markmonitor.com

Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (20)

1

0 Thumbs up   0 Thumbs down

Brandjacking


To hijack a brand to deceive or divert attention; often used in abusive or fraudulent activities devised for gain at the expense of the goodwill, brand equity and customer trust of actual brand owners [..]
Source: markmonitor.com

2

0 Thumbs up   0 Thumbs down

Counterfeiting


The sale of fake physical goods. May occur in the physical world, or on B2B exchanges, auction sites, eCommerce sites, or in spam.
Source: markmonitor.com

3

0 Thumbs up   0 Thumbs down

Cybersquatting


The practice of abusing trademarks within the domain name system. Brand names—spelled correctly or, in a practice known as typosquatting, spelled incorrectly—are used within a domain name, enabling th [..]
Source: markmonitor.com

4

0 Thumbs up   0 Thumbs down

darknet


A network that can only be accessed with specific software, configurations or authorization such as Tor (The Onion Router) browser. The darknet is a small subset of the deep web.
Source: markmonitor.com

5

0 Thumbs up   0 Thumbs down

deep web


Un-indexed Web pages that cannot be accessed via a regular browser or search engine.
Source: markmonitor.com

6

0 Thumbs up   0 Thumbs down

Malware


Occurs when an illicit site or email attachment installs malware, viruses, keyloggers or other software that automatically steals usernames, passwords and additional information without a user's [..]
Source: markmonitor.com

7

0 Thumbs up   0 Thumbs down

phishing


Criminal use of email to divert traffic to websites in order to fraudulently acquire usernames, passwords, credit card details and other personal information. The email and websites used in these oper [..]
Source: markmonitor.com

8

0 Thumbs up   0 Thumbs down

piracy


The sale of fake digital goods such as music, movies, software and gaming software. May occur on B2B exchanges, auction sites, eCommerce sites, in spam and through peer-to-peer (P2P) networks.
Source: markmonitor.com

9

0 Thumbs up   0 Thumbs down

spam


The sending of unsolicited emails—frequently leveraging well-known brands—in order to divert traffic to illicit sites of every type. To encourage recipients to click through, spammers design their ema [..]
Source: markmonitor.com

10

0 Thumbs up   0 Thumbs down

typosquatting


Using brand names spelled incorrectly within a domain name, which enables the squatter to divert traffic meant for a legitimate site to an illicit site which may sell counterfeit goods, utilize pay-pe [..]
Source: markmonitor.com


To view all 20 definitions, please sign in.