THE BROAD VIEW
·
SUBSCRIBERS

Can you spot the difference between l and I?

Domain name system solutions can help combat cybercriminals who use ‘lookalikes’

    • Lookalike domains and e-mail addresses aim to exploit everyday computing activities that often go unnoticed, to deceive users.
    • Lookalike domains and e-mail addresses aim to exploit everyday computing activities that often go unnoticed, to deceive users. PHOTO: BT FILE
    Published Sat, Sep 16, 2023 · 05:00 AM

    PLANNING to shop online? Which of these links would you click – https://www.lazada.com or https://www.Iazada.com?

    Depending on the font used, it can be almost impossible to distinguish between the two. This is how some cyberthreat actors trick users into visiting fake, malicious websites – by using lookalike domains.

    Such lookalikes may disguise themselves within various elements of online communication, such as e-mail addresses and website addresses. The aim is to exploit everyday computing activities that often go unnoticed, to deceive users.

    Share with us your feedback on BT's products and services