Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/20/2010
01:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Go Daddy, DynDNS.com And NamesBeyond Support DNSSEC-Signed .ORG Domain Names

Registrar customers now can sign domain name with DNSSEC validation keys

RESTON, Va., July 20 /PRNewswire-USNewswire/ -- .ORG, The Public Interest Registry (PIR) today announced that three leading registrars - Go Daddy, DynDNS.com and NamesBeyond - now support Domain Name System Security Extensions (DNSSEC) for .ORG domain names, adding an extra layer of security for all .ORG domain name holders. The news comes on the heels of .ORG's announcement at ICANN Brussels on June 23 that the world's third largest generic top-level domain (gTLD) is now offering full DNSSEC deployment.

(Logo: http://photos.prnewswire.com/prnh/20100628/ORGLOGO)

By supporting DNSSEC, Go Daddy, DynDNS.com and NamesBeyond offer added security protection to their customers by enabling .ORG website owners to sign his or her domain name with DNSSEC validation keys. Registrants will benefit from the added ability to thwart the increased predominance of attacks like pharming, cache poisoning, DNS redirection and domain hijacking - all of which have been used to commit fraud, distribute malware, and identity theft. Additionally, DNSSEC upgrades the current Internet infrastructure by protecting Internet resolvers from forged DNS data.

"Having the support of Go Daddy, DynDNS.com and NamesBeyond will take widespread DNSSEC adoption to the next level," said Alexa Raad, chief executive officer of ORG, The Public Interest Registry. "Each of these registrars provide a critical link to ensure that .ORG domain owners can sign their domains and upgrade their security and stability."

The registrars' support is a critical component to overall widespread adoption of DNSSEC. Last month, PIR - the manager of the .ORG domain - announced that it had enabled the signing of second level domains. The move marked the final step in an extensive two-year process, placing .ORG at the helm of DNSSEC deployment.

"DNSSEC is an important step in reducing vulnerabilities in the Domain Name System," said Uma Murali, president and CEO of NamesBeyond. ".ORG domain name owners who want to apply DNSSEC security to their domain names can now do so with NamesBeyond."

"As an early advocate of DNSSEC, we are happy to push along adoption and educate users about the many benefits. As our users continue to demand security and protection, we are proud to offer full range of solutions. On our consumer brand DynDNS.com, we are a DNSSEC capable registrar and also provide key management and rollover services on our enterprise brand, the Dynect Platform," said Jeremy Hitchcock, CEO, DynDNS.com.

"DNSSEC is an important step toward making the Internet infrastructure more secure," said Go Daddy President and COO Warren Adelman. "Go Daddy supports DNSSEC for our customers and applauds PIR for being the first gTLD to offer it."

More information on .ORG's DNSSEC initiatives can be found at www.pir.org/dnssec.

About .ORG, The Public Interest Registry

Trusted across all ages, backgrounds and nationalities, .ORG is where people turn to find credible information, get involved, fund causes and support advocacy. .ORG, The Public Interest Registry (PIR) empowers the global community to use the Internet more effectively and, concurrently, takes a leadership position among Internet stakeholders on policy and related issues. The .ORG domain is the Internet's third largest "generic" or non-country specific top-level domain with more than 8 million domain names registered worldwide. PIR is based in Reston, Virginia, USA.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.