<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; typo-squatting</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/typo-squatting/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>The next big cyber security threat: Your fingers</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/#comments</comments>
		<pubDate>Tue, 27 Nov 2012 19:43:27 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[typo-squatting]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1832</guid>
		<description><![CDATA[We’re all familiar with well-known causes of data security breaches and identity fraud; phishing, malware attacks, and lack of cyber security protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of data breaches is surprisingly, a person’s typing skills due to the fact that a simple typo [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F27%2Fthe-next-big-cyber-security-threat-your-fingers%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,data+privacy,Data+Security,typo-squatting&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/typo-squatting.jpg"><img class="aligncenter  wp-image-1836" title="typo-squatting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/typo-squatting.jpg" alt="" width="491" height="266" /></a></p>
<p>We’re all familiar with well-known causes of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data security breaches</a><strong> </strong>and<strong> </strong><a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity fraud</a>; phishing, malware attacks, and lack of <a href="http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/">cyber security</a><strong> </strong>protection are some of the most popular.  A lesser-known but just as lethal culprit in the world of <a href="http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/">data breaches</a> is surprisingly, a person’s typing skills due to the fact that a simple typo can lead to typo-squatting also known as URL hijacking.</p>
<p>Typo-squatters count on accidental misspellings and typing errors of web addresses in a web browser’s address bar to get people to their page which can often be unscrupulous hacker sites designed to extract a person’s private information.  Typo-squatters buy up domains that are similar to popular domain addresses to lie in wait for web surfers to make typing mistakes which is now even more widespread with the popularity of touch screen devices.  For example, instead of typing dot-com, you mistakenly type dot-org and are transferred to an authentication or login page that asks you to input your account information and password before proceeding.  These pages are actually typo-squatted pages that were created to not only steal your information but they can also make you vulnerable to a computer virus or <a href="http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/">identity theft</a>.  The most dangerous scenario is when a person uses the same user name and password for every website since a hacker then can access financial information such as banking and credit cards accounts using the stolen log-in information.  </p>
<p>Typo-squatters can also cause a <a href="http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/">business data breach</a><strong> </strong>by<strong> </strong>creating<strong> </strong><a href="http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/">doppelganger domains</a> for large companies that use subdomains for their various worldwide offices.  Business emails are intercepted when a user mistypes a recipient’s e-mail address.  Using a doppelganger domain, a hacker configures an email server to intercept any correspondence addressed to a person with that name.  Extra large companies with many subdomains are at the biggest risk since they have more employees with more email addresses which means more chances for typos.<strong></strong></p>
<p>A key way to practice <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data breach protection</a> in preventing typo-squatting is to use a search engine to find a website instead of directly typing in the web address especially if you are searching for a financial institution.  All the big search engines will have companies’ legitimate web addresses as well as <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">data protection and security</a><strong> </strong>software to<strong> </strong>scan for malware and prevent hacking.  Common sense is also another powerful tool to prevent a <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">breach of data;</a> if a site doesn’t look right, it probably isn’t so exit quickly and try again through a search engine.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/&via=Experian_DBR&text=The next big cyber security threat: Your fingers&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F27%2Fthe-next-big-cyber-security-threat-your-fingers%2F&amp;title=The%20next%20big%20cyber%20security%20threat%3A%20Your%20fingers" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/27/the-next-big-cyber-security-threat-your-fingers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Stealing data through doppelganger domains</title>
		<link>http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/#comments</comments>
		<pubDate>Tue, 18 Oct 2011 15:28:02 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data hacking]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Doppelganger domains]]></category>
		<category><![CDATA[typo-squatting]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=832</guid>
		<description><![CDATA[A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F10%2F18%2Fstealing-data-through-doppelganger-domains%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+hacking,Data+Security,Doppelganger+domains,typo-squatting&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/data_security.jpg"><img class="aligncenter size-full wp-image-836" title="data_security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/10/data_security.jpg" alt="" width="448" height="291" /></a></p>
<p>A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.</p>
<p>So-called typo-squatting &#8211; where criminals register for domains that are similar to those of legitimate businesses &#8211; has served as a fraudster tactic for years.  The newest twist on an old hack involves creating <a rel="”nofollow” nofollow" href="http://www.wired.com/threatlevel/2011/09/doppelganger-domains/" target="_blank" class="broken_link">doppelganger domains</a> by simply omitting the dot between a company’s host name and subdomain name.  This serves as an ideal tool to scoop up emails directed to a large corporation’s regional offices; for example, a hacker might register for seibm.com, as opposed to the true address of IBM’s Swedish division, se.ibm.com.</p>
<p>Researchers from information security firm <a rel="”nofollow” nofollow" href="http://www.wired.com/images_blogs/threatlevel/2011/09/Doppelganger.Domains.pdf" target="_blank" class="broken_link">Godai Group</a> spent six months testing the effectiveness of this hack.  The results were alarming.  Thirty percent of the Fortune 500 companies targeted proved vulnerable to this security loophole, with the researchers able to collect 20 gigabytes of data, including emails that contained trade secrets, invoices, employee information, network diagrams, usernames and passwords.  Some of the largest Fortune 500 companies can have as many as 60 subdomains, all with a high volume of traffic, so this scam can reap huge rewards for determined hackers.</p>
<p>The newest typo-squatting technique can be used in two ways.  The first is passively, where a fraudster simply registers for a doppelganger domain, sets up an email server to catch any emails sent to this domain, and then waits for his in-box to fill up with data breach goodies.  If the fraudster wants to take things a step further, he can actively redirect emails to the intended recipients in order to get a reply.  With this “man in the middle” technique, the hacker sets up doppelganger domains for two companies that he knows are corresponding and writes a script to forward emails that he receives between the two entities, thus doubling his access to sensitive data.</p>
<p>How can doppelgangers be deterred?  Companies can mitigate their exposure to this threat by registering for doppelganger domains themselves, or – when those domains have already been snapped up – configuring their internal and external DNS servers to block those incorrect domains.  Above all, this latest incarnation of typo-squatting is a reminder of the need for vigilant <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">security systems</a> to ward off new and emerging data breach tactics.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/&via=Experian_DBR&text=Stealing data through doppelganger domains&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/10/18/stealing-data-through-doppelganger-domains/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>