In this blog post we outline the several types of domain takeover and hijacking that are possible, investigate their potential causes, the harm or damage that can result should they be exploited, and how they can best be both prevented from occurring, or else detected should the worst happen.