Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

Homographs: Using Different Languages to Steal Your Data

Many hackers rely on their ability to trick users into giving up information or control of their technology. As technology advances, hackers continue to find new and updated ways to gain access to user accounts. One scam in particular, known as homographs, has seen an increase of popularity as of late.

What are they?

Homographs are a phishing strategy that is used to disguise a hyperlink to look like a legitimate, secure website. Scammers are able to use these attacks due to the way that many browsers interpret URLs with characters from another language. An example of this can be found with Russian Cyrillic letters, many of which look similar to English letters. To account for this, browsers utilize basic translation tools so a user can still access a legitimate website using non-English characters by translating the address into a series of English letters and numbers.

How do hackers use homographs?

Hackers are able to take advantage of homographs by using letters from another language that look identical to letters of the English language. They create a URL that looks identical to the legitimate site, but once clicked it will automatically take you to a compromised site where your data can be at risk. This attack works because users won’t be able to see that the URL is not legitimate until it is too late, as once they click the link they will most likely be infected by malware.

How can I protect myself?

While many browsers have created fail-safes to combat this issue, there are still many browsers that are left unprotected. Even those that do use the fail-safes can be easily tricked, so it’s up to the user to prevent the attack. Be conscious of every link you click, and never open up a URL that you cannot verify. This means any URL in an unknown email address, or a pop-up ad that claims to be a legitimate company. The best way to avoid homograph attacks is to always manually type in the web address.

Want to know more about how to prevent cyberattacks? Contact Info Advantage at (585) 857-2644 to talk to our security and technology professionals today.

IoT Connected Stuffed Animals Leak Millions of Acc...
How Rugged Are You? A Guide to Rugged Laptops
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Privacy Best Practices Current Events Hackers malware backup technology solutions Productivity cyber attacks Business practice Software Business Management Ransomware cloud Microsoft Innovation Business Continuity Mobility Disaster Recovery Internet business Quick Tips Hardware Efficiency Office tips Business Computing Mobile Devices Network Security Windows 10 hardware solutions Computer Avoiding Downtime Law Enforcement Flexibility data breach email Social Education cyber criminals Wi-Fi Operating System voip Laptop Health Communication cloud capabilities Passwords Miscellaneous Humor phone systems Personal Information IT Identity Theft Mobile Computing Money Information Technology Saving Money Antivirus IT Services Smartphone Facebook History Small Business Risk Management Upgrade servers IT Support Office 365 Application data internet user downtime Password content Virtualization Automobile Reputation Software-based phone systems Legal HaaS BDR byod Marketing Virtual Reality Search Windows cars Hosted Solutions Alert Internet Protocol Scalability Encryption Workplace Tips Data recovery Apps spam Update Wireless Automation Net worth Text Messaging hardware refreshes How To Employer-Employee Relationship ecommerce Microsoft Office time Managing Stress threats Artificial Intelligence Managed IT Services Cybercrime Server Gadgets virtualized servers Video Games Router iPhone Recovery Battery holiday Government business continuity plan Remote Computing ATMs Point of Sale Telephony Google Touchpad Entertainment PDF USB Google Drive Worker Commute VoIP right Instant Messaging End of Support Work/Life Balance Internet Exlporer Robot VPN Advertising computer network Hosted Solution Relocation Smartphones Private Cloud Users Social Media Telephone Systems Black Market User Tips

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name