Results for "typosquatting"

Typosquatting

Typosquatting is the practice of deliberately registering a domain name which is similar to an existing popular name, in the hope of getting traffic by people who mis-type the URL of the popular domain.  For more information, see the article typosquatting.

CONTINUE READING No Comments

June 23, 2016 - Typosquatting is a term you may have seen when reading about internet scams. In essence it relies on users making typing errors (typos) when entering a site or domain name.

CONTINUE READING 3 Comments

March 31, 2015 - Typosquatters target would-be users of screenshot apps. A realistic impersonation of the genuine website - until the Malware download begins...

CONTINUE READING 3 Comments

September 18, 2020 - Should you worry about domain name abuse? For the most part it depends on what kind of company you are and what you expect to encounter.

CONTINUE READING No Comments

1337x.org

CONTINUE READING No Comments

August 10, 2020 - SBA loan scams continue to make the rounds targeting small business owners, CEOS, and CFOs. Learn what to look out for.

CONTINUE READING No Comments

February 19, 2020 - Rudy Giuliani's Twitter account contains many typos that lead to the wrong website—and scammers and typosquatters are taking advantage.

CONTINUE READING No Comments

May 20, 2019 - A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

CONTINUE READING No Comments

December 20, 2018 - It’s dubbed the ‘Three Questions Quiz’ scam, and not only are people letting their guard down, but they’re also freely sharing it on social media, too. Do you think you have been duped by this before? Read on.

CONTINUE READING No Comments

August 2, 2018 - Cybercriminals will do what it takes to get what they want, whether that's breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here's how to tell if you're susceptible to social engineering attacks, and what to do to combat them.

CONTINUE READING No Comments

Select your language