Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/5/2016
08:30 PM
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

New Internet Security Domains Debut

Meet the new .security and .protection domains.

Registry operator gen.xyz these week launched two new top-level Internet domains -- .security and .protection -- aimed at creating websites with higher security as well as a safer online experience for end users.

Registrants can use domains to reinforce a brand, organization name, service locations, or industry keywords, says Nils Decker, director of business development for gen.xyz.  

Big security players such as Norton, FireEye, and Masterlock, have already registered names with the new .security and .protection domains.  An organization in Southern California, for example, might select la.security; spam.protection could do the trick for an email filtering company. 

Early adopters of the new domains include Microsoft's office365.protection site; IBM managed security provider blue.security; arrow.security (formerly arrowsecuritycorp.com); and grupo.security (formerly security.cl).

Registrants are strongly encouraged – but not required by gen.xyz -- to use both SSL and DNSSEC to bolster security. The protocols ensure that "a website visitor that the company behind the website is a legitimate company, and that they're actually talking to who they think you're talking to, not a phisher or malicious site," Decker says.

Pricing for the new domains is relatively expensive, between $2,500 and $4,000. Decker and gen.xyz are counting on that high price point to discourage spammers and miscreants from using the domains as covers for malicious activity or spoofing.

"If the technology creates more security awareness or makes customers more comfortable, they're more likely to succeed," says domain name expert Monte Cahn, president of Rightofthedot, which advises on top-level domain strategies. Cahn notes that he hasn't seen the details of gen.xyz's announcement, but did note that other more recently introduced domains such as .bank and .insurance, have been well-received. However, those domains also come with special registration forms to verify that would-be registrants are in fact part of the industries they say they are, Cahn notes.

Decker says gen.xyz isn't doing any verification itself, but rather leaving that up to SSL providers such as Symantec or Comodo. "At a high level, we are the registry operator, so we control the name space, but don't sell the names themselves," Decker says. "End-user companies go to GoDaddy or Web.com for that."

Because the domains are so new and considered premium domains, availability is quite good, Decker says, in contrast to .com or .org, which are much more picked over.

 

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
clipartsgram
50%
50%
clipartsgram,
User Rank: Apprentice
10/31/2016 | 10:09:38 PM
Re: Clipart
yeah! I agree with you.This post very benefit for everyone.
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
10/17/2016 | 12:08:21 PM
Re: Identity theft
It's a good reminder that these new domains, in and of themselves, are not inherently secure, lorraine89. Humans still need to add basic protections and anonymizing features, like the ones you've suggested.
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
10/17/2016 | 11:54:09 AM
Identity theft
New domains are pretty much vulnerable to data theft. That is why it is important to deploy some good security software and hide your IP using a genuine vpn server like PureVPN. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/19/2016 | 9:38:58 AM
online security
Great article. I always take extra caution in maintaining my online privacy and security. I deploy vpn server, purevpn, to maintain my online integrity and to avoid any type of scams and phishy threats. 
Shantaram
50%
50%
Shantaram,
User Rank: Ninja
9/15/2016 | 5:00:16 AM
192.168.l.l
This article gives the light in which we can observe the reality. This is very nice one and gives in-depth information. Thanks for this nice article
showtime33
50%
50%
showtime33,
User Rank: Apprentice
8/22/2016 | 9:31:04 AM
Re: The Irony of It
Finally....some smarts about TLD's.  Exactly right, a new domain name is just another thing to block.  Making it harder to defend by adding extensions to block.  Ask people that fix pc's in the trenches and you will find that .biz, .casino,..etc... is just another way to launch a malware link to compromise a pc.  Malware can still use .security to launch randsomware for example.  duh...adding them does nothing for protection for anyone. The irony is right....lol
umutarcn
50%
50%
umutarcn,
User Rank: Apprentice
8/9/2016 | 11:31:05 PM
Quotes
Thanks, for the information on SSL and domain details.
SEO..
50%
50%
SEO..,
User Rank: Apprentice
8/9/2016 | 11:40:49 AM
Does it really matter to have .com
Thanks, for the information on SSL. On other hand, recently I read an atricle which said it's no more important to have domain as .com it can be anything google no more consider much weightage on this domain scenario. I am planning to buy one as a web designer - let me know your thought's  
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Ninja
8/9/2016 | 10:16:52 AM
Re: Worth a try
Yes agreed as well, one protection or measure is never enough.  I am looking at it more as an additional potential measure.
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
8/9/2016 | 10:11:41 AM
Re: Worth a try
Agreed, Juliette... but a simple domain in and of itself will not convey security on a website or its visitors. Regardless of what your domain is, there's plenty that still needs to happen on the backend to lock down and protect hardware, data and users.
Page 1 / 2   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11976
PUBLISHED: 2020-08-11
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
CVE-2020-13179
PUBLISHED: 2020-08-11
Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.
CVE-2020-8918
PUBLISHED: 2020-08-11
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth'...
CVE-2020-9244
PUBLISHED: 2020-08-11
HUAWEI Mate 20 versions Versions earlier than 10.1.0.160(C00E160R3P8);HUAWEI Mate 20 Pro versions Versions earlier than 10.1.0.270(C431E7R1P5),Versions earlier than 10.1.0.270(C635E3R1P5),Versions earlier than 10.1.0.273(C636E7R2P4);HUAWEI Mate 20 X versions Versions earlier than 10.1.0.160(C00E160R...
CVE-2020-9403
PUBLISHED: 2020-08-11
In PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation.