{"id":414,"date":"2022-06-16T11:53:05","date_gmt":"2022-06-16T09:53:05","guid":{"rendered":"https:\/\/www.nameshield.com\/de\/?page_id=414"},"modified":"2022-11-18T09:14:55","modified_gmt":"2022-11-18T08:14:55","slug":"cybersquatting","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/","title":{"rendered":"Cybersquatting"},"content":{"rendered":"\n<div class=\"eplus-g8WmOJ wp-block-cover alignfull is-light eplus-wrapper\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim has-background-gradient\" style=\"background:linear-gradient(135deg,rgb(21,115,191) 0%,rgb(255,0,0) 100%)\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"eplus-jHQ0mn wp-block-spacer eplus-wrapper\"><\/div>\n\n\n<div class=\"eplus-yhMUPb wp-block-columns eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-154a25\">\n<div class=\"eplus-uZP09p wp-block-column is-vertically-aligned-center eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"eplus-pEGYgg has-nv-text-dark-bg-color has-text-color eplus-wrapper wp-block-heading\">Was ist Cybersquatting?<\/h2>\n\n\n\n<p class=\"eplus-GJzB3Y has-nv-text-dark-bg-color has-text-color eplus-wrapper\">Cybers\u00adquat\u00adting ist die Pra\u00adxis, einen Domain\u00adna\u00admen anzu\u00admel\u00adden, der einem Mar\u00adken\u00adna\u00admen, Han\u00addels\u00adna\u00admen, Nach\u00adna\u00admen oder belie\u00adbi\u00adgen Namen, an dem der Anmel\u00adden\u00adde kei\u00adne Rech\u00adte besitzt, \u00e4hnelt und die\u00adsen zu \u00fcber\u00adneh\u00admen, um mate\u00adri\u00adel\u00adlen oder ideel\u00adlen Gewinn aus sei\u00adnem aktu\u00adel\u00adlen oder zuk\u00fcnf\u00adti\u00adgen Bekannt\u00adheits\u00adgrad zu zie\u00adhen.<\/p>\n<\/div>\n\n\n\n<div class=\"eplus-2RXwNF wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"eplus-JfLJ7b wp-block-image size-large eplus-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png\" alt=\"Cybersquatting\" class=\"wp-image-5082\"><\/figure>\n<\/div>\n<\/div>\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"eplus-iVeaWN wp-block-spacer eplus-wrapper\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:61px\" aria-hidden=\"true\" class=\"eplus-wA6jDr wp-block-spacer eplus-wrapper\"><\/div>\n\n\n<div class=\"eplus-fBVVoN wp-block-columns eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-e39a13\">\n<div class=\"eplus-q8T7Ks wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"eplus-T6jPMR eplus-wrapper\"><strong>Cybers\u00adquat\u00adting kann unter\u00adschied\u00adli\u00adche Zie\u00adle haben:<\/strong><\/p>\n\n\n<ul class=\"eplus-wrapper wp-block-list eplus-styles-uid-0ec5da\"><li>Wei\u00adter\u00adver\u00adkauf des Domain\u00adna\u00admens an den recht\u00adm\u00e4\u00ad\u00dfi\u00adgen Mar\u00adken\u00adin\u00adha\u00adber<\/li><li>Blo\u00adckie\u00adren des Zugangs zu dem Namen, der Mar\u00adke<\/li><li>Image\u00adsch\u00e4\u00addi\u00adgung der ent\u00adspre\u00adchen\u00adden Mar\u00adke oder des ent\u00adspre\u00adchen\u00adden Unter\u00adneh\u00admens, bei\u00adspiels\u00adwei\u00adse durch das ver\u00adbin\u00adden des Domain\u00adna\u00admens mit einer por\u00adno\u00adgra\u00adfi\u00adschen Sei\u00adte<\/li><li>Nut\u00adzung des Bekannt\u00adheits\u00adgrads der Mar\u00adke, um mit\u00adhil\u00adfe des Domain\u00adna\u00admens Traf\u00adfic auf die Web\u00adsite zu len\u00adken<\/li><li>Ver\u00adbin\u00addung des Domain\u00adna\u00admens mit einer betr\u00fc\u00adge\u00adri\u00adschen Web\u00adsite, die f\u00fcr einen Phis\u00adhing-Angriff ver\u00adwen\u00addet wird oder um einem durch Spam ver\u00adbrei\u00adte\u00adten Betrug Glaub\u00adw\u00fcr\u00addig\u00adkeit zu ver\u00adlei\u00adhen<\/li><li>Ver\u00adbin\u00addung des Domain\u00adna\u00admens mit einer Web\u00adsite, die gef\u00e4lsch\u00adte Pro\u00adduk\u00adte anbie\u00adtet<\/li><li>Ver\u00adwen\u00addung des Domain\u00adna\u00admens f\u00fcr den Ver\u00adsand von Spam-Mails.<\/li><\/ul>\n\n\n<div class=\"wp-block-group eplus-wrapper\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"eplus-kgtkzR wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\" eplus-wrapper\">Man\u00adche Cybers\u00adquat\u00adter nut\u00adzen auto\u00adma\u00adti\u00adsche Sys\u00adte\u00adme f\u00fcr die \u00dcber\u00adwa\u00adchung von Domain\u00adna\u00admen bekann\u00adter Unter\u00adneh\u00admen, in der Hoff\u00adnung, dass die\u00adse ver\u00adges\u00adsen, ihre Domain\u00adna\u00admen zu erneu\u00adern. Die\u00adse Namen wer\u00adden dann sofort wie\u00adder ange\u00admel\u00addet, um finan\u00adzi\u00adel\u00adle Ver\u00adhand\u00adlun\u00adgen ein\u00adzu\u00adlei\u00adten\u2026<\/p>\n\n\n\n<h2 class=\"eplus-Z0GXOj eplus-wrapper wp-block-heading\"><strong>Wie kann man sich vor Cybersquatting sch\u00fctzen?<\/strong><\/h2>\n\n\n<ul class=\"eplus-wrapper wp-block-list eplus-styles-uid-fe4b6e\"><li>Names\u00adhield stellt Ihnen ein Sys\u00adtem f\u00fcr die \u00dcber\u00adwa\u00adchung der Anmel\u00addung von Mar\u00adken- und Domain\u00adna\u00admen zur Ver\u00adf\u00fc\u00adgung, damit Sie bei F\u00e4l\u00adlen von Cybers\u00adquat\u00adting, die Ihre Mar\u00adken\u00adrech\u00adte ver\u00adlet\u00adzen, umge\u00adhend gewarnt wer\u00adden<\/li><li>Um gegen die\u00adse Cybers\u00adquat\u00adting-Akti\u00advi\u00adt\u00e4t vor\u00adzu\u00adge\u00adhen und Ihre Rech\u00adte gel\u00adtend zu machen, wird ein Team von Names\u00adhield-Exper\u00adten geziel\u00adte Gegen\u00adma\u00df\u00adnah\u00admen f\u00fcr die Wie\u00adder\u00aderlan\u00adgung Ihrer Rech\u00adte an dem von Cybers\u00adquat\u00adting betrof\u00adfe\u00adnen Domain\u00adna\u00admen ein\u00adlei\u00adten.<\/li><\/ul>\n\n\n<div style=\"height:51px\" aria-hidden=\"true\" class=\"eplus-pA3eWB wp-block-spacer eplus-wrapper\"><\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybers\u00adquat\u00adting kann unter\u00adschied\u00adli\u00adche Zie\u00adle haben: Wei\u00adter\u00adver\u00adkauf des Domain\u00adna\u00admens an den recht\u00adm\u00e4\u00ad\u00dfi\u00adgen Mar\u00adken\u00adin\u00adha\u00adber Blo\u00adckie\u00adren des Zugangs zu dem Namen, der Mar\u00adke Image\u00adsch\u00e4\u00addi\u00adgung der ent\u00adspre\u00adchen\u00adden Mar\u00adke oder des ent\u00adspre\u00adchen\u00adden Unter\u00adneh\u00admens, bei\u00adspiels\u00adwei\u00adse durch das ver\u00adbin\u00adden des Domain\u00adna\u00admens mit einer por\u00adno\u00adgra\u00adfi\u00adschen Sei\u00adte Nut\u00adzung des Bekannt\u00adheits\u00adgrads der Mar\u00adke, um mit\u00adhil\u00adfe des Domain\u00adna\u00admens Traf\u00adfic auf die Web\u00adsite zu len\u00adken Ver\u00adbin\u00addung des\u2026&nbsp;<a href=\"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/\" class rel=\"bookmark\">Wei\u00adter\u00adle\u00adsen \u00bb<span class=\"screen-reader-text\">Cybers\u00adquat\u00adting<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":391,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-414","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersquatting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersquatting\" \/>\n<meta property=\"og:description\" content=\"Cybers\u00adquat\u00adting kann unter\u00adschied\u00adli\u00adche Zie\u00adle haben: Wei\u00adter\u00adver\u00adkauf des Domain\u00adna\u00admens an den recht\u00adm\u00e4\u00ad\u00dfi\u00adgen Mar\u00adken\u00adin\u00adha\u00adber Blo\u00adckie\u00adren des Zugangs zu dem Namen, der Mar\u00adke Image\u00adsch\u00e4\u00addi\u00adgung der ent\u00adspre\u00adchen\u00adden Mar\u00adke oder des ent\u00adspre\u00adchen\u00adden Unter\u00adneh\u00admens, bei\u00adspiels\u00adwei\u00adse durch das ver\u00adbin\u00adden des Domain\u00adna\u00admens mit einer por\u00adno\u00adgra\u00adfi\u00adschen Sei\u00adte Nut\u00adzung des Bekannt\u00adheits\u00adgrads der Mar\u00adke, um mit\u00adhil\u00adfe des Domain\u00adna\u00admens Traf\u00adfic auf die Web\u00adsite zu len\u00adken Ver\u00adbin\u00addung des&hellip;&nbsp;Weiterlesen &raquo;Cybersquatting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-18T08:14:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/\",\"name\":\"Cybersquatting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Cybersquatting-1024x1003.png\",\"datePublished\":\"2022-06-16T09:53:05+00:00\",\"dateModified\":\"2022-11-18T08:14:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Cybersquatting-1024x1003.png\",\"contentUrl\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Cybersquatting-1024x1003.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cybersquatting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossar\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersquatting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersquatting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersquatting","og_description":"Cybers\u00adquat\u00adting kann unter\u00adschied\u00adli\u00adche Zie\u00adle haben: Wei\u00adter\u00adver\u00adkauf des Domain\u00adna\u00admens an den recht\u00adm\u00e4\u00ad\u00dfi\u00adgen Mar\u00adken\u00adin\u00adha\u00adber Blo\u00adckie\u00adren des Zugangs zu dem Namen, der Mar\u00adke Image\u00adsch\u00e4\u00addi\u00adgung der ent\u00adspre\u00adchen\u00adden Mar\u00adke oder des ent\u00adspre\u00adchen\u00adden Unter\u00adneh\u00admens, bei\u00adspiels\u00adwei\u00adse durch das ver\u00adbin\u00adden des Domain\u00adna\u00admens mit einer por\u00adno\u00adgra\u00adfi\u00adschen Sei\u00adte Nut\u00adzung des Bekannt\u00adheits\u00adgrads der Mar\u00adke, um mit\u00adhil\u00adfe des Domain\u00adna\u00admens Traf\u00adfic auf die Web\u00adsite zu len\u00adken Ver\u00adbin\u00addung des&hellip;&nbsp;Weiterlesen &raquo;Cybersquatting","og_url":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/","og_site_name":"Nameshield","article_modified_time":"2022-11-18T08:14:55+00:00","og_image":[{"url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/","url":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/","name":"Cybersquatting","isPartOf":{"@id":"https:\/\/www.nameshield.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png","datePublished":"2022-06-16T09:53:05+00:00","dateModified":"2022-11-18T08:14:55+00:00","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/#primaryimage","url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png","contentUrl":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/de\/glossar\/cybersquatting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.nameshield.com\/de\/"},{"@type":"ListItem","position":2,"name":"Glossar","item":"https:\/\/www.nameshield.com\/de\/glossar\/"},{"@type":"ListItem","position":3,"name":"Cybersquatting"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/de\/#website","url":"https:\/\/www.nameshield.com\/de\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":3,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/414\/revisions"}],"predecessor-version":[{"id":904,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/414\/revisions\/904"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/391"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/media?parent=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}