Fraudsters’ new favorite place to snare unsuspecting online users is social media. As questions of how social media platforms can be held accountable for protecting their user base from misleading information continue to rise, it is becoming more clear that hundreds of thousands of users are being exposed to fraudulent content with the explicit purpose of collecting information or money from well-meaning suspects.
The growing relationship between cryptocurrency and domains
You would have to be living under a rock to have not heard about the growth of cryptocurrency lately. With Bitcoin reaching a record value of around $10,000 and Etherium continuing to creep toward further adoption, more businesses and individuals are considering ways that cryptocurrency could be worked into daily monetary transactions. These are just two of the ways we’re seeing domain names associated with cryptocurrency.
Video: How we got attacked by cellphones | Nerd Compass on DDoS
Have you downloaded a new app lately? You could have inadvertently aided in a DDoS attack. Here’s the rundown on how DDoS attacks work and what the implications could mean for the future.
A cautionary tale on why you need Whois Privacy
White House Press Secretary Sean Spicer recently made headlines after his first tumultuous press conference. Just days later, Medium posted an article announcing that Spicer’s contact information was freely available to the public via Whois data.
How to set up a SSL certificate for your website (and why you should)
Think about your last online purchase: Did you just assume that it was safe to enter your credit card information or did you check for that little green padlock in the address bar? That padlock sign (or occasionally just a green address bar) indicates the presence of an SSL certificate, a security measure that ensures that sensitive information entered on that webpage will be safely encrypted.
SSL, or Secure Socket Layer, is the protocol that creates these secure connections for web users. It prevents private information from being compromised by eavesdropping, data tampering, or message forgery. It also gives consumers peace of mind as they fill out forms that contain sensitive information.
Millions of businesses use SSL certificates to assure visitors of their website’s security and legitimacy. If you think that your website could benefit from a SSL certificate, you can easily set it up through Name.com.
Prevent domain hijacking with these security tips
If you buy a domain name, it’s rightfully yours for as long as you continue to renew it. But in some unfortunate incidents, domain names are stolen by a hacker and either resold or used for nefarious purposes. Instances like these are called domain hijacking, and although they don’t happen often, they can be a serious headache deal with.
The best way to prevent domain hijacking from happening to you is to be proactive about your account’s security. By following these tips, you can do your part to keep your account—and your domains—safe.
Why you need privacy protection for your domain names
If you’re new to websites, you may be unfamiliar with some of the additional services that registrars offer when you purchase a domain. One service that can be especially confusing is domain privacy protection. What is it? And is it really necessary?
With the abundance of news about compromised cyber security and hacking schemes, it’s natural to want to take extra precautions to keep your online information safe.
Two-Step Verification keeps your account extra secure by requiring a time-sensitive code in addition to a traditional login. As opposed to solely relying on a username and password, which can be guessed or figured out by an experienced crook, Two-Step Verification adds an extra layer of security.
Better yet, getting Two-Step Verification set up for your Name.com account is a simple task that can be done in a matter of minutes. Let’s walk through the steps.
As you can see, we should probably adore this thing. A lot of companies do, and after the DDoS that smacked us, it’s pretty darn tempting. Does there need to be something like #CISPA? Probably. Is this version the one? Nope.
The problem is, that like SOPA, this bill is way too broad to embrace. It lacks safeguards to protect against abuse of privacy, confidentiality and civil liberties. Nic again: “CISPA does openly reject the notion of a free, open and anonymous internet and empowers companies to take action against users without the ability for users to pursue legal remedies.”
Play the What Should CISPA stand for Whackronym Acronym Game.
It’s easy. In the comments below include your winning version of C.I.S.P.A. An example might be, and just so we don’t take a really good one: Crikey, It’s Silly Politics Again. Wait, that was kind of good. Anyway, do better. We’ll have our staff vote on the comments with the most “likes.” Sounds pretty Internety, eh? Just like we like it.
First Place: A $500 donation in your name or that of your organization to the Electronic Frontier Foundation.
Second Place: A $300 donation in your name or that of your organization to the Electronic Frontier Foundation.
Third Place: A $200 donation in your name or that of your organization to the Electronic Frontier Foundation.
And because of your general awesomeness, we’ll probably be giving random prizes to keep you motivated in the fight. Oh, and if you don’t win this contest, unfortunately there will most likely be another opportunity. As Tim Berners-Lee, the inventor of the WWW, says, “[It] is threatening the rights of people in America, and effectively rights everywhere, because what happens in America tends to affect people all over the world. Even though the SOPA and PIPA acts were stopped by huge public outcry, it’s staggering how quickly the US government has come back with a new, different, threat to the rights of its citizens.”
So make your voice heard. We’ve done it before and it’s our duty to do it again.