Jeff Castillo

Lookalike domains and e-mail addresses aim to exploit everyday computing activities that often go unnoticed, to deceive users.
THE BROAD VIEW

Can you spot the difference between l and I?

Domain name system solutions can help combat cybercriminals who use ‘lookalikes’