phishing<\/a> and use of similar-sounding domain names for fraudulent purposes. Additionally, persons could be misled to visit websites other than the ones desired, which would not only divert traffic from those websites, but also could potentially undermine wel-known brands and businesses. Hence organisations and domain name owners may have to be even\u00a0more vigilant, and perhaps make greater provision to challenge questionable domain registrations, or those that might conflict, or could be confused, with their legitimate operations.<\/p>\n\u00a0____________<\/p>\n","protected":false},"excerpt":{"rendered":"
There are over 20 generic top-level domains (gTLDs) wwhen naming websites, but more will be added soon. What are some of the pros and cons of this move? To varying […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,27,11,6],"tags":[71,32,43,51],"class_list":["post-4523","post","type-post","status-publish","format-standard","hentry","category-business","category-computing","category-ict-tech","category-internet","tag-businesses","tag-information-society","tag-internet-governance","tag-websites","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-1aX","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=4523"}],"version-history":[{"count":6,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4523\/revisions"}],"predecessor-version":[{"id":83257,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4523\/revisions\/83257"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=4523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=4523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=4523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}