Inspired by 'Another potential threat of Doppelganger domains'.
The original article is written by Kim Zetter.
Basically, this is the summary.
Doppelganger domain situation happens when you try to send email to brandonteohno1@yahoo.com and instead you sent it to brandonteohno1@ahoo.com and sometimes event brandonteohnol@yahoo.com.
The article says that when you send email to the wrong email addresses which are categorized as Doppelganger domain, you risk sending confidential information and exposes data lost and suffers data confidentiality breach or something like those.
Mitigating Strategies (recommended by the white paper)
The original article is written by Kim Zetter.
Basically, this is the summary.
Two researchers who set up doppelganger domains to mimic legitimate domains belonging to Fortune 500 companies say they managed to vacuum up 20 gigabytes of misaddressed e-mail over six months. |
Doppelganger domain situation happens when you try to send email to brandonteohno1@yahoo.com and instead you sent it to brandonteohno1@ahoo.com and sometimes event brandonteohnol@yahoo.com.
The article says that when you send email to the wrong email addresses which are categorized as Doppelganger domain, you risk sending confidential information and exposes data lost and suffers data confidentiality breach or something like those.
These researchers set up 30 doppelganger accounts for various firms and found that the accounts attracted 120,000 e-mails in the six-month testing period. The emails that came into these sites include such potentially valuable information as:
|
Mitigating Strategies (recommended by the white paper)
|
Comments