Register .boston at EnCirca now!

Get dotBOSTON for only $15 per year.*

A dotBOSTON domain is a powerful way to show the world the value of your location online. It’s a way to show that you made it here, and you’re part of what makes the city great.

Whether you are a business with a local footprint, a non-profit organization serving the Boston area, or simply a passionate resident of the city, Boston is an important part of who you are. Now it can be a part of your online presence.

Register today  for only $15 per year.*

  • Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

* Some names may be premium or blocked.

Register Amazon’s Japanese IDN Domains at EnCirca

The newest domains from the Amazon Registry are available now at EnCirca.


Register today!


  • CLOUD (JP) – xn--gckr3f0f – . クラウド- $30
  • CONSUMER ELECTRONICS (JP) – xn--fct429k – . 家電 – $30
  • FOOD(JP) – xn--jvr189m – . 食品 – $20
  • SALE (JP) – xn--1ck2e1b – . セール – $20
  • STORE (JP) – xn--cck2b3b – . ストア – $30

    Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

.press $5 sale at EnCirca

.PRESS is celebrating its 3 year anniversary!


Get your .PRESS domain for just $5! That’s right:  1-year, new registrations (regularly $75 a year) are on sale until Sept. 30th.



.PRESS gives individuals and organizations a meaningful platform to share opinions, disseminate information and influence their audience. .PRESS gives opinion makers and information sharers the perfect way to establish their credibility and grow their online reach and relevance!


Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.


Apply for .RADIO domains at EnCirca now!

dotRADIO is the new domain extension for the radio sector, which includes broadcasters, internet radios, people working in radio, companies supplying goods and services, and radio amateurs.


dotRADIO will have an end-of-date Sunrise/Landrush period from August 23 to October 31, 2017.


Visit to apply today!


EnCirca is now accepting applications from eligible organizations and individuals from the following categories:

  • Unions of Broadcasters
  • Official Radio Operators
  • Internet Radio
  • Radio Amateurs
  • Radio Professionals
  • Radio-related Companies

During the dotRADIO application period: 

  • All Sunrise and Landrush phases will run concurrently.
  • Qualified radio industry entities will be able to register dotRADIO domains before the general public.
  • Any and all applications will be accepted until October 31, 2017. Once these phases are completed, the .RADIO Registry will allocate domain names based on verification criteria.
  • Registrants are required to state their intended use of the registered domain name at the time of registration.
  • Each domain name will be individually and thoroughly validated by the Registry Operator. Self-declaration will not be sufficient.

Visit to apply today!


.BOSTON Sunrise begins today at EnCirca

Register for .BOSTON Sunrise starting now until August 31st for $90.00


Eligibility for Sunrise is limited to companies that have registered their trademark with the Trademark Clearinghouse.


What is .BOSTON?


Managed by the Boston Globe, .BOSTON is the champion of geography based Top Level Domains. Imagine, WWW.YourCompany.BOSTON. Enhance your brand by distinguishing your company, product, or service from the thousands of .COM domain names. Join the crowd and proclaim your .BOSTON identity today.


Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

Register .creditunion now at EnCirca

.CREDITUNION is in General Availability now!
$150 per year for registration/renewal. Some premium names may be more.


Dot CREDITUNION will be an excellent tool for credit unions to provide a trusted online market to promote their products and services while providing members with a greater level of security and confidence.

Register Now

  • Whois Privacy is not permitted by the registry
  • Eligibility for .CREDITUNION is limited to bona fide Credit Unions with a primary office based in the United States.
  • The selection of a .CREDITUNION domain name must match or be derived from the Credit Union’s legal name or trademark.
  • More information on registration rules can be found in the Creditunion Registration Policies.

.blog $12 special at EnCirca

.BLOG Specials!

1. One-year registrations for $12.00
2. Register multiple years and get the first year free!

Guess who owns the .BLOG Registry?

WordPress, the most popular blog software, powering over 50% of all blogs and over 25% of all websites, is the Registry operator for .BLOG.

So, even if you don’t plan to use the domain right away, it would be prudent to protect your brand so someone else doesn’t.

The most effective marketing tool a business has arrived!

Publishing a blog is the most effective marketing tool a business has. Get the right domain and tell your story perfectly.

A .blog domain is trustworthy and instantly recognized. As a new domain extension, there are millions of great .blog domains still available.

Your life’s story. Your company’s story. Any story. Whatever your blog is about, there’s a .blog domain for it.

EnCirca offers Amazon’s .BOT domains in Sunrise

Register for .BOT Sunrise  starting now until July 14th for $300.00
Eligibility for Sunrise is limited to companies that have registered their trademark with the Trademark Clearinghouse.

Why .BOT?

Bots are software programs traditionally used to accomplish repetitive tasks. For example, online chat bots can be used to streamline a company’s customer service. Physical robots can be used offline to move merchandise within a fulfillment center. As technology advances, we’re seeing AI and messaging platforms open up to third party bots allowing users to accomplish tasks from within the platform.

Amazon, the .BOT Registry, is focused on creating a dedicated online space for this community and have seen tremendous interest in what they are developing. They intend to offer continuous value for all .bot domain registrants by developing unique features for this rapidly growing community and their customers.

How fast is the bot space growing?

More and more businesses are launching chat-based bots for customer engagement. The number of chat bots on messaging channels (i.e. SMS, Facebook Messenger, Kik, Slack, Telegram, etc.) have grown 2,400% over the past year, from 5,000 in 2016 to 125,000+ in 2017. The industry is seeing strong market adoption, end user acceptance and we anticipate that brands are in the process of building their own chat bots (or will want to do so in the near future).
Find out more about our sunrise, landrush and general availability offerings on our new gTLD page.

 WannaCry Ransomware – Don’t Submit to the Amateurs!

I am sure by now most of you have heard of Ransomware, the malicious software that holds your data hostage and demands a sum of money for its return. In 2015, even the FBI agreed ransomware is here to stay. This time, it wouldn’t stop with home computers, but it will spread to infect:

“Businesses, financial institutions, government agencies, academic institutions, and other organizations… resulting in the loss of sensitive or proprietary information.”


  There are two types of ransomware in circulation:

  Encryptors incorporate advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can de-crypt the blocked content.

  Lockers lock the victim out of the operating system, making it impossible to access the desktop and any applications or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.

  Some locker versions infect the Master Boot Record (MBR). The MBR is the section of a PC’s hard drive which enables the operating system to boot up. When MBR ransomware strikes, the boot process can’t complete as usual and prompts a ransom note to be displayed on the screen.

  Crypto-ransomware, as encryptors are usually known, are the most widespread ones. Some other characteristics of ransomware include, but are not limited to:

  • The ransomware may scramble your file names, so you can’t know which data was affected. This is one of the social engineering tricks used to confuse and coerce victims into paying the ransom.
  • It may add a different extension to your files, to sometimes signal a specific type of ransomware strain.
  • It will display an image or a message that lets you know your data has been encrypted and that you must pay a specific sum of money to get it back.
  • It requests payment in Bitcoins because this crypto-currency cannot be tracked by cyber security researchers or law enforcement agencies.
  • Usually, the ransom payments have a time-limit, to add another level of psychological constraint to this extortion scheme. Going over the deadline typically means that the ransom will increase, but it can also mean that the data will be destroyed forever.
  • It uses a complex set of evasion techniques to go undetected by traditional antivirus (please visit the link below to find out why your antivirus is not protecting you.)
  • It often recruits the infected PCs into botnets, so cyber criminals can expand their infrastructure and fuel future attacks.
  • It can spread to other PCs connected to a local network, creating further damage.
  • It frequently features data exfiltration capabilities, which means that it can also extract data from the affected computer (usernames, passwords, email addresses, etc.) and send it to a server controlled by cyber criminals; encrypting files isn’t always the endgame, especially where financial institutions are concerned.

   I want to focus for a moment on the ransomware known as WannaCry. WannaCry ransomware attacks windows based machines. It also goes by the name WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY.

  EternalBlue is an exploit generally believed to have been developed by the U.S. National Security Agency (NSA). It was leaked by the Shadow Brokers hacker group on 14 April 2017. EternalBlue exploits a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE-2017-0144 in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1 server in various versions of Microsoft Windows accepts specially crafted packets from remote attackers, allowing them to execute arbitrary code on the target computer.

   The standard Windows security update on 14 March 2017 resolved the issue via security update MS17-010 , for all Windows versions that were currently supported at that time, these being Windows Vista, Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, and Windows Server 2016.

  Many Windows users had not installed MS17-010 when, two months later on 12 May 2017, the WannaCry attack used the EternalBlue vulnerability to spread itself.

  The creators of the ransomware WannaCry made some amateurish mistakes, including an easy-to-find kill switch and the unsophisticated way the attackers are demanding bitcoin from their victims.

  There are kits sold on the dark web that already pre-build in anonymity of the perpetrators, this is what experts think they’re seeing with WannaCry. It appears that some Script Kiddies are using software tools created by somebody else. The “killswitch” is an URL included in the code, which was used to stop the malware’s spread. The kill switch allowed people to prevent the infection chain fairly quickly.

  Sophisticated ransomware usually has an automated way to accept payments from victims who want to unlock their computers, but WannaCry’s system seems to be manual — the scammers have to send each victim a code. This doesn’t seem practical for an infection involving thousands and thousands of computers.

  The scammers have collected payments from fewer than 200 victims. We know this, because they’re demanding bitcoin — and bitcoin transactions are public. We don’t know the scammers’ names, but we know the bitcoin addresses they’re using to receive payment — just three addresses. Again, more sophisticated ransomware would have the ability to generate a unique bitcoin address for each victim. So far, the attackers have collected about $60,000 worth of bitcoins which are just sitting there untouched, according to Jonathan Levin, co-founder of Chainalysis, a company that analyzes bitcoin usage to identify money-laundering. He’s been watching the bitcoins accumulating at WannaCry’s three addresses.

  “It might be that they don’t have a good idea yet about how to launder the bitcoin,” he said. “Perhaps they’re not really set up to take advantage of the success of their campaign so far.” Scammers sometimes have safe-zones — usually their home country — where their malware doesn’t do any damage. If the malware detects native language on the computer, it will not execute, sometimes deleting itself. WannaCry doesn’t do that either. Levin says if the perpetrators actually live in one of the countries hit hard by this attack — say, Russia — that would be, as he puts it, “an incredibly bad life choice.”


  Often, people are lulled into a false sense of security because they believe they are protected because they have an antivirus. This is just not true.  Click here to find out why.

  Preventative maintenance is always the best way to go. Here’s what you can do to prevent being extorted by ransomware:

Locally, on the PC

Don’t store important data only on your computer, have 2 backups of data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.

The Dropbox/Google Drive/OneDrive/etc. application on your computer should not be turned on by default. Only open them once a day, to sync data, and close them once this is done.

Keep your operating system and the software you use up to date, including the latest security updates.

For daily use, don’t use an administrator account on your computer. Use a guest account with limited privileges.

Turn off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc.

Microsoft has released a Windows security patch MS17-010 for Windows
machines. This needs to be applied immediately and urgently.

Remove Windows NT4, Windows 2000 and Windows XP-2003 from production

Block ports 139, 445 and 3389 in firewall.

SMB is enabled by default on Windows. Disable smb service on the
machine by going to Settings > uncheck the settings > OK

In the browser

Remove the following plugins from your browsers: Adobe Flash, Adobe Reader, Java and Silverlight. If you absolutely must use them, set the browser to ask to activate these plugins when needed.

Adjust your browsers’ security and privacy settings for increased protection. (Instructions for FirefoxSafariInternet Explorer or Google Chrome.)

Remove outdated plugins and add-ons from browsers. Only keep the ones used on a daily basis and keep them updated to the latest version.

Use an ad-blocker to avoid the threat of potentially malicious ads.

Online behavior

Never open spam emails or emails from unknown senders.

Never download attachments from spam emails or suspicious emails.

Never click links in spam emails or suspicious emails.

Anti-ransomware security tools

Use a reliable, paid antivirus product that includes an automatic update module and a real-time scanner.

Understand the importance of having a traffic-filtering solution that can provide proactive anti-ransomware protection.


  You can find a more extensive Ransomware protection plan here.

  Brought to you by the same security company is a list of ransomware decryption tools you can use to avoid paying the criminals. Keep in mind that they may become obsolete as the malware is likely to change frequently as time goes on.

  There also a few decryption tools available for some versions of Windows that have been affected with WannaCry.



  Also, this, from the logicboxes helpdesk:

What are we doing on our Windows shared servers?

We are already in the phase of applying Windows updates on all our
shared hosting Windows servers. However we need to reboot servers
in-order to apply those security patches. We shall announce the
schedule for server reboot in this thread shortly.

What you need to do in case of our Windows dedicated servers?

You need to patch the Windows dedicated server immediately using the
steps mentioned in the link :

In-addition to this, please block the IP addresses, domains and file
names mentioned in this link :

You can also refer to the following links to apply the necessary fix.

For dedicated servers, once you have applied necessary changes, you
need to reboot the server.

Please feel free to contact our support desk if you have any questions.

LogicBoxes Helpdesk?

If you follow these protocols to keep your data protected there is no need to fear ransomware.


Ensight security alerts and recommendations is a free service of EnCirca, the most secure domain name Registrar.

Have a question or suggestion about an EnSight article? Please contact

EnCirca Welcomes New Customers From 1ISI Registrar

EnCirca welcomes new customers from the recently terminated 1ISI Registrar. 1ISI, also known as #1 Internet Services International, lost
its ICANN Accreditation status due to contractual compliance issues.

All of the domains previously registered with 1ISI have been transferred to EnCirca, where they are available for management, including: Renewals, Name Server updates and Whois updates.

The new customers should contact EnCirca support if they have not received a welcome email or have any questions or concerns about their domain names.