Feeds

Tom Cruise continues net crusade

Sends in the lawyers to recapture his name

3 Big data security analytics techniques

Tom Cruise has embarked on a crusade to win back his name right across the net.

Not content with taking notorious cybersquatter Jeff Burgar to WIPO for control of TomCruise.com, the diminutive film star has sent in the lawyers to get hold of other domains sporting his name.

As a result, both TomCruise.net and TomCruise.org are now in the hands of domain legal specialists Trout & Zimmer, hired by Tom to ensure that a nasty outbreak of online Tom Cruise mockery is held at bay.

It's unknown whether Cruise intends to do anything with the domains, or how far the net crusade will go. As things stand, of the other global top-level domains he doesn't have, tomcruise.info is owned by Konstantinos Zournas in Greece; tomcruise.biz by Domain Registry Support in New York; and tomcruise.name by Korean company called Yesnic Co Ltd.

Can we expect the owner of country-code domains such as TomCruise.co.uk or TomCruise.de to be next on the list for special attention? Only time will tell.

In the meantime, Cruise continues to be a figure of fun on the net, with large numbers of bloggers relishing in the fact that his latest film, Mission Impossible III, did not have the opening week success that was expected. Also, TomCruiseIsNuts.com is currently the third ranked link in a Google search for the great man.®

Top three mobile application threats

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.