Have you ever received an email asking you to log into your credit card’s website and update your account and password information, except you don’t have a card with that issuer? That’s a common scam known as “phishing.” Hackers looking to steal passwords and sensitive financial information coined the term back in the 90s. They send out thousands of fake emails as “bait” in the hopes of getting someone to “bite” by clicking on the links inside.
Remember when hackers painted a big red bullseye on Target back in 2013? A single click on a link in an email led to a massive data breach, exposing the sensitive information of 110 million Target customers.
Scams like this affect small and medium-sized businesses and individuals as well with alarming regularity. Two of the most common ways people fall victim are:
- Opening an email and clicking on a link to a login page that looks authentic, but it’s not.
- Following a link to a site you visit all the time, even though the address has been altered subtly–a practice known as “domain spoofing.”
The good news is that people are now more likely to try and confirm an email authenticity before volunteering any sensitive information. As for domain spoofing, the best defense is to select a domain name that guards against phishing attacks.
TrueName™ branded domains include a robust security technology – at no additional cost to customers – that blocks domain imposters before they strike. This proactive protection called homographic blocking prevents homographs—fraudulent lookalike domain names that substitute letters or numbers with characters from Latin, Greek, and Cyrillic script tables for the purpose of malicious activity.