TAG: theft

Project #FreeDavidWalshDotName = SUCCESS!

What happened with David Walsh? His domain was stolen and we got it back. Sounds pretty mundane, but it’s such a crazy story it deserves its own promo code. As a matter of fact, it even made the evening news:

It’s true. We’re not making anything on these transfers but we’re just so darn excited. Use Promo Code “DAVIDWALSH” and transfer in any COM/NET for $7.25! Transfer in any .NAME for just $6.99! AND THAT INCLUDES A YEAR REGISTRATION! You also get all the cool freebies, the domain forwarding, the social URL forwarding and, most importantly, the free VIP Security to keep your domains safe.

THIS JUST IN…MORE INFORMATION: We’ve just received details from behind the scenes. When a domain is stolen, this is how the Name Ninja team handles the situation:

The David Walsh Incident

~ Zero Hour ~

A short dramatization by Owen Borseth

“Scott,” his wife was barely awake when she poked him in the side to rouse him. “It’s the phone.”

“The phone?” Scott looked at the clock with his eyes half opened. “Who the hell? At this hour? I’m not answering it.”

“Baby.”

“What?”

“The phone.”

“I’m not answering it. Just go back to sleep.”

“It’s,” she paused. “It’s the red phone,” this time Scott sat up, fully awake.

The red phone could mean only one thing, there was a domain name emergency and Name.com operatives were springing into action. Scott rubbed his eyes and ran his fingers through his scruffy rust colored beard before picking up the handset, “this is Scott.”

“Scott,” the voice on the other end of the line greeted, “Paul here. We’ve got ourselves a situation. We need you in the war room, stat.”

The night air and the office temperature were not the only frigid things Scott felt when he stopped outside the war room’s door on that brisk early morn. The cold calculating eyes of Paul and the icy tight lipped expression on Bo’s face froze the room like a winter’s storm. The last time the red phone rang it had been summer, it was mid-afternoon, and the warmth of the day made the already heated situation that much more unbearable. Scott didn’t know which incident was worse, then with the heat or now with the cold. He removed his gloves so that he could type but left his coat zipped up, then stepped into the war room where his fellow operatives were waiting.

“It’s a dot name,” Bo’s eyes never left the monitor but the former marine was well aware of Scott’s arrival. “DavidWalsh.name”

Paul pushed his glasses up higher onto the bridge of his nose, “thirty seven tweets, one hundred ninety three re-tweets, and counting. It’s a real cluster…”

“Who are the players?” Scott interrupted.

“From GoDaddy to us and then from us to 1&1,” Paul replied.

“GoDaddy,” Scott’s voice seethed and his face reddened. “I don’t care what happens, we get David Walsh his domain back.”

Bo looked up from his monitor, “let’s round up our posse and get started then.”

“I’ll bring my laptop,” Scott declared before walking out of the room.

Bo stood up, “And I’ll bring my knife.”

Name.com Launches New Level of Account Security

Domain Name Hijacking has been an issue for almost as long as domain names have been around. In 1995 sex.com was stolen from it’s registrant in a very high profile case. It was still happening in 2001. In 2003. 2008 was a rough year from Godaddy – they were hit hard twice, in February and again in November and December.

The December incident, arguably one of the most troubling domain thefts in history made us realize how lacking domain registrars have been in dealing with account security.

But a domain name doesn’t have to be stolen to be problematic. USA Today addressed cyber criminal attacks being on the rise today and highlights the recent CheckFree.com fiasco:

In another recent attack, someone acquired the user name and password for a system administrator at CheckFree.com, the nation’s largest e-bill payment system. Using those log-in credentials, an intruder gained access to CheckFree’s domain name service account ’97 an account that permits the administrator to redirect traffic trying to access CheckFree’s home page to other legitimate company pages.

For several hours, the intruder redirected anyone typing www.mycheckfree.com to a Web server in the Ukraine that tried to install a password-stealing Trojan. Although as many as 160,000 customers may have been affected, none had any of his or her data stolen, says Lori Stafford-Thomas, a spokeswoman for Fiserv, the parent company of CheckFree. “CheckFree sites are all up and running properly and securely,” she says.

But the attempt was a sign of things to come, says Amit Klein, CTO of security firm Trusteer.

“The moral of this attack is that it’s so easy to take over your (website),” Klein says. “I just need to get ahold of your user name and password once. And we all know how easy it is to get your credentials.”

Name.com has long offered some of the industries best tools to keep entire accounts safe with login tracking/emails, history and IP restrictions. We’ve demonstrated once again why registrants trust us with their valuable digital assets by partnering with Verisign to offer their VIP (Verisign Identity Protection) service branded under NameSafe.

The NameSafe service offers a two factor authentication – combining something you know (your username and password) with something only you have access to (your one time randomly generate password) to create a more secure registrar experience. Currently both keyfob and credit card form factors are available for a nominal fee, and soon mobile phone options will be available for even greater convenience.

There are no more results.