Online and Cybersquatting – Interview with Celeste Butera – UPC Caseload – USPTO AI Guidance – IP Fridays – Episode 149 Celeste Butera Profile

Blackletter
Decoding Cybersquatting: Cases and Strategies

Blackletter

Play Episode Listen Later Oct 9, 2023 4:13


Join Tom Dunlap as he unravels the world of cybersquatting through compelling real-life cases. From PETA's clash with Michael Doughney to Sting's battle for sting.com, Tom explores the legal intricacies and outcomes. Discover the cost-effective Uniform Domain-Name Dispute-Resolution Policy (UDRP) and gain insights on navigating domain disputes. Don't miss this enlightening Monday Morning Minute!

Law School
Intellectual property (2023): Trademark (Part Four)

Law School

Play Episode Listen Later May 5, 2023 13:04


Domain names. The advent of the domain name system has led to attempts by trademark holders to enforce their rights over domain names that are similar or identical to their existing trademarks, particularly by seeking control over the domain names at issue. As with dilution protection, enforcing trademark rights over domain name owners involves protecting a trademark outside the obvious context of its consumer market, because domain names are global and not limited by goods or service. This conflict is easily resolved when the domain name owner actually uses the domain to compete with the trademark owner. Cybersquatting, however, does not involve competition. Instead, an unlicensed user registers a domain name identical to a trademark and offers to sell the domain to the trademark owner. Typosquatters—those registering common misspellings of trademarks as domain names—have also been targeted successfully in trademark infringement suits. "Gripe sites", on the other hand, tend to be protected as free speech, and are therefore more difficult to attack as trademark infringement. This clash of the new technology with pre-existing trademark rights resulted in several high-profile decisions as the courts of many countries tried to coherently address the issue (and not always successfully) within the framework of existing trademark law. As the website itself was not the product being purchased, there was no actual consumer confusion, and so initial interest confusion was a concept applied instead. Initial interest confusion refers to customer confusion that creates an initial interest in a competitor's "product" (in the online context, another party's website). Even though initial interest confusion is dispelled by the time any actual sales occur, it allows a trademark infringer to capitalize on the goodwill associated with the original mark. Several cases have wrestled with the concept of initial interest confusion. In Brookfield Communications, Incorporated v West Coast Entertainment Corporation the court found initial interest confusion could occur when a competitor's trademarked terms were used in the HTML metatags of a website, resulting in that site appearing in the search results when a user searches on the trademarked term. In Playboy Netscape, the court found initial interest confusion when users typed in Playboy's trademarks into a search engine, resulting in the display of search results alongside unlabeled banner ads, triggered by keywords that included Playboy's marks, that would take users to Playboy's competitors. Though users might ultimately realize upon clicking on the banner ads that they were not Playboy-affiliated, the court found that the competitor advertisers could have gained customers by appropriating Playboy's goodwill since users may be perfectly happy to browse the competitor's site instead of returning to the search results to find the Playboy sites. In Lamparello v Falwell, however, the court clarified that a finding of initial interest confusion is contingent on financial profit from said confusion, such that, if a domain name confusingly similar to a registered trademark is used for a non-trademark related website, the site owner will not be found to have infringed where they do not seek to capitalize on the mark's goodwill for their own commercial enterprises. --- Send in a voice message: https://podcasters.spotify.com/pod/show/law-school/message Support this podcast: https://podcasters.spotify.com/pod/show/law-school/support

We Do Hard Things with Mark Drager
Jason Hartman: This Guy Won MILLIONS in Wild Legal Battle - Counterfeiting, Cybersquatting, You WON'T Believe it!

We Do Hard Things with Mark Drager

Play Episode Listen Later May 2, 2023 51:24


If you think it can't happen to you - think again. For years, Jason has been dealing with an industry competitor who set out to ruin him and destroy his name through trademark counterfeiting, unfair competition and civil racketeering. Jason Hartman® has been involved in several thousand real estate transactions and has owned income properties in 11 states and 17 cities. His companies help people achieve The American Dream of financial freedom by purchasing income property in prudent markets nationwide. Jason's Complete Solution for Real Estate Investors™ is a comprehensive system providing real estate investors with education, research, resources and technology to deal with all areas of their income property investment needs.   More from Jason:  TWITTER: https://twitter.com/JasonHartmanROI INSTAGRAM: https://www.instagram.com/jasonhartman1/ LINKEDIN: https://www.linkedin.com/in/jasonhartmaninvestor/

We Do Hard Things with Mark Drager
Jason Hartman // TEASER: This Guy Won MILLIONS in Wild Legal Battle - Counterfeiting, Cybersquatting, You WON'T Believe it!

We Do Hard Things with Mark Drager

Play Episode Listen Later May 2, 2023 1:00


If you think it can't happen to you - think again. For years, Jason has been dealing with an industry competitor who set out to ruin him and destroy his name through trademark counterfeiting, unfair competition and civil racketeering. Jason Hartman® has been involved in several thousand real estate transactions and has owned income properties in 11 states and 17 cities. His companies help people achieve The American Dream of financial freedom by purchasing income property in prudent markets nationwide. Jason's Complete Solution for Real Estate Investors™ is a comprehensive system providing real estate investors with education, research, resources and technology to deal with all areas of their income property investment needs.   More from Jason:  TWITTER: https://twitter.com/JasonHartmanROI INSTAGRAM: https://www.instagram.com/jasonhartman1/ LINKEDIN: https://www.linkedin.com/in/jasonhartmaninvestor/

Domain Name Wire Podcast
The Cybersquatting law divide – DNW Podcast #423

Domain Name Wire Podcast

Play Episode Listen Later Feb 6, 2023 39:10


A recent court case does little to settle the “re-registration” question. A Court of Appeals decision last month widened the gulf between different U.S. circuits on a critical question in finding bad faith under the Anticybersquatting Consumer Protection Act (ACPA): when the domain was registered. Or “re-registered”, as it were. On today's show Ben Barlow, […] Post link: The Cybersquatting law divide – DNW Podcast #423 © DomainNameWire.com 2023. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.

court divide appeals ben barlow cybersquatting domainnamewire dnw
#IPSERIES
Intellectual Property and Music Festival: Basics for event organizers

#IPSERIES

Play Episode Listen Later Oct 13, 2022 59:05


In episode 80 of the #IPSERIES podcast, I discuss the interplay of #IP and #musicfestivals, intellectual property protection for well know marks, what it means for a trademark application to be abandoned, ways a trademark owner can grant you consent, permission, and authorization, and many more as I analyze the Coachella Music Festival, LLC and Goldenvoice, LLC suing Afrochella Limited, BBNZ Live Limited, Culture Management Group Limited, & others for an alleged #Trademark and #Servicemark #Infringement;  False Designation Of Origin; #Cybersquatting; and #unfairCompetition of #coachella and #chella marks What are your views on this case, do you think Afrochella is similar to Coachella and Chella? See the link to listen to my views on the case:  https://anchor.fm/rita-chindah/episodes/Intellectual-Property-and-Music-Festival-Basics-for-event-organizers-e1p6699 Link to listen on Audiomack: https://audiomack.com/rss/ipseriesinfo/podcast.rss  You can subscribe to my newsletter via this link-  https://ipseries.substack.com Instagram: https://www.instagram.com/ipseries_with_reedah Twitter: https://twitter.com/IPSERIES1 Facebook: https://www.facebook.com/groups/836484013662125/?ref=share Subscribe on Spotify:  https://open.spotify.com/show/1d6vuZteT368fBQiuC0aok Link to the Twitter version:  https://twitter.com/esmeraldo99/status/1579472664871436290?t=WXUS6e57zG96C8r22Dgdmw&s=19 Instagram version: https://www.instagram.com/reel/CjcyH-UAFck/?igshid=YmMyMTA2M2Y= #intellectualproperty #coachella #afrochella #brandprotection #trademark #servicemark #cybersquatting #domainname #license #musicfestival #music --- Send in a voice message: https://anchor.fm/rita-chindah/message Support this podcast: https://anchor.fm/rita-chindah/support

Filipe Deschamps News
@428 - Brasil: novo ataque / Cybersquatting no Telegram / Erro de programação

Filipe Deschamps News

Play Episode Listen Later Aug 31, 2022 4:57


Notícias que chamaram a nossa atenção nesta Quarta-feira dia 31 de Agosto de 2022! Reprodução em áudio do e-mail recebido diariamente pela Newsletters (newsletter@filipedeschamps.com) Newsletter gratuita sobre Tecnologia e Programação: https://filipedeschamps.com.br/newsletter #news #noticias #fdnews #robsonamendonca

Wiley Connected
Outsmarting Cyber Scammers: A Look Into Anti-Cybersquatting Litigation

Wiley Connected

Play Episode Listen Later Jun 30, 2022 39:48


In this podcast, Wiley partners Attison L. Barnes, III and David E. Weslow pull from their combined decades of experience for an in-depth discussion of cybersquatting and related Internet and digital media scams. Since the beginning of the COVID-19 pandemic, business impersonation scams have increased 85%, and 95% of the 500 most popular websites are subject to impersonation. As scammers become more sophisticated, so have remedies and courses of action to combat this dynamic issue. Join us as we discuss the inception of the 1999 Federal Anticybersquatting Consumer Protection Act (ACPA) and its applications, the forms and evolution of cyber scams, and the future of anti-cybersquatting litigation.

Vondran Legal Hour
Attorney Steve® overview of legal liability for Reverse Cybersquatting

Vondran Legal Hour

Play Episode Listen Later Feb 2, 2022 13:00


Attorney Steve® Domain Dispute Essentials - Bad Faith Abuse of UDRP Proceedings can lead to RDNH allegations in federal court. In this important IP law podcast, Attorney Steve® discusses domain disputes with WIPO and the National Arbitration Forum.  Basically, these are what's known as "UDRP domain name disputes" and arises where a Plaintiff claims to have valid trademark rights that pre-date those of another party, and that the other party is thus, in essence, infringing its trademark.   A UDRP action is a low cost arbitration and the domain name holder is required to submit to the proceeding (and yes, pay fees), so that the dispute can be heard.  While this is generally known as a quick and inexpensive way to protect a valid trademark, there is tremendous opportunity for abuse by Trademark Bully's seeking to over-reach and at times to file a UDRP complaint for no good reason other than to harass, bully, and try to strip away a domain name they often times wish they had purchased themselves (but lacked any real business acumen in this area). This can force desperate people to do desperate things and if requested, the UDRP domain arbitration panel (one to three panel members) can be asked to declare that the complaint has engaged in "Reverse Domain Name Hijacking."  Once this hapens, it potentially opens doors in federal court to sue for RDNH and to seek recourse up to $100,000 per domain name, and costs and attorney fees.  There may also be other state law legal theories to tag on as part of supplemental jurisdiction.  Click to listen to this IP podcast and learn more than most people know.  If you need help with a trademark lawsuit, declaratory judgment, UDRP domain dispute, cease and desist letter, or ACPA RDNH lawsuit, call us at (877) 276-5084 for more information.      

Faegre Drinker on Law and Technology
Cybersquatting and How To Protect Your Internet Domain

Faegre Drinker on Law and Technology

Play Episode Listen Later Nov 8, 2021 28:03


Cybersquatting occurs when someone registers a trademark that they do not own in a domain name — usually in an effort to impersonate and profit off of commercial or other brands. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Libby Baney and Garth Bruen, a distinguished cybercrime researcher, to discuss cybersquatting and the systems that track internet registrations.

On Track - Trending Topics in Business and Law - by Haynes and Boone, LLP
HB Media Minute Episode 13 - Domain Name Cybersquatting and Trademark Based Options for Brand Owners – The ACPA, UDRP, and URS

On Track - Trending Topics in Business and Law - by Haynes and Boone, LLP

Play Episode Play 60 sec Highlight Listen Later Jul 6, 2021 19:39


Today, we are going to talk about cybersquatting, which is the unauthorized registration of an Internet domain name, usually involving a well-known company or brand, with the bad faith intent to profit from the goodwill established by the actual trademark owners. Various legal tools have been created to help brand owners fight back against cybersquatting, but the practice nonetheless continues and has likely only increased. We will also explore the legal options available to brand owners to deal with this nuisance.   We're joined by an excellent guide, Haynes and Boone Trademark Partner Jeff Becker, who founded the firm's Trademark Practice and has grown it into one of the largest and most highly respected in the country, being ranked as National Gold, the top tier in World Trademark Review's WTR 1000 directory of leading trademarks practices.

HB Media Minute
HB Media Minute Episode 13 - Domain Name Cybersquatting and Trademark Based Options for Brand Owners – The ACPA, UDRP, and URS

HB Media Minute

Play Episode Play 60 sec Highlight Listen Later Jul 6, 2021 19:39


Today, we are going to talk about cybersquatting, which is the unauthorized registration of an Internet domain name, usually involving a well-known company or brand, with the bad faith intent to profit from the goodwill established by the actual trademark owners. Various legal tools have been created to help brand owners fight back against cybersquatting, but the practice nonetheless continues and has likely only increased. We will also explore the legal options available to brand owners to deal with this nuisance.   We're joined by an excellent guide, Haynes and Boone Trademark Partner Jeff Becker, who founded the firm's Trademark Practice and has grown it into one of the largest and most highly respected in the country, being ranked as National Gold, the top tier in World Trademark Review's WTR 1000 directory of leading trademarks practices.

FlowNews24
MPs names targeted by opponents' web buy up - with @HelenDalton22 @AliCupper @HelenDalton @Ali_Cupper_ MP @sffroy

FlowNews24

Play Episode Listen Later Feb 18, 2021 2:09


Local independent MPs have been targeted by political opponents buying their names as 'domain names', including NSW MP Helen Dalton and Vic MP Ali Cupper. On the FlowFM Morning Show, Wayne Phillips looked into this 'cybersquatting' and the tricks being played to undermine political competition. Meanwhile, Ali Cupper is attacking the higher council rates some regional Victorians pay than their city cousins.

Domain Name Wire Podcast
Booking.com and cybersquatting – DNW Podcast #310

Domain Name Wire Podcast

Play Episode Listen Later Nov 2, 2020 31:30


A discussion with a UDRP panelist who also represented Booking.com at the Supreme Court. One of the best sessions at September’s NamesCon Online was a chat between Zak Muscovitch, general counsel of Internet Commerce Association, and David Bernstein, a partner with Debevoise & Plimpton LLP. Bernstein was counsel for Booking.com in its trademark fight that […] Post link: Booking.com and cybersquatting – DNW Podcast #310 © DomainNameWire.com 2020. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.

supreme court booking bernstein david bernstein debevoise cybersquatting udrp plimpton llp domainnamewire dnw internet commerce association zak muscovitch
The Silicon Valley Insider Show with Keith Koo
LinkedIn’s First Head of HR – Where does Work go from here?

The Silicon Valley Insider Show with Keith Koo

Play Episode Listen Later Sep 14, 2020 40:27


In this episode of Silicon Valley Insider, Host Keith Koo very special guest is his friend, Steve Cadigan, Talent Hacker, and advisor. Steve and Keith have known each other for decades and reminisce about their time working together during Cisco’s dotcom era working in Cisco’s famed M&A Integration team. They even mention a time when they had to work on seven acquisitions all at the same time! Since then, Steve went on to bigger and better things becoming LinkedIn’s first Head of HR and credited with creating the awesome corporate culture that LinkedIn is so famous for. Today, Steve runs Cadigan Talent Ventures and can be found at www.stevecadigan.com where he is a trusted advisor, coach and soon to be author. Steve is currently finishing his book on the future of work.  During the show, Keith and Steve discuss how employees and employers are coping during the pandemic and what steps innovative companies are taking to stay engaged during the “new normal”. Steve gives out much practical advice and thought leadership on how companies can be supportive of their #1 asset, their people. Steve and Keith also discuss examples of how companies implemented new and innovative ways to stay connected and engaged with their people. On this week’s Cyber-Tip – Keith does a deep dive into “Cybersquatting” and its alternate forms. On the Pivot, Keith and Steve discuss what the future of work will look like and how employees and employers no longer must think of talent as being “locked-in” to a career track. Subscribe and Download to “Silicon Valley Insider” to find out more: www.svin.biz

head pivot future of work cisco cybersquatting silicon valley insider
Craig Peterson's Tech Talk
Welcome! iOT hardware makes your Business Vulnerable plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Sep 11, 2020 12:23


Welcome! Craig discusses IoT hardware and how these gaget-y devices can put your business at risk. Listen in to find out why? For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: iOS 13.7 launched today with a new system for battling the pandemic Hackers are exploiting a critical flaw affecting >350,000 WordPress sites The accidental notary: Apple approves notorious malware to run on Macs Most IoT Hardware Dangerously Easy to Crack 55% of Cybersquatted Domains are Malicious or Potentially Fraudulent Feds Can’t Ask Google for Every Phone in a 100-meter Radius, Court Says The Hidden Cost of Losing Security Talent   Don’t forget Cybersecurity on Your Back-to-School List --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Sometimes it seems like the easier things are the tougher they are. And man is that true according to this new study we're going to talk about right now when it comes to these wonderful little appliances we have. Hello everybody. Craig Peterson here. Thanks for joining me. I enjoy being here on the radio answering questions. I got a lot this week. I got dozens of them, so that's wonderful. Keep them coming in. I pick the best ones for what we call our newsletter. That typically goes out Saturday mornings. Again, it depends on what our weeks are like. Getting those out and I try and answer them there. That's part of what we're going to be doing. Midweek starting next week. We're going to be sending out these little emails, a long tail thing, explaining a specific topic.  Something you can read and just a few minutes and get something out of. We want it really to be transformational. If you can do that in three minutes. We have been transforming our lives in a lot of ways. Many ways of us, of course, have been using computers for decades now. We've been using these smart devices for at least a decade. Before I had my first Android smartphone and my first iPhone, I had the Palm pilot phones and just what I could do with my Palm. It was just absolutely amazing. Do you remember handspring and some of these other guys there are just so many wonderful things we could do with them that the Apple Newton, which never really hit it off, it was very expensive? All of these devices were designed to make our lives a little bit easier and they all required a lot of intelligence. Now we have devices pretty much everywhere. I was going to say, come out of our ears, but that's true too. When it comes to hearing AIDS, these extremely small devices that have embedded computers, a whole computer system. Now when you're trying to manufacturer something like a light bulb that has smarts in it, it might be smart to be able to change colors. It might be smart to get on a network and accept a remote control code. It might be some smarts that are just designed to make the whole house easier. you turn on. A movie and automatically the lights in the room. Dim, the surround sound turns on. Just everything happens for you automatically. These are all being done with these various small, hopefully, easy to use and install devices. But the problem that we've been noticing is that, wow, wait a minute. Now, none of these devices were really designed with security in mind, and in order to keep the costs down, they have to really strip those operating systems bare. So there are versions of Linux, many of them now that are just very stripped down. The same thing's true with BSD Unixes or units are used in a lot of this internet of things, devices, and the idea is to get it small, get it simple. So that we don't have to provide them with a big computer or a bunch of computing power. We can just do it simply. Get that information together, put it out there for the people to use. So what's that information as I said, it can be almost anything. It's about the internet of things. Now, because they have cost reduced all of these devices all the way to just out saving a fraction of a penny on each board. Remember they're making these things by the tens of thousands and ultimately by the millions and billions at least that's the plan, that's what five G is been designed to help handle. They have a whole problem when it comes to what we in the industry might call root-level access. We've got a security researcher out there who presented over at the Octas virtual disclosure security conference last week that most of this internet of things hardware is dangerously easy to crack and completely take control of. Then they use it for malicious purposes. The federal government has really cracked down now on anybody that's not just a direct contractor with them, but a subcontractor. We're seeing this all of the time. We're helping businesses. These enterprises that are making things, everything from a cable harness through power supplies, through control systems and control circuits. That now as of mid-August, this year, have to get rid of everything that's in their buildings that do not meet these new CMMC and other standards. So things like the security cameras that you might have right there. Weren't they real cheap, like the Hikvision stuff, right? Heck, you could just go to any big-box retailer and buyHikvision. Hikvision is illegal to have in the building. You used to be able to separate the network. So you could say, yeah, my Hikvision security cameras on a different network than my Chinese made telephone voice over IP system, which is on a different network than my computer systems. You can't do that anymore. It has to all be gone. Why? It's because none of those systems meet the minimum security requirements. If we go into a place that is just, for instance, we just picked up another client that's a pizza shop. They're doing really well because of the COVID thing, because people are ordering pizzas, they are being delivered to people's homes and they're just raking in the dough and they were having some problems. So they had us come in. What was the problem? In their case, they found out that they were about to be audited by our PCI friends. PCI, that's the payment card industry folks. So if you accept credit cards, you now have PCI obligations. What are those obligations or what do you do? How do you deal with those in their case? It turned out okay. That for whatever reason, their credit cards had been stolen, the credit card information.  It could have been a skimmer. We walked into and did a security audit on this chain of restaurants. Pretty big chain here in my home state. We had to poke around. I could not believe it, they had for all of the waitstaff, Android tablets. The Android tablets were all in developer mode, full access to everything on the tablet, including the card reader, that PCI non-compliant card reader. It's great for the servers because they come up, they take the order on this Android tablet, and then at the end of the meal, they just swipe the card in the side of the tablet. Wow. Isn't this just wonderful? Because of the way the software was being run and being used, anything malicious could be installed on that unit that was being carried around by the wait staff.  All the wait staff had to do was put something on there that just the read the credit card numbers as they were being scanned or copied all the information from the transactions and TaDa they now have money in their pocket that happened here in my home state again and it's happening in yours. Believe me, Wendy's is where this one was and they ended up having people go to jail over that one. This pizza shop. We went in there, they had credit cards, apparently stolen, and that's why they were getting a PCI audit. They brought us in a week before the audit was supposed to happen. We had a look and yes, indeed their equipment had been compromised. It's like I say, all of the time. We never have gone into a business and found that their security is up to date. Every machine we've looked at has had severe security problems and in every case where we've gone in and it's a government subcontractor of some sort. Every case we have found Chinese back doors and other, very malicious software on it. What does that mean to you a regular, a home person, right? Home user. What does it mean to you as an enterprise business, an organization, tax-free whatever you might be? It means that this internet of things, hardware, whether it's things like the Hikvision cameras that can't be used anymore, legally anyways, for DOD subcontractors on any network on any piece of equipment or our voiceover IP phones that are being hacked or the pizza shop whose POS system had been hacked. What are you doing? It's across the board for everybody? So Mark Rogers is this white-hat hacker who presented at the Okta virtual disclosure security conference. He was saying that these devices were hooking up to our networks have weak to no protections at all against attacks. Against the firmware on the devices against the software that's running on the devices, et cetera. He claimed he's able to gain complete route access, route level access means that he can do anything he wants on the machines, including the ability to reflash firmware. In other words, put his own software on the device on 1,012 devices that he's tested. And going back to this chain restaurant that we tried to help out and they decided no we're all set. Na-Na right fingers in the ears. We could have easily and so could their waitstaff have completely hacked any of these devices. None of them, none of it was probably protected. It's just shocking to me. It is shocking to me just continually.  The issue with all of these systems, and this is true of almost every internet of thing device out there is that most of the proprietary information about the devices, including their certificates or keys, the communication program or protocols it's stored in poorly secured flash memory. You think of your flash memory like a hard disc drive, but there are no moving parts in it. Anyone with access to these devices, anybody with some basic knowledge of hardware hacking, even basic software hacking can access the firmware, look for data, including vulnerabilities. We've seen that happen before where security cameras are being used to launch attacks against the rest of the business and it includes DOD contractors, and it includes restaurants. We're seeing that every week.  Be very careful. I'm not getting into the details of how they're using Uart and J tag routes to get into them. But. This is a real problem, everybody. So again, be careful the best stuff out there right now when it comes to the internet of things to smart devices, to these speakers that you can talk to is now, I'm going to sound like a  broken record, but it's Apple. The Apple devices, the Apple speakers, all of that stuff tends to be more expensive, but it is well engineered and they do seriously consider security as part of all of this. Well, there's going to be a lot more, go online, and stick around. You're listening to Craig Peterson here and WTAG we'll be back. After the top of the hour, we'll be talking about the Cybersquatting offense. Asking Google for phone information and more stick around. We'll be right back. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Craig Peterson's Tech Talk
Welcome! Hackers New Tool - Cybersquatting plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson's Tech Talk

Play Episode Listen Later Sep 11, 2020 11:26


Welcome! Craig discusses Why hackers have resorted to Cybersquatting to ply their trades.  Listen in to find out. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: iOS 13.7 launched today with a new system for battling the pandemic Hackers are exploiting a critical flaw affecting >350,000 WordPress sites The accidental notary: Apple approves notorious malware to run on Macs Most IoT Hardware Dangerously Easy to Crack 55% of Cybersquatted Domains are Malicious or Potentially Fraudulent Feds Can’t Ask Google for Every Phone in a 100-meter Radius, Court Says The Hidden Cost of Losing Security Talent Don’t forget Cybersecurity on Your Back-to-School List --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] Hey, how good are you at spelling and or typing? If you're like the rest of America, in fact, around the world, you may not be the best at either one of them. You know what the bad guys are taking advantage of that. Hey everybody. Craig Peterson here. Thanks for joining us today. I have had a busy week as we've been answering emails, getting the new website ready to go up and it's just been absolutely crazy. We've got more training coming out too. More training on the website and emails. We're going to be sending you these little two to three minutes to read emails. That'll keep you up to date on things.  The number one thing that I hear comments on listeners is they really appreciate the little bit of learning that they get from the radio show and my appearances on the radio and everything else on with Matt in the morning on, of course, Wednesday mornings about seven 30, but that seems to be the number one thing and including the email. I'm going to do more of it. You asked for it, you're going to get it. We're going to do more of all of that. The training, keeping it simple, helping you out. We'll be doing some, some webinars stuff. Just all the way across the board. Yeah. Because we have some serious problems out there and it's getting worse and worse. And I don't see it getting any better. We just got news of another hack that happened. and it happened over on the Biden campaign. Man alive. It wasn't a hack-hack. What's a hack, I don't know. It's hard to say what a hack is nowadays because frankly, I count ransomware as a hack. It's something that somebody did that they weren't supposed to do, that they shouldn't have done, et cetera. That's a hack and that's what just happened to the Biden campaign. Apparently the Kremlin hit about 200 political targets, including a key Biden campaign Alie. Apparently this hacking attempt was caught by Microsoft. Most of them are not, and they were able to gather some information about hackers. Microsoft was able to link them to the Kremlin as the most likely suspect. And they were able to take all of that evidence and give it over to the FBI. So good for them. We had that happened last time too, remember Hillary Clinton's campaign. It happened exactly the same way for years later, Democrats again, the same way. Remember that whole thing, the DNC emails now turns out it was probably the Russian hackers that managed to get them and leaked all of those emails online ahead of the 2016 presidential election. They really want to shake things up. Obviously they don't want Trump. Trump's been very hard on them, harder than president Biden. Would be certainly harder than President Obama ever was. Trump's been very hard in Russia and very hard on China. They just want to really stir things up in a very big way. They apparently the Russians attempted to breach the systems at this Washington based strategy and communications firm called S K D K or S K D Knickerbocker whose been working for very hand in glove with Joe Biden's campaign, according to the daily beast. These attacks took place over the past two months. Ultimately they were unsuccessful. So that's really good news here. So maybe they did learn something from the last hack. This is the same method that was used back in 2016 to gain access to a very high, official, if you will, within the Hillary Clinton campaign. So here we go. Apparently this firm is "well defended." So there's been no breach. We'll see how that happens. We just had an instance this week. In fact, a company that we helped out a little bit, we moved them from just regular consumer network gear. We moved them up to some semi-professional network gear for their small business and it looks like they might actually have some contacts with the department of defense. And DOD is very particular about your security. I hope the Biden campaign is too. Cause this wasn't directly against the Biden campaign. This was against a consulting firm that they were working with.  I want to remind everybody. These types of hacks for lack of a better term are typically phishing events. They'll send an email that looks legitimate and is a very simple plea asking for some information. In the April or March timeframes, actually, we usually see that email is going around talking about, Oh, and the W2 information, 10 99 information and pretending to be the CFO or the accountant, et cetera. Now, this isn't the first time Microsoft has sorted the suspected Russian government hacking, and we've thrown to them many times for our clients as well, including in emails. Apparently, that's what this was. This was an email. This was a phishing email designed to try and get somebody to click on a link or answer a question. Microsoft's saying they've identified over 120 new targets of the Kremlin's cyber spying. They have found them out apparently by suing the notorious hacker group known as Fancy bear. That's the group over there in Russia that is run out of the Kremlin. Microsoft's saying their legal actions led to the seizure of 70 command and control servers. Now, this is where I talked again on my show here a few weeks ago. This is where your home computer comes in. This is where your small business computer or even your large business computer comes in. And that is they will compromise it. They will install some software on it that allows them to remotely control it and then use your computer to send out these phishing emails, to send out emails that have attached to them either directly or indirectly, ransomware, et cetera. We just had a big ransomware thing just this week as well. I don't know if you heard about this one. But my gosh it's just happened, but again and again, this particular one. Hit this massive a company called Equinix, I should say. Equinix runs all kinds of data centers for businesses. Now it's saying that this ransomware hit their internal systems and what it did is exactly what I've been warning you guys about. It doesn't just take a hold of your computer and encrypt all of the data. no. What this did is it grabbed the data. It could get its hands on Equinix's internal computers and sent it up to the bad guy's computer. So they now had copies of some or all of their data. And then it does the encryption trick. Now Equinix is saying that their data is centers and service offerings, including their managed services, are fully operational. Now knock on wood. My company has never had this happen to us. but again, we're smaller. We use much better software than most companies out there. We don't have all of the details on this, but this is a very big deal. Equinix is publicly-traded. The company traded on the NASDAQ stock exchange. It has around 8,000 employees. It just bought 13 more data centers. This is really something. And by the way, bought them for $750 million, three-quarters of a billion. So this is a big company and it happens to them. It can happen to you.  I started all of this out by asking if you were a good speller and how good a typer you are? There's another way the bad guys get to you. We've been talking right now about phishing and phishing sites. We were talking about how phishing is being used to get you to go to a website. oftentimes that URL that you're going to will look almost legitimate. It might be instead of microsoft.com, it might be Microsoft dot something else, or it might be a misspelling or a common typo for the URL for that website that you're trying to go to. Apple, PayPal, banks are being targeted by cyber squatters. Now they're taking advantage of the pandemic according to a study that just came out. In a single month, cybersquatters have registered almost 14,000 domain names. More than half of them went on to host malicious software. That is a very big deal. That's according to Palo Alto networks, and that is being quoted in Dark Reading. But what these cybersquatters are up to is that they put up a website that has a URL that's very similar to a legitimate URL out there. When you go there, they are going to try and trick you into doing something. Now, the study says that basically 55% of these Cybersquatter domains are malicious or potentially fraudulent. So it's not like somebody buying a domain saying, I'm going to, I'm going to buy it, Apple tart, because people type that in by accident when they're trying to go to Apple and maybe I can get Apple to buy it from me, or maybe I can use it as a parody site, et cetera. No. they are leading to malicious content more than 70% of the time. So be very careful about the brand. A good example that they've done that has been shut down recently is secure dash Wells Fargo. This is a domain using the Wells Fargo brand, targeting the bank's customers and getting them to click through and use phishing to steal sensitive information. Be very careful when you're out there typing things in or clicking on links, because many of them, it turns out 50-55% of them are malicious and 70% of them are trying to fake you into giving up your own personal information. Hey coming back. We've got a very interesting little article by Timothy Lee here in ARS Technica about a court order against the feds and local police departments. So we'll tell you about that. When we get back. Stick around, you're listening to Craig Peterson right here on WGAN and Wednesday mornings at seven 30 with Matt. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Retail Ready Podcast
$1m in online sales and a legal battle due to Cybersquatting we talk to Smoothie Bomb Founder, Cinzia Cozzolino - Ep. 46

Retail Ready Podcast

Play Episode Listen Later Mar 1, 2020 51:26


In today’s episode I am joined by Cinzia who is the owner and founder of Smoothie Bombs. An idea which started to try and get some healthy nutrients into her daughter before school and before she knew if this single mother of two, started on her Smoothie Bomb business adventure and is now bringing in over $1m in online sales. In this episode you realise it has not been all plain sailing for Cinzia who goes into detail about Cybersquatting and why all start-ups should follow her tips so you don’t have to go through the legal battle Cinzia and Smoothie Bombs faced. Really enjoyed talking to Cinzia as she had so much information and told a great story of a brand which started with products being rolled by her own hands.

2024
2024 del giorno 07/02/2020: Uffizi e cybersquatting, automobili connesse ed elettriche, etilometri

2024

Play Episode Listen Later Feb 7, 2020


Il Museo degli Uffizi ha vinto una importante causa legale contro una società dell'Arizona che utilizzava domini web per vendere i biglietti del celebre museo fiorentino. "Il fenomeno del cosiddetto cybersquatting è cambiato nel corso degli ultimi anni ma è sorprendentemente in crescita" spiega a Radio24 Laura Turini, avvocato esperto in tutela di marchi, brevetti e domini internet. Parliamo poi di automobili partendo dal numero di vittime causate dall'alcol. La tecnologia può essere un valido deterrente per evitare di mettersi alla guida dopo aver bevuto e in alcuni Paesi europei - spiega Antonio Avenoso, direttore generale dello European Trasport Safety Council - gli etilometri installati su auto, camion o bus sono già utilizzati in varie situazioni. Parliamo anche di connettività con Filippo Agostino, CEO e uno dei fondatori di 2hire, una start up che ha sviluppato una tecnologia per connettere e gestire flotte di veicoli e ha appena annunciato un finanziamento da 5,6 milioni di euro guidato da P101 con la partecipazione di Linkem, Invitalia Ventures, LVenture Group e Boost Heroes. La connettività è solo uno dei trend tecnologici che i costruttori di automobili devono affrontare spiega Michele Bertoncello, partner di McKinsey e membro del McKinsey Center for Future Mobility. L'elettrificazione (motori, batterie e sistemi di ricarica), i sistemi assistenza alla guida, l'intelligenza artificiale a bordo con la creazione di nuovi servizi sono la aletre sfide che nei prossimi anni metteranno alla prova l'industria. E come sempre le nostre Digital News, le notizie di tecnologia più importanti selezionate durante la settimana.

2024
2024 del giorno 07/02/2020: Uffizi e cybersquatting, automobili connesse ed elettriche, etilometri

2024

Play Episode Listen Later Feb 7, 2020


Il Museo degli Uffizi ha vinto una importante causa legale contro una società dell'Arizona che utilizzava domini web per vendere i biglietti del celebre museo fiorentino. "Il fenomeno del cosiddetto cybersquatting è cambiato nel corso degli ultimi anni ma è sorprendentemente in crescita" spiega a Radio24 Laura Turini, avvocato esperto in tutela di marchi, brevetti e domini internet. Parliamo poi di automobili partendo dal numero di vittime causate dall'alcol. La tecnologia può essere un valido deterrente per evitare di mettersi alla guida dopo aver bevuto e in alcuni Paesi europei - spiega Antonio Avenoso, direttore generale dello European Trasport Safety Council - gli etilometri installati su auto, camion o bus sono già utilizzati in varie situazioni. Parliamo anche di connettività con Filippo Agostino, CEO e uno dei fondatori di 2hire, una start up che ha sviluppato una tecnologia per connettere e gestire flotte di veicoli e ha appena annunciato un finanziamento da 5,6 milioni di euro guidato da P101 con la partecipazione di Linkem, Invitalia Ventures, LVenture Group e Boost Heroes. La connettività è solo uno dei trend tecnologici che i costruttori di automobili devono affrontare spiega Michele Bertoncello, partner di McKinsey e membro del McKinsey Center for Future Mobility. L'elettrificazione (motori, batterie e sistemi di ricarica), i sistemi assistenza alla guida, l'intelligenza artificiale a bordo con la creazione di nuovi servizi sono la aletre sfide che nei prossimi anni metteranno alla prova l'industria. E come sempre le nostre Digital News, le notizie di tecnologia più importanti selezionate durante la settimana.

2024
2024 del giorno 07/02/2020: Uffizi e cybersquatting, automobili connesse ed elettriche, etilometri

2024

Play Episode Listen Later Feb 7, 2020


Il Museo degli Uffizi ha vinto una importante causa legale contro una società dell'Arizona che utilizzava domini web per vendere i biglietti del celebre museo fiorentino. "Il fenomeno del cosiddetto cybersquatting è cambiato nel corso degli ultimi anni ma è sorprendentemente in crescita" spiega a Radio24 Laura Turini, avvocato esperto in tutela di marchi, brevetti e domini internet. Parliamo poi di automobili partendo dal numero di vittime causate dall'alcol. La tecnologia può essere un valido deterrente per evitare di mettersi alla guida dopo aver bevuto e in alcuni Paesi europei - spiega Antonio Avenoso, direttore generale dello European Trasport Safety Council - gli etilometri installati su auto, camion o bus sono già utilizzati in varie situazioni. Parliamo anche di connettività con Filippo Agostino, CEO e uno dei fondatori di 2hire, una start up che ha sviluppato una tecnologia per connettere e gestire flotte di veicoli e ha appena annunciato un finanziamento da 5,6 milioni di euro guidato da P101 con la partecipazione di Linkem, Invitalia Ventures, LVenture Group e Boost Heroes. La connettività è solo uno dei trend tecnologici che i costruttori di automobili devono affrontare spiega Michele Bertoncello, partner di McKinsey e membro del McKinsey Center for Future Mobility. L'elettrificazione (motori, batterie e sistemi di ricarica), i sistemi assistenza alla guida, l'intelligenza artificiale a bordo con la creazione di nuovi servizi sono la aletre sfide che nei prossimi anni metteranno alla prova l'industria. E come sempre le nostre Digital News, le notizie di tecnologia più importanti selezionate durante la settimana.

Procesador Podcast
Procesador 75- ¿Qué pasa con la petición de datos privados de los dominios ".cl" a través de NIC Chile

Procesador Podcast

Play Episode Listen Later Dec 14, 2019 9:24


En este episodio 75 de Procesador nos referimos a las constantes peticiones de información de datos personales de quienes administran los sitios ".cl" a través de NIC Chile. Revisamos por qué es un peligro para quienes viven del Cybersquatting y carroñear datos privados, todo gracias a un dictamen de la Corte Suprema. Recuerda que puedes escucharnos en Itunes, Spotify, Podbean, Stitcher y Google Podcasts Queremos conocer tu opinión, ingresa a Procesador.cl

HOLIDAY PARTY!
SEPTEMBER 24 2019 – NATIONAL TYPO DAY! with Pete Musto

HOLIDAY PARTY!

Play Episode Listen Later Sep 24, 2019 68:06


HAPPY NATIONAL TYPO DAY! Jon us as we celebrate those typgrpacial erros that we all kno and love! Today we're celebrating with pal and comedian Pete Musto (midnightgardenersleague.com / Facebook: MidnightGardenersLeague)!! LET'S PARTY!! Find Holiday Party online – Patreon: patreon,com/HOLIDAYPARTY Twitter: @HOLIDAYPARTYPOD / Instagram: HOLIDAYPARTYPODCAST / Facebook: @HOLIDAYPARTYPODCAST / HOLIDAYPARTYPODCAST.COM Find Alyssa – Twitter: @alyssapants / Instagram: lettertalkpodcast / alyssapants.com Find Disa – Twitter: @cinnamonenemy / Spotify: open.spotify.com/user/1243777842 SHOW NOTES History/Fun facts about the holiday A typo, or typographical error, or misprint, is a mistake made in the typing of printed or electronic material. According to Wikipedia, the term includes errors due to mechanical failure or slips of the hand or finger, but excludes errors of ignorance, such as spelling errors, or the flip-flopping of words such as “than” and “then”. Most typos include simple duplication, omission, transposition, or substitution of a small number of characters. “Fat-finger syndrome” is a slang term that refers to an unwanted secondary action when typing. When someone’s finger is bigger than the touch zone, there can be inaccuracy in the fine motor movements and accidents occur. This action happens often with touchscreens, particularly when a person hits two adjacent keys on the keyboard in a single keystroke. For example, “buckled” instead of “bucked” There may also be “intentional” typos, which are typos that may be used deliberately for humorous purposes. For instance, the British newspaper The Guardian is sometimes referred to as the Grauniad given its reputation for frequent typesetting errors in the era before computer typesetting. Intentional typos are in notorious use on the internet. Some, such as “teh”, “pwned”, and “zomg”, have become in-jokes among groups and subcultures Then there’s typosquatting, which is a form of cybersquatting which relies on typographical errors made by internet users. A cybersquatter will typically register a likely typo of a frequently-accessed website address in the hope of receiving traffic when internet users mistype that address into a web browser. Deliberately introducing typos into a web page, or into its metadata, can also draw unwitting visitors when they enter these typos into search engines Cybersquatting refers to the act of registering, trafficking in, or using an internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The squatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price. Once in the typosquatter’s site, a user may be tricked into thinking that they are in fact in the real site. Spam emails also sometimes make use of typosquatting URLS to trick users into visiting malicious sites  There are several reasons why a typosquatter may buy a typo domain: In order to try to sell the typo domain back to the brand owner To monetize the domain through advertising revenues from direct navigation misspellings of the intended domain To redirect the typo-traffic to a competitor To redirect the typo-traffic back to the brand itself, but through an affiliate link, thus earning commissions from the brand owner's affiliate program. As a phishing scheme to mimic the brand's site, while intercepting passwords which the visitor enters unsuspectingly To install drive-by malware or revenue generating adware onto the visitors' devices To harvest misaddressed email messages mistakenly sent to the typo domain To block malevolent use of the typo domain by others To express an opinion that is different from the intended website's opinion Since the emergence of online auctions, misspelled auction searches have quickly become lucrative for people searching for deals. The concept is based on the incidence that, should someone post an auction and misspell its description or title, regular searches for the item won’t find that auction. A search that includes misspelled alterations of the item would find most misspelled auctions. In fact, a series of third-party websites have sprung up allowing people to find these items. There have been different ways of marking typos over the course of typography technology When using a typewriter without correction tape, typos were commonly overstruck with another character such as a slash. This saved the typist the trouble of retyping the entire page to eliminate the error, but as evidence of the typo remained, it was not aesthetically pleasing. In computer forums, sometimes ^H (a visual representation of the ASCII backspace character) was used to "eras" intentional typos: Be nice to this fool^H^H^H^Hgentleman, he's visiting from corporate HQ. In instant messaging, users often send messages in haste and only afterwards notice the typo. It is common practice to correct the typo by sending a subsequent message in which an asterisk precedes the correct word. In formal prose, it is sometimes necessary to quote text containing typos or other doubtful words. In such cases, the author will write "[sic]" to indicate that an error was in the original quoted source rather than in the transcription. Sic is derived from the Latin “sic erat scriptum” or “thus it was written” An “atomic typo” is a typo that happens to result in a correctly spelled word that is different from the intended one, and since it’s spelled correctly, the spellchecker cannot find the mistake. Examples include “unclear” instead of “nuclear”, “you” instead of “your”, “Sudan” instead of “sedan”, “Untied States” instead of “United States”, and “the” instead of “they”. The term was used at least as early as 1995 by Robert Terry. The Sedan/Sudan example actually happened in real life in 2005, leading to a diplomatic issue with Sudan.  Storax Sedan was an underground nuclear test conducted in Area 10 of Yucca Flat at the Nevada National Security Site on July 6, 1962 as part of Operation Plowshare, a program to investigate the use of nuclear weapons for mining, cratering, and other civilian purposes. The radioactive fallout from the test contaminated more US residents than any other nuclear test. The Sedan Crater is the largest human-made crater in the US, and is listed on the National Register of Historic Places. Ellen Tauscher, a Democratic member of the US House of Representatives from California, used Sedan as an example of a test which produced a considerable amount of radioactive fallout while giving Congressional testimony on the containment of debris from nuclear testing. However, the name “Sedan” was incorrectly transcribed as “Sudan” in the Congressional Record The international community quickly took notice, and Sudanese officials responded by stating that “the Sudanese government takes this issue seriously and with extreme importance”. The Chinese Xinhua General News Service even published an article claiming that the Sudanese government blamed the US for raising cancer rates among the Sudanese people. Despite the US embassy in Khartoum issuing a statement clarifying that it was a typographic error, Mustafa Osman Ismail, the Sudanese Foreign Minister, stated that his government would continue investigating the claims Gives a whole new dimension to the term “atomic typo” Fun facts and anecdotes! From a 2009 mentalfloss.com article and a 2017 article on listverse.com In 1631, a widely distributed Bible came to be known as the “Sinner’s Bible” when readers noticed that a very important “not” had been omitted” from Exodus 20:14, making the 7th commandment read “Thou shalt commit adultery.” This resulted in printer fines and recalled copies, with only 11 copies known to still exist today On July 31, Austin M. Patterson, chemistry editor at Merriam-Webster, sent an internal communication to the printers that included the phrase “D or d, cont./density.” The intention was to add “density” to the existing list of words that the letter “D” can abbreviate. The printer misunderstood, and instead printed a single, run-together word: dord, meaning density. The typo got past proofreaders and appeared on page 771 of the dictionary in 1934. It wasn’t until February 28, 1939, that an editor noticed “dord” lacked an etymology, and an urgent plate change soon followed The Therac-25 was a device from the 1980s that was designed to treat cancer patients with controlled bursts of radiation. Radiation is obviously extremely dangerous, so the machine came with a program to keep exposure strictly limited. This program came with a manual to ensure that the operator knew how to handle any issues. Unfortunately, the manual was apparently “written by someone with no knowledge of how communication works.” The “nonsensical word salad” was completely confusing to doctors, so they basically ignored it. When error messages popped up on the Therac-25, they just did what they thought was best. They ended up blasting patients with up to 100 times more radiation than is considered safe. Three died. For 12 hours on April 5, 2006, an Alitalia business class fare from Toronto to Cyprus was listed as $39 instead of the usual $3900. Someone at farecompare.com posted the news online, starting a buying stampede that lasted until the fare was corrected. Alitalia initially tried to cancel the already issued tickets but eventually relented, and approximately 2000 people flew to Cyprus for under $200, including taxes In early 2009, an Oregon company had to place a rush order for new packaging for its Peace Cereal. It seems a typo on the box sent callers to a phone sex line instead of the cereal maker’s 800 number. So, instead of reaching the Golden Temple consumer relations department, callers were greeted by a recorded voice asking, “Do you love sex?” A spokesperson for the company attributed the incident to human error In 2005, a typo by a Japanese stock trader cost one investment bank $224M. The broker meant to sell 1 share of J-Com at 610,000 yen, not 610,000 shares at 1 yen each In 1991, a single mistyped character in a line of computer code left 12 million people without telephone service. DSC Communications and Bell Systems confirmed that massive outages on the East and West Coasts could be traced back to that one, tiny error On August 14, 2003, a misplaced character buried deep in an Ohio power plant’s XA-21 energy management system began a cascade of glitches that rippled across the NE US and into Canada. Within hours, other power stations were failing, and entire cities were going dark, including New York City. In the end, over 50 million people were left without power, communication, and infrastructure for about 7 hours. To make matters worse, the whole thing could have been avoided if one power plant employee hadn’t turned off an alarm. When the initial glitch appeared, the error alarm was disabled while it was “fixed.” The alarm was never turned back on, meaning when the bug acted up again, it remained hidden until it was too late On July 22, 1962, the Mariner 1 space probe was launched from Cape Canaveral for its journey to Venus. Shortly after liftoff, however, it became clear that something was wrong. The rocket carrying the probe began to veer off course, putting it into a path that would carry it not only to a crash landing, but one in a populated area. With no other choice, NASA officials sent a self-destruct signal, destroying the probe and spreading debris across several states.  While coding the spacecraft’s guidance system, a programmer forgot a single hyphen, causing the $80M project to literally go up in flames before it even left the atmosphere On October 8, 2013, President Obama’s senior advisor for strategy and communications, Dan Pfeiffer, was discussing politics with a few of his Twitter followers. After a few tweets back and forth about political polarization, Pfeiffer intended to respond with “also a much bigger factor on the right.” Unfortunately, his errant finger found not the “b” key, but its neighbor “n,” as he spelled “bigger.” He didn’t catch it before sending it to his followers, but he was quick to point out that it was “obviously a horrendous typo.” In 1870, German chemist Erich von Wolf was researching the nutritional benefits of different foods, including spinach. While testing for iron content, he mistakenly placed the decimal point for spinach one spot too far to the right. This meant that the vegetable’s 3.5 grams was inflated to 35 grams. Wolf’s mistake was taken as fact until 1937, when the mistake was discovered and attempts were made to correct public opinion. But by then, the popularity of spinach-munching Popeye had solidified its undeserved reputation In 2013, the Vatican wanted to commemorate the beginning of Pope Francis’ papacy with a big, bold gesture, so they commissioned a series of gold, silver, and bronze medals from the Italian Mint. These tokens featured an image of Jesus with a Latin phrase that the new Pope found particularly inspirational. They were then sold at the Vatican Publishing House in St. Peter’s Square. However, thousands of holy tokens rolled off the line with Christianity’s most revered figure’s name spelled “Lesus.” However, only four were purchased before the rest of the batch was yanked In 1997, Larry Page was in his office at the Gates Computer Science Building at Stanford University with several graduate students, including Sean Anderson. They were having a brainstorming session to think of a name for a website where immense amounts of data would be indexed. Sean suggested “googolplex,” and Larry shortened it to “googol.” Sean immediately ran a domain name search, but mistakenly typed in “google,” which was available. Larry liked the name and within hours he took the step of registering google.com for himself and Sergey Brin That wasn’t Google’s last fuck up! While updating a list of harmful sites on January 31, 2009, one employee accidentally listed “/” as a malicious site, which would be blocked by Google. Since nearly every web address contains a slash, the entire internet came to a halt for about an hour as Google prevented access to every single website. Visitors were turned away with a warning screen, and a complete block page if they continued anyway History of the holiday According to whatnationaldayisit.com, the first detection of National Typo Day occurred on April 6th 2015, but it seems that that may be an error from the algorithm, since National No Typo Day was also first detected on April 6th, 2015 and is actually celebrated on April 6th each year. I searched the hashtag #nationaltypoday on Twitter, and found it in Tweets attached to numerous different dates, including 1/22, 1/28, 3/7, 3/27, 9/9, 6/21, 10/28, 10/17, 11/17, among many many others. Couldn’t find a single one for 9/24 One other social media mention I found was a Facebook post from Gannon’s Gourmet, a family-owned and operated restaurant and catering business in Allentown, Pennsylvania. The post was dated January 29, 2013, and stated, “Today is national typo day so if you are grammaticallyincorrect [sic] you get a free pass. Apple is set to release a 128 gb. Apple ipad 4th. Gen with retina display. Our page would look so good on it. Oh did you know our chicken products are all made with white chicken meat. We focus primarily on the breast for perfect tenderness. Quality produce for you keeps us in business. Thank you all for your continued interest and support. See you at the show….” The post has one comment, from the Gannon’s Gourmet page, saying, “The release date is said to be around feb 5th and geared toward business solutions.” In short, I think Typo Day may be a typo Activities to celebrate Use #NationalTypoDay on social media Visit Gannon’s Gourmet in Allentown PA to enjoy some of their specialties such as their famous “Mom’s Potato Salad”, “Irene’s Tuna Salad”, or a harvest pasta salad with balsamic vinaigrette, all of which are made with NO PRESERVATIVES! Take a typing class? As with every episode, you should celebrate NATIONAL TYPO DAY with our custom mixtape, which I will now present to you in the form of a novel synopsis. This is an age-old story of love, betrayal, loss, and inevitable nihilism from never learning from our fucking mistakes. Most of this story is presented from a female perspective simply due to the nature of the musical artists that sing each song, but our listeners should feel free to imagine themselves in whichever perspective they can most relate to, regardless of gender: Part 1-Chapter 1: Oops by Little Mix featuring Charlie Puth Oops, my baby, you woke up in my bed/Oops, we broke up, we’re better off as friends/Now I accidentally need you, I don’t know what to do/Oops, baby, I love you Chapter 2: Mistakes by Tove Styrke Oh baby, gimme highs and lows/Wanna get close, no clothes/Probably better if I go now/You make me, you make me, you make me wanna make mistakes/Love how bittersweet it tastes/Hey,hey,hey/You make me, you make me, you make me wanna make mistakes/Bend my heart until it breaks/Hey, hey, hey Chapter 3: Mistake by Middle Kids One day you’re fine, the next you’re crying/And suddenly your engine just stops going/Thought you were healthy but you’re choking/It must be catching up, your smoking/I wish that you never played/You’re standing out in the rain tonight/Like you’ve going something to say to God/And you got a debt to pay back/For something you did way back Chapter 4: Whoops by 12th Planet, Mayhem, and pennybirdrabbit He stayed/and I let him/And I swam/To the bottom/He ripped my heart out/I’ve bought my soul out/Whoops I have nothing left to give/Who knows if I’ll sink or swim/Whoops I’ve got nothing left to give/Nothing, Nothing Chapter 5: Hit ‘Em up Style (Oops) by Blu Cantrell Hey ladies/When your man wanna get buck-wild/Just go back and hit ‘em up style/Put your hands on his cash and spend it to the last dime/For all the hard times/Oh, when you go then everything goes/From the crib to the ride and the clothes/So you better let him know that/If he messed up you gotta hit ‘em up Chapter 6: Typo by Lyrica Anderson You say this is the last time/You say you wouldn’t make me cry/You cheated and I don’t know why/You make me feel/You make me feel some typo way Interlude: Typo by Vhsceral Part 2-Chapter 7: Whoops Now by Janet Jackson Out with your friends and/Fun in the sun now/That’s when the phone rings/Friday evening and I’m all alone at home/And all my friends are having fun/Another week and I’ll leave the machine on/Next time he calls/He’ll hear my voice/Saying loud and clear/Whoops now/Sorry I can’t go Chapter 8: Oops (Oh My) by Tweet featuring Missy Elliott I looked over to the left/A reflection of myself/That’s why I couldn’t catch my breath Chapter 9: Typo by cupcakKe Finger me like a typo/Finger, finger me like a typo, ayy Chapter 10: Oops!...I Did It Again by Britney Spears Oops, I did it again/I played with your heart, got lost in the game/Oh baby, baby/Oops, you think I’m in love/That I’m sent from above/I’m not that innocent Chapter 11: Trade Mistakes by Panic! At The Disco I may never sleep tonight/As long as you’re still burning bright/If I could trade mistakes for sheep/Count me away before you sleep/I’ll still wait till I trade my mistakes/So they fade away Interlude: Typo by Rozada Part 3: Chapter 12: Error: Operator by Taking Back Sunday Sometimes I swear I can see right through you/Concentrate, concentrate, control, concentrate/This doesn’t feel like anything/We can’t go back, can’t go back, can’t go back Chapter 13: You Fucked Up by Ween You fucked up, you bitch, you really fucked up/You fucked up, you fuckin’ nazi whore/Well, you dicked me over but now you’ll pay/You fucked up, ahh! Chapter 14: Fucked Up World by The Pretty Reckless It’s a fucked up world/What do you get/Sex and love and guns, light a cigarette SOURCES https://whatnationaldayisit.com/day/Typo/ https://whatnationaldayisit.com/day/no-typo/ https://en.wikipedia.org/wiki/Typographical_error https://www.memecenter.com/search/typo http://mentalfloss.com/article/21687/7-interesting-typo-tales https://listverse.com/2017/03/19/10-horrifyingly-high-profile-typos/ https://www.facebook.com/126014720802614/posts/today-is-national-typo-day-so-if-you-are-grammaticallyincorrect-you-get-a-free-p/432741296796620/ https://en.wikipedia.org/wiki/Sedan_(nuclear_test) Sedan Crater, Nye County, NV

Real Estate Rockstars
SOTM 16: Zillow Sues Compass and Sotheby’s Sued for Cybersquatting

Real Estate Rockstars

Play Episode Listen Later Apr 23, 2019 38:27


After catching fire for launching self-guided tours, Zillow is back in the news this week for another controversial move: suing its property-tech competitor, Compass. Listen to this State of the Market podcast for details on the case and our thoughts on Zillow’s latest drama. Also in this show, we discuss the rise of the PLS and why a Vegas-based broker is suing Sotheby’s for cybersquatting. Learn more about your ad choices. Visit megaphone.fm/adchoices

Own Your Genius with LaConya Murray
14. LL Cool J and Prince Battle Alleged Cybersquatters

Own Your Genius with LaConya Murray

Play Episode Listen Later Dec 4, 2018 15:13


A couple of weeks ago when we're discussing Prince's estate trademarking the color purple, I mention the estate filing a lawsuit against for Domain Capital for cybersquatting. Long story short. Domain Capital loaned money to the previous owner of prince.com. (The previous owner was not Prince) The previous owner defaulted on their loan payments and Domain Capital took over the domain. It's very interesting to note that the domain has been registered since 1995 and Prince in his lifetime never attempted to purchase the domain. Last week I learned that LL Cool J is bringing legal action against the founders of Rock the Bells music festival. He is suing them for trademark infringement, false designation of origin affiliation or association, cyberpiracy and unfair competition. He is also requesting an injunction. Ladies Love Cool James has a lot of claims in his complaint but today we are going to focus on one. Cybersquatting. Cybersquatting is the practice of registering names, especially well-known company or brand names, as Internet domains, in the hope of reselling them at a profit. Top 3 Takeaways 1. Purchasing domains with the intent to sell to the highest buyer is cybersquatting. 2. Register your trademarks with USPTO to strengthen your cybersquatting claim and overall complaint. 3. Ask before you leap. Contact the domain owner before you pursue litigation. The domain owner could have a legitimate purpose for the domain. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

Awesomers.com
EP 35 - Karl Kronenberger - Trademarks Copyrights Cybersquatting and Other Legal Terms

Awesomers.com

Play Episode Listen Later Sep 4, 2018 71:28


Having a good legal defense is just as good as having a good legal offense. On today’s episode, Steve welcomes Karl Kronenberger, an indispensable resource and trusted advisor on issues relating to Internet law, media, and technology. Karl is a seasoned litigator regularly handling complex Internet law issues, such as Internet trademark and copyright infringement, spam litigation defense, Internet defamation and false advertising, cybersquatting, FTC lawsuits, data breaches, website agreements, and privacy disputes. Here are more gold nuggets on today’s episode: Why ignorance is not an excuse, especially in E-commerce. The importance of being proactive in the health and beauty niche. The three founding pillars of Amazon: low price, selection and service. Trademarks, copyrights, cybersquatting, intellectual property, DMCA and other legal terms you need to know. So hit the play button and get valuable legal advice to help you protect your business in the long run. Welcome to the Awesomers.com podcast. If you love to learn, and if you’re motivated to expand your mind, and heck if you desire to break through those traditional paradigms and find your own version of success you are on the right place. Awesomers around the world are on the journey to improve their lives and the lives to those around them. We believe in paying it forward and we fundamentally try to live up to the great Zig Ziglar quote where he said, “You can have everything in your life you want if you help enough other people get what they want.” It doesn’t matter where you came from, it only matters where you’re going. My name is Steve Simonson and I hope you will join me on this Awesomer journey. SPONSOR ADVERTISEMENT If you’re launching a new product manufactured in China, you will need professional high-resolution Amazon ready photographs. Because SymoGlobal has a team of professionals in China, you will oftentimes receive your listings photographs before your product even leaves the country. This streamlined process will save you the time, money and energy needed to concentrate on marketing and other creative content strategies before your item is in stock and ready for sale. Visit SymoGlobal.com to learn more, because a picture should be worth one thousand keywords. 1.15 (Steve introduces today’s guest, Karl Kronenberger.) You're listening to the Awesomers podcast. You're listening to episode number 35 of the Awesomers.com podcast and this is a secret everybody. If you want to find show notes and details just go to Awesomers.com/35 that's Awesomers.com/35 and you'll find any little notes and details. Sometimes we add in links to the book to other things we talk about and it's a great way for you to stay informed. Now, today, my guest is Karl Kronenberger and Karl is an indispensable resource and trusted advisor to his clients on issues related to internet law media and technology. A seasoned litigator, Karl has tried more than twenty jury trials and many more bench trials and he regularly handles complex internet law issues such as internet trademark and copyright infringement, spam litigation defense, internet defamation of false advertising, cybersquatting, FTC lawsuits, data breaches, website agreements and even privacy disputes. Karl thrives on litigating matters whether the legal terrain is uncharted as is often the case in the realm of internet disputes. As a former general counsel to technology and non-technology companies alike, he's handled many of the day-to-day legal issues these companies face including intellectual property issues licensing and distribution agreements and domain disputes. Additionally he handles a variety of transactions of business disputes for services technology and media companies. Karl's even a former prosecutor and an Army Jag Corps officer and he's both aggressive and creative in solving problems and he always maintains the highest level of ethical standards. Karl and his team are so awesome.

eCommerce Fuel
Firing People, MAP Pricing, Cybersquatting & More

eCommerce Fuel

Play Episode Listen Later May 25, 2018 35:06


Internet, Data Privacy, and Intellectual Property Lawyer John DiGiacomo of RevisionLegal.com is back for the third and final part of our series on legal issues. So far, we’ve covered trademarks and patents, and today we’re wrapping up with a grab bag of legal questions to round out our series. Listen in to hear John’s insight and advice on a whole random host of legal issues that affect ecommerce entrepreneurs. You can find show notes and more information by clicking here: http://bit.ly/2JNV2St 

Domain Name Wire Podcast
Cybersquatting and RDNH w/ Jason Schaeffer – DNW Podcast #120

Domain Name Wire Podcast

Play Episode Listen Later Jan 23, 2017 39:23


Learn the ins and outs of cybersquatting UDRP cases and reverse domain name hijacking. How can you defend yourself against claims of cybersquatting, and what’s Reverse Domain Name Hijacking? Jason Schaeffer and his firm ESQwire.com have won lots of reverse domain name hijacking cases on behalf of clients, and he gives the details on today’s […] Post link: Cybersquatting and RDNH w/ Jason Schaeffer – DNW Podcast #120 © DomainNameWire.com 2020. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.

schaeffer cybersquatting udrp domainnamewire dnw
Unanimous Dissent
Erdogan To Give You Up, Erdogan To Let You Down

Unanimous Dissent

Play Episode Listen Later Jul 19, 2016 51:21


Following the failed coup attempt in Turkey, the US is dealing with some thorny foreign policy questions. The two Sams examine one posited by journalist Glenn Greenwald: Can Turkey drones the man they allege was behind in the coup, Fethullah Gulen, who lives in Pennsylvania?And, the DCist’s Rachel Kurzius is on the show to talk about domain-squatting and the 2016 election. Find out how you can get rich by purchasing political website addresses. Finally, the Two Sams hash through more of the reaction to the release of the 28 pages of the 9/11 Commission Report--on allegations of Saudi involvement in the attacks. Most of Washington wasn’t prepared for the Friday News Dump.

Unanimous Dissent
Erdogan To Give You Up, Erdogan To Let You Down

Unanimous Dissent

Play Episode Listen Later Jul 18, 2016 51:21


Following the failed coup attempt in Turkey, the US is dealing with some thorny foreign policy questions. The two Sams examine one posited by journalist Glenn Greenwald: Can Turkey drones the man they allege was behind in the coup, Fethullah Gulen, who lives in Pennsylvania?And, the DCist’s Rachel Kurzius is on the show to talk about domain-squatting and the 2016 election. Find out how you can get rich by purchasing political website addresses. Finally, the Two Sams hash through more of the reaction to the release of the 28 pages of the 9/11 Commission Report--on allegations of Saudi involvement in the attacks. Most of Washington wasn’t prepared for the Friday News Dump.

Domain Name Wire Podcast
A Crazy Cybersquatting Lawsuit with Jason Kneen – DNW Podcast #43

Domain Name Wire Podcast

Play Episode Listen Later Jul 27, 2015 47:39


The inside story of a baseless cybersquatting lawsuit. Imagine that you’re an app developer who has registered a handful of domain names over the years. One day your twitter feed and phone lights up with people discussing how you’re being sued over one of the domain names you own. That’s exactly what happened to Jason […] Post link: A Crazy Cybersquatting Lawsuit with Jason Kneen – DNW Podcast #43 © DomainNameWire.com 2020. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.

lawsuit cybersquatting domainnamewire dnw
Domain Name Wire Podcast
John Berryhill on domain name law and cybersquatting – DNW Podcast #35

Domain Name Wire Podcast

Play Episode Listen Later Jun 1, 2015 56:21


Protect yourself from cybersquatting claims. What happens when a company thinks you’re cybersquatting on one of its trademarks? Domain name attorney John Berryhill has helped people defend many such accusations. On this episode he explains what a company has to prove in the Uniform Domain Name Dispute Resolution Policy (UDRP). He also discusses some common […] Post link: John Berryhill on domain name law and cybersquatting – DNW Podcast #35 © DomainNameWire.com 2020. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.

protect domain domain names cybersquatting domainnamewire dnw john berryhill
TLDR
#47 - JebBushforPresident.com

TLDR

Play Episode Listen Later Feb 26, 2015 12:24


CJ Philips and Charlie Rainwater bought JebBushforPresident.com back in 2008 -- but not because they're huge Bush fans or want to sell the address at a markup. With the 2016 election approaching, the pair have launched the site as a place for discussion, with a focus the URL might not suggest. This week, CJ and Charlie tell TLDR about what inspired their initial purchase, their plans for JebBushforPresident.com, and what a CJ and Charlie presidency would look like. To join the discussion at JebBushforPresident.com, click here. To check out Santorum-2012.com, click here. If you like our show, please subscribe and review us on iTunes, or wherever you get your podcasts. You can also follow Meredith and TLDR on Twitter.

DomainSherpa.com
7 Steps to Protect Your Trademarks from Domain Name Cybersquatters

DomainSherpa.com

Play Episode Listen Later Jan 19, 2015


There are proactive steps you can take now to prevent cybersquatting. Understanding the seven steps discussed in this interview should be your top priority if your company owns a trademark.

DomainSherpa.com
Do Not Register Trademark-infringing Domain Names – With David Weslow

DomainSherpa.com

Play Episode Listen Later Feb 24, 2014 7:05


Every day new domain name investors and speculators overlook the financial risk associated with registering a domain name that infringes on an existing trademark – a mistake that could cost them more than $100,000. If you’re a new domain name investor or speculator, learn how to avoid the mistake that could cost you $100,000.

Probably Science
Episode 046 - Taylor Williamson

Probably Science

Play Episode Listen Later Nov 12, 2012 71:19


Comedian Taylor Williamson (taylorwilliamson.com) of Last Comic Standing joins Matt and Andy this week to talk about: Election results! Bad presidential impressions! The historic Alex Theatre! Jeopardy! Novelizations of Jim Carrey movies! Acid rain experiments! Fake anti-Semitism! Beakman's World! Grapple forks and rock buckets! Watching Simon Pegg movies with subtitles! Show-off sharks! Aladdin sequels! Math anxiety creates actual pain! High school Republicanism! The diabetes/flu link! Doubling down on jokes that don't work! Being poor causes bad decision-making! Bar mitzvah DJ sets! Cybersquatting! Shia LaBeuof naked! Growing charity facial hair!

DomainSherpa.com
Everything You’ve Ever Wanted to Know About UDRP – With David Weslow

DomainSherpa.com

Play Episode Listen Later Oct 8, 2012 77:26


Domain name disputes are happening more frequently every day. Why? And how can a UDRP impact you as an entrepreneur or domain name investor?

domain godaddy ever wanted acpa enom cybersquatting wiley rein udrp
Davis McGrath LLC
Trademarks and Domain Names Webinar

Davis McGrath LLC

Play Episode Listen Later Mar 8, 2012 31:11


Here is the recording of the March 7, 2012 webinar on “Trademarks and Domain Names.” In this webinar, we cover: – Trademark Overview – Domain Name Overview – Domain Name Formats – Domain Names as Trademarks – Domain Names Including Trademarks – UDRP – ACPA – Cybersquatting and Typosquatting – Hypotheticals View on YouTube The...

IP Counsel
ICANN's expansion of generic Top-Level Domains (gTLDs)

IP Counsel

Play Episode Listen Later May 31, 2011 46:15


On this edition of IP Counsel, host Attorney Peter Lando, partner at the firm of Lando & Anastasi, LLP, welcomes Mary Wong, Professor of Law at the University of New Hampshire School of Law, and Director of the School's Franklin Pierce Center for Intellectual Property, to discuss plans of the Internet Corporation for Assigned Names and Numbers (ICANN) for new gTLDs and how they will be implemented. Peter and Mary take a look at several concerns raised by the international business community and how ICANN has attempted to address each of these issues.