Cloud

8/5/2016
08:30 PM
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

New Internet Security Domains Debut

Meet the new .security and .protection domains.

Registry operator gen.xyz these week launched two new top-level Internet domains -- .security and .protection -- aimed at creating websites with higher security as well as a safer online experience for end users.

Registrants can use domains to reinforce a brand, organization name, service locations, or industry keywords, says Nils Decker, director of business development for gen.xyz.  

Big security players such as Norton, FireEye, and Masterlock, have already registered names with the new .security and .protection domains.  An organization in Southern California, for example, might select la.security; spam.protection could do the trick for an email filtering company. 

Early adopters of the new domains include Microsoft's office365.protection site; IBM managed security provider blue.security; arrow.security (formerly arrowsecuritycorp.com); and grupo.security (formerly security.cl).

Registrants are strongly encouraged – but not required by gen.xyz -- to use both SSL and DNSSEC to bolster security. The protocols ensure that "a website visitor that the company behind the website is a legitimate company, and that they're actually talking to who they think you're talking to, not a phisher or malicious site," Decker says.

Pricing for the new domains is relatively expensive, between $2,500 and $4,000. Decker and gen.xyz are counting on that high price point to discourage spammers and miscreants from using the domains as covers for malicious activity or spoofing.

"If the technology creates more security awareness or makes customers more comfortable, they're more likely to succeed," says domain name expert Monte Cahn, president of Rightofthedot, which advises on top-level domain strategies. Cahn notes that he hasn't seen the details of gen.xyz's announcement, but did note that other more recently introduced domains such as .bank and .insurance, have been well-received. However, those domains also come with special registration forms to verify that would-be registrants are in fact part of the industries they say they are, Cahn notes.

Decker says gen.xyz isn't doing any verification itself, but rather leaving that up to SSL providers such as Symantec or Comodo. "At a high level, we are the registry operator, so we control the name space, but don't sell the names themselves," Decker says. "End-user companies go to GoDaddy or Web.com for that."

Because the domains are so new and considered premium domains, availability is quite good, Decker says, in contrast to .com or .org, which are much more picked over.

 

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
clipartsgram
50%
50%
clipartsgram,
User Rank: Apprentice
10/31/2016 | 10:09:38 PM
Re: Clipart
yeah! I agree with you.This post very benefit for everyone.
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
10/17/2016 | 12:08:21 PM
Re: Identity theft
It's a good reminder that these new domains, in and of themselves, are not inherently secure, lorraine89. Humans still need to add basic protections and anonymizing features, like the ones you've suggested.
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
10/17/2016 | 11:54:09 AM
Identity theft
New domains are pretty much vulnerable to data theft. That is why it is important to deploy some good security software and hide your IP using a genuine vpn server like PureVPN. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/19/2016 | 9:38:58 AM
online security
Great article. I always take extra caution in maintaining my online privacy and security. I deploy vpn server, purevpn, to maintain my online integrity and to avoid any type of scams and phishy threats. 
Shantaram
50%
50%
Shantaram,
User Rank: Ninja
9/15/2016 | 5:00:16 AM
192.168.l.l
This article gives the light in which we can observe the reality. This is very nice one and gives in-depth information. Thanks for this nice article
showtime33
50%
50%
showtime33,
User Rank: Apprentice
8/22/2016 | 9:31:04 AM
Re: The Irony of It
Finally....some smarts about TLD's.  Exactly right, a new domain name is just another thing to block.  Making it harder to defend by adding extensions to block.  Ask people that fix pc's in the trenches and you will find that .biz, .casino,..etc... is just another way to launch a malware link to compromise a pc.  Malware can still use .security to launch randsomware for example.  duh...adding them does nothing for protection for anyone. The irony is right....lol
umutarcn
50%
50%
umutarcn,
User Rank: Apprentice
8/9/2016 | 11:31:05 PM
Quotes
Thanks, for the information on SSL and domain details.
SEO..
50%
50%
SEO..,
User Rank: Apprentice
8/9/2016 | 11:40:49 AM
Does it really matter to have .com
Thanks, for the information on SSL. On other hand, recently I read an atricle which said it's no more important to have domain as .com it can be anything google no more consider much weightage on this domain scenario. I am planning to buy one as a web designer - let me know your thought's  
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Ninja
8/9/2016 | 10:16:52 AM
Re: Worth a try
Yes agreed as well, one protection or measure is never enough.  I am looking at it more as an additional potential measure.
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
8/9/2016 | 10:11:41 AM
Re: Worth a try
Agreed, Juliette... but a simple domain in and of itself will not convey security on a website or its visitors. Regardless of what your domain is, there's plenty that still needs to happen on the backend to lock down and protect hardware, data and users.
Page 1 / 2   >   >>
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.