security

I’m a security expert – all Gmail and Outlook users must beware bank-raiding ‘alphabet attack’ that uses si… – The US Sun


CYBERSECURITY experts have warned about lookalike domains that are out to steal your money.

Lookalike domains are a type of phishing attack employed by hackers and cybercriminals

Computer hacker or Cyber attack concept backgroundCredit: Getty

Phishing is a scam where attackers deceive people into revealing sensitive information.

HOW DOES THE ATTACK WORK?

The attack basically comprises hackers creating email and website domains that are very similar to those of legitimate companies.

Cybercriminals do this in order to trick victims into entering their personal information on fake websites or malicious emails.

In some instances, they might try to get you to click on malware-laden links that can install dangerous software onto your device.

Lookalike domains often feature small misspellings or subtle differences that can be difficult to spot.

THE METHODS

There are a few ways that hackers try to fool you with lookalike domains.

One of the most common ways is to use letters that are visually very similar – these are known as homoglyphs.

For example, a lowercase “L” can look very similar to an uppercase “I” in most fonts.

Sometimes, they might even add a word to an email address or a website domain to make it seem more legitimate.

An example of this includes adding the word “login” or “support” behind a company name – i.e. Apple-login.com.

HOW TO STAY SAFE

Below we have outlined tips recommended by cybersecurity experts on how to stay safe from this type of attack.

First, check the domain name carefully for misspellings or slight differences.

If you see a domain name that looks even a tiny bit different from that of a legitimate company, it is best to avoid it.

You can also use a domain name checker to verify a website’s authenticity. 

In the event that you’re unsure about a domain’s legitimacy, you can always contact the company directly to verify.

You should also never reply to emails that seem suspicious and never click on any attachments or links.



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.