{"id":1741,"date":"2021-09-29T17:21:12","date_gmt":"2021-09-29T15:21:12","guid":{"rendered":"https:\/\/dev.nameshield.com\/en\/?page_id=1741"},"modified":"2022-12-22T15:19:22","modified_gmt":"2022-12-22T14:19:22","slug":"usurpation","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/","title":{"rendered":"Usurpation"},"content":{"rendered":"\n<div class=\"eplus-g8WmOJ wp-block-cover alignfull is-light eplus-wrapper\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim has-background-gradient\" style=\"background:linear-gradient(135deg,rgb(21,115,191) 0%,rgb(255,0,0) 100%)\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"eplus-jHQ0mn wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<h2 class=\"eplus-lTMGYF has-nv-text-dark-bg-color has-text-color eplus-wrapper wp-block-heading\"><strong>How to fight against online usurpation?<\/strong><\/h2>\n\n\n<div class=\"eplus-yhMUPb wp-block-columns eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-867ebd\">\n<div class=\"eplus-uZP09p wp-block-column is-vertically-aligned-center eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"eplus-FmFp8S has-nv-text-dark-bg-color has-text-color eplus-wrapper\"><strong><em>Usurpa\u00adtion<\/em><\/strong> is a broad term refer\u00adring to dif\u00adfer\u00adent types of attacks.<\/p>\n\n\n\n<p class=\"eplus-wb3eGy has-nv-text-dark-bg-color has-text-color eplus-wrapper\">For online brands, there is a form of phish\u00ading in which the hack\u00ader uses the domain name of a com\u00adpa\u00adny to steal its iden\u00adti\u00adty or that of one of its employ\u00adees. <\/p>\n\n\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"eplus-uxDmDa wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<div class=\"eplus-2rWS0k wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-primary eplus-Bc5oBC wp-block-button eplus-wrapper eplus-styles-uid-7f85bb\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/glossary\/typosquatting\/\">Learn more about typosquat\u00adting<\/a><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"eplus-2RXwNF wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"eplus-pAHwDv wp-block-image size-large eplus-wrapper\"><img decoding=\"async\" src=\"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png\" alt=\"Online usurpation - Nameshield\" class=\"wp-image-5082\"><\/figure>\n<\/div>\n<\/div>\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"eplus-OWUWx9 wp-block-spacer eplus-wrapper\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"eplus-HMJws2 wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<p class=\"eplus-qnNMKz eplus-wrapper\"><strong><em>Online usurpa\u00adtion<\/em><\/strong> involves send\u00ading fraud\u00adu\u00adlent emails cre\u00adat\u00aded from domain names that are sim\u00adi\u00adlar to the brand, which may appear legit\u00adi\u00admate to the recip\u00adi\u00adents and link to copy web\u00adsites.<\/p>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"eplus-z2tWwE wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<div class=\"eplus-APYhEF wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"eplus-IY8axV is-style-primary wp-block-button eplus-wrapper eplus-styles-uid-e57e24\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/brand-protection\/domain-names-monitoring\/\">Find out about domain names mon\u00adi\u00adtor\u00ading<\/a><\/div><\/div>\n\n\n\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"eplus-QYRATr wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<p class=\"eplus-l6WmK8 eplus-wrapper\">Of course, <strong><em>usurpa\u00adtion<\/em><\/strong> is also com\u00admon on social net\u00adworks where the cre\u00adation of fake pro\u00adfiles of com\u00adpa\u00adnies and indi\u00advid\u00adu\u00adals are wide\u00adspread. The only solu\u00adtion is to mon\u00adi\u00adtor social net\u00adworks in order to detect usurpa\u00adtions as soon as pos\u00adsi\u00adble and to act to stop the attack<\/p>\n\n\n\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"eplus-Xl4ejG wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<div class=\"eplus-xfvwxE wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-primary eplus-Syy9x1 wp-block-button eplus-wrapper eplus-styles-uid-0ed59f\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/brand-protection\/domain-names-monitoring\/\">Find out web and social mon\u00adi\u00adtor\u00ading <\/a><\/div><\/div>\n\n\n\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"eplus-zL2Dk7 wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<p class=\"eplus-nhaMf9 eplus-wrapper\">Once infringe\u00adments are detect\u00aded, there are <strong><em>reme\u00addi\u00ada\u00adtion <\/em><\/strong>solu\u00adtions to stop the attack as quick\u00adly as pos\u00adsi\u00adble. Nameshield\u00ad\u2019s inter\u00adnal legal depart\u00adment, expert in online trade\u00admarks infringe\u00adments, will advise you on the most appro\u00adpri\u00adate pro\u00adce\u00addure to imple\u00adment.<\/p>\n\n\n\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"eplus-BwOJu7 wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<div class=\"eplus-od8mfG wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-primary eplus-Gu3Rew wp-block-button eplus-wrapper eplus-styles-uid-2fc934\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/brand-protection\/recovery-procedures-and-paralegal-actions\/\">Find out about our  reme\u00addi\u00ada\u00adtion solu\u00adtions<\/a><\/div><\/div>\n\n\n\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"eplus-AoA2vN wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"eplus-fZUTsW wp-block-spacer eplus-wrapper\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Online usurpa\u00adtion involves send\u00ading fraud\u00adu\u00adlent emails cre\u00adat\u00aded from domain names that are sim\u00adi\u00adlar to the brand, which may appear legit\u00adi\u00admate to the recip\u00adi\u00adents and link to copy web\u00adsites. Of course, usurpa\u00adtion is also com\u00admon on social net\u00adworks where the cre\u00adation of fake pro\u00adfiles of com\u00adpa\u00adnies and indi\u00advid\u00adu\u00adals are wide\u00adspread. The only solu\u00adtion is to mon\u00adi\u00adtor\u2026&nbsp;<a href=\"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/\" class rel=\"bookmark\">Read More \u00bb<span class=\"screen-reader-text\">Usurpa\u00adtion<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":861,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"full-width","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-1741","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Online usurpation - What is this attack and how to fight against it<\/title>\n<meta name=\"description\" content=\"What\u2019s an online usurpation? How to protect against these attacks? Find the answers on the Nameshield&#039;s website, the cybersecurity expert.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online usurpation - What is this attack and how to fight against it\" \/>\n<meta property=\"og:description\" content=\"What\u2019s an online usurpation? How to protect against these attacks? Find the answers on the Nameshield&#039;s website, the cybersecurity expert.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-22T14:19:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/\",\"name\":\"Online usurpation - What is this attack and how to fight against it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Cybersquatting-1024x1003.png\",\"datePublished\":\"2021-09-29T15:21:12+00:00\",\"dateModified\":\"2022-12-22T14:19:22+00:00\",\"description\":\"What\u2019s an online usurpation? How to protect against these attacks? Find the answers on the Nameshield's website, the cybersecurity expert.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Cybersquatting-1024x1003.png\",\"contentUrl\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Cybersquatting-1024x1003.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/usurpation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/glossary\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Usurpation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online usurpation - What is this attack and how to fight against it","description":"What\u2019s an online usurpation? How to protect against these attacks? Find the answers on the Nameshield's website, the cybersecurity expert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/","og_locale":"en_US","og_type":"article","og_title":"Online usurpation - What is this attack and how to fight against it","og_description":"What\u2019s an online usurpation? How to protect against these attacks? Find the answers on the Nameshield's website, the cybersecurity expert.","og_url":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/","og_site_name":"Nameshield","article_modified_time":"2022-12-22T14:19:22+00:00","og_image":[{"url":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/","url":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/","name":"Online usurpation - What is this attack and how to fight against it","isPartOf":{"@id":"https:\/\/www.nameshield.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/#primaryimage"},"thumbnailUrl":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png","datePublished":"2021-09-29T15:21:12+00:00","dateModified":"2022-12-22T14:19:22+00:00","description":"What\u2019s an online usurpation? How to protect against these attacks? Find the answers on the Nameshield's website, the cybersecurity expert.","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/#primaryimage","url":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png","contentUrl":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/06\/Cybersquatting-1024x1003.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/en\/glossary\/usurpation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.nameshield.com\/en\/glossary\/"},{"@type":"ListItem","position":2,"name":"Usurpation"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/en\/#website","url":"https:\/\/www.nameshield.com\/en\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/comments?post=1741"}],"version-history":[{"count":6,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1741\/revisions"}],"predecessor-version":[{"id":2153,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1741\/revisions\/2153"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/861"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/media?parent=1741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}