Security

How to set up Two-Step Verification on your Name.com account


With the abundance of news about compromised cyber security and hacking schemes, it’s natural to want to take extra precautions to keep your online information safe.

Two-Step Verification keeps your account extra secure by requiring a time-sensitive code in addition to a traditional login. As opposed to solely relying on a username and password, which can be guessed or figured out by an experienced crook, Two-Step Verification adds an extra layer of security.

Better yet, getting Two-Step Verification set up for your Name.com account is a simple task that can be done in a matter of minutes. Let’s walk through the steps.

Read More

Announcing some important updates to our Two-Step Verification feature


We recommend Two-Step Verification to everyone, as it’s the most fool-proof way of keeping the domains in your Name.com account secure – and it’s totally free. It’s especially important for people who have hundreds or even thousands of domains in their accounts, as they’re more likely to be targeted by bad dudes trying to hijack domains.

The basics of our Two-Step Verification process are still the same—create a unique credential for your account, and then use a smartphone app to generate unique login codes—and it remains a totally free feature for all Name.com customers. However, if you were previously using Namesafe we’ve made some changes that will require you to update your verification credentials by March 5, 2015 to keep your account secure.

Read More

Something Phishy: How to spot phishing scams


don't be a phishing victim

One of the many reasons that our customers are the best in the world is that they contact us whenever something doesn’t seem right. That’s how we found out that a bunch of weasels (or perhaps a lone weasel) were sending fake Name.com emails to phish personal information. Not cool.

Read More

Keep your mitts up: How to protect against unauthorized domain transfers


This post is meant to give you recommendations on how to prevent a potential domain hijack before it happens, because once a domain transfers to another registrar it can be difficult to re-acquire, especially if the transfer was in compliance with ICANN policy. If the registrar is not willing to transfer the domain back into your control then your options for recovery become very limited.

Read More

Answering your questions and concerns about the Shellshock Bug


On Wednesday news broke that there’s a widespread, potentially harmful vulnerability that affects the computer systems that a lot of us use every day, including OSX and Linux. It’s called the Bash Shellshock Bug. Here’s a quick rundown of how the bug works, who it affects, and how we’re handling it at Name.com:

What is the Shellshock Bug?

It is vulnerability in Bash, which is the software used to control the command shell in many flavors of Unix, and it has been shown to be present in OS X. It allows an attacker to run a wide range of malicious code remotely.

Am I vulnerable?

Desktop users should not be vulnerable. However, if you allow allow SSH access from remote connections you are potentially vulnerable.

I use SSH for Mac OS X/Linux, what s...

Read More

Google is making SSL Certificates a bigger priority in search rankings


google-ssl-header

Google has just published an interesting blog post about SEO best practices on its Webmaster Central Blog, and one interesting detail is that Google is going to start ranking sites with SSL Certificates higher. Google is making this move because it believes in making the internet a more secure place, and a more secure web starts with more secure website connections.

Read More

What is two-factor authentication?


namesafe

Two-factor authentication is a service that keeps your account extra secure by requiring both a standard memorized username and password, as well as an additional time-sensitive code to enter your account. Because usernames and passwords could theoretically be guessed, adding two-factor authentication to the mix adds an unmatched level of security to your accounts. To retrieve your security code or token from your account, you use an app that will display a set of numbers for a brief period of time.

At name.com, our free two-factor authentication, NameSafe, uses Versign VIP Access to issue a temporary account security code. The security code changes every 30 seconds and can only be retrieved from one device.

Here’s a tutorial on how to get started with NameSafe. Again, it’s a totally free service, and it makes it practically impossible for someone to access your Name.com account unless they have access to your mobile device.

Read More

How to protect your name.com account with an extra password


Passwords can be pretty tricky to guess as long as you’re not lazy when creating them. By keeping a few best practices in mind, you can create a password that will be extremely tough to crack.

But it’s a big bad internet world, and there’s still a chance your username and password combo could be compromised. That’s why we provide a 100 percent absolutely free way to add an extra layer of protection to your account. It’s called NameSafe.

Password1

Read More

Don’t Get Hacked: Password Lessons from the Flame Broiler


It lasted for over an hour and was so ugly that even their competitors were sending out empathetic Tweets.

mcdonalds empathy burger king

Burger King’s Twitter account had been hacked, and not only were the hackers sending their own racially-charged tweets about Burger King employees “crushing and sniffing Percocet in the bathroom,” but they also changed all the branding from BK to McDonalds. They even went so far as to promote McDonald’s new Fish McBites.

burger king twitter hacked

So with this kind of nightmare playing out in real life in front of the whole world, we thought it was time to contribute a quick, legitimate  piece to the “how to come up with a great password that’s memorable and fun and makes you feel safe” articles that will be swirling around the ‘net...

Read More

WordPress, Joomla and Drupal: How to Protect your Websites!


Chris Gaston, our systems administrator, says, “Hey all, FYI theres a lot of hacks for WP, Joomla, and Drupal floating
around lately.”

It’s time to update those themes! Here’s more from the National Cyber Awareness System.
US-CERT Current Activity
Increased Exploitation in Web Content Management Systems

Original release date: September 21, 2012
Last revised: January 4, 2013

US-CERT is aware of recent increases in the exploitation of known
vulnerabilities in web content management systems (CMSs) such as
Wordpress and Joomla. Compromised CMS installations can be used to host
malicious content.

US-CERT recommends that users and administrators ensure that their CMS
installations are patched or upgraded to remove known vulnerabilities.
This may require contacting the hosting provider...

Read More