{"id":1157,"date":"2011-09-13T10:18:56","date_gmt":"2011-09-13T14:18:56","guid":{"rendered":"http:\/\/www.domainandtrademark.com\/?p=1157"},"modified":"2019-08-09T09:08:51","modified_gmt":"2019-08-09T13:08:51","slug":"typosquatting-can-lead-to-business-data-breaches","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/","title":{"rendered":"Typosquatting &#8216;can lead to business data breaches&#8217;"},"content":{"rendered":"<div>\n<p>Fraudsters can use typosquatting techniques to get their hands on data-filled  emails that would otherwise not have been delivered, it has been reported.<\/p>\n<p>According to Peter Kim and Garret Gee of the Godai Group, cyber thieves can  get their hands on confidential information by registering web domains  containing commonly mistyped names.<\/p>\n<p>Over a six month period, the researchers received 20GB of data to their  typosquatter email addresses \u2013 with many messages containing user names,  passwords and details of corporate networks.<\/p>\n<p>The researchers warned that up to a third of the top 500 US companies are  susceptible to this security flaw.<\/p>\n<p>Mr. Kim and Mr. Gee explained that the use of punctuation in email addresses,  for the purposes of sub domains, is causing the problem.<\/p>\n<p>If an employee, client or other individual misses out the punctuation mark  from the address as they send an email, the message delivery should fail.<\/p>\n<p>However, if the incorrect email address has been registered unscrupulously by  a third party, the mail has a destination to arrive at.<\/p>\n<p>&#8220;Doppelganger domains have a potent impact via email as attackers could  gather information such as trade secrets, user names and passwords, and other  employee information,&#8221; the researchers said.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported. According to Peter Kim and Garret Gee of the Godai Group, cyber thieves can get their hands on confidential information by registering web domains containing commonly mistyped names. Over a six month [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171],"tags":[531,110,177,152],"class_list":["post-1157","post","type-post","status-publish","format-standard","hentry","category-cyber-security","tag-cybercrime","tag-cybersquatting","tag-internet-security","tag-typosquatting"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Typosquatting &#039;can lead to business data breaches&#039; | CSC<\/title>\n<meta name=\"description\" content=\"Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Typosquatting &#039;can lead to business data breaches&#039; | CSC\" \/>\n<meta property=\"og:description\" content=\"Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2011-09-13T14:18:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-09T13:08:51+00:00\" \/>\n<meta name=\"author\" content=\"CSC Digital Brand Services\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CSC Digital Brand Services\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/\"},\"author\":{\"name\":\"CSC Digital Brand Services\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\"},\"headline\":\"Typosquatting &#8216;can lead to business data breaches&#8217;\",\"datePublished\":\"2011-09-13T14:18:56+00:00\",\"dateModified\":\"2019-08-09T13:08:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/\"},\"wordCount\":204,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"keywords\":[\"Cybercrime\",\"cybersquatting\",\"Internet security\",\"typosquatting\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/\",\"name\":\"Typosquatting 'can lead to business data breaches' | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"datePublished\":\"2011-09-13T14:18:56+00:00\",\"dateModified\":\"2019-08-09T13:08:51+00:00\",\"description\":\"Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/typosquatting-can-lead-to-business-data-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Typosquatting &#8216;can lead to business data breaches&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\",\"name\":\"CSC Digital Brand Services\",\"sameAs\":[\"https:\\\/\\\/cscdigitalbrand.services\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Typosquatting 'can lead to business data breaches' | CSC","description":"Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Typosquatting 'can lead to business data breaches' | CSC","og_description":"Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported.","og_url":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2011-09-13T14:18:56+00:00","article_modified_time":"2019-08-09T13:08:51+00:00","author":"CSC Digital Brand Services","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"CSC Digital Brand Services","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/"},"author":{"name":"CSC Digital Brand Services","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868"},"headline":"Typosquatting &#8216;can lead to business data breaches&#8217;","datePublished":"2011-09-13T14:18:56+00:00","dateModified":"2019-08-09T13:08:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/"},"wordCount":204,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"keywords":["Cybercrime","cybersquatting","Internet security","typosquatting"],"articleSection":["Cyber security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/","url":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/","name":"Typosquatting 'can lead to business data breaches' | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"datePublished":"2011-09-13T14:18:56+00:00","dateModified":"2019-08-09T13:08:51+00:00","description":"Fraudsters can use typosquatting techniques to get their hands on data-filled emails that would otherwise not have been delivered, it has been reported.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/typosquatting-can-lead-to-business-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Typosquatting &#8216;can lead to business data breaches&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868","name":"CSC Digital Brand Services","sameAs":["https:\/\/cscdigitalbrand.services\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/1157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":3,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/1157\/revisions"}],"predecessor-version":[{"id":1159,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/1157\/revisions\/1159"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=1157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=1157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}