Skip to main content

Microsoft Edge now warns when your typos can lead to being phished

Microsoft has detailed its latest effort to protect against various types of fraud that can happen via a method as simple as spelling a website URL incorrectly.

The company has announced as of Monday that it is adding website typo protection to its Microsoft Defender SmartScreen service, to aid against web threats such as “typosquatters.” These types of cybercrime can include phishing, malware, and other scams.

Microsoft Defender SmartScreen helps protect users against websites that engage in phishing and malware campaigns.
Image used with permission by copyright holder

If you happen to have a typo in the website name you’re trying to input, it can send you to an alternate page that hosts “advertising sites, affiliate links, false products, fake search engine results, or in some cases by redirecting users into parked domains reserved for very short-lived phishing campaigns,” Microsoft noted.

Recommended Videos

The new Website typo protection on the Microsoft Defender SmartScreen service combats these typosquatter tactics by alerting you via a warning page when you have misspelled a URL and been directed to a typosquatting site. You will be asked to verify the site address you want to visit before you can continue, the brand added.

Please enable Javascript to view this content

Microsoft has already partnered with the Bing Indexing team in order to identify new typosquatters and their webpages as soon as they pop up to keep the Microsoft Edge browser dynamically updated.

Microsoft is not always known for its preventative measures when it comes to cybersecurity. More commonly, the brand responds in the aftermath of a major exploit.

A recent zero-day vulnerability, CVE-2022-41040, and CVE-2022-41082, that was discovered in Microsoft’s Exchange email servers in early October was not only already exposed to bad actors, but it was also mistaken for a different exploit before it could be identified.

At the time, Microsoft stated it was “working on an accelerated timeline” to address the zero-day vulnerability and create a patch. However, with the exploitation already in the wild, there are ample opportunities for businesses and government entities to be attacked by bad actors. So far, there haven’t been any known attacks using the CVE-2022-41040 or CVE-2022-41082 vulnerabilities.

Fionna Agomuoh
Fionna Agomuoh is a Computing Writer at Digital Trends. She covers a range of topics in the computing space, including…
Microsoft’s controversial Recall feature can’t be uninstalled
Recall promotional image.

The Recall saga continues. As it turns out, Microsoft's controversial AI feature cannot be uninstalled, although that was spotted as an option in the latest version of Windows 11 24H2.

The ability to uninstall it was initially observed by Desk Modder as a part of the "Turn Windows features on and off" menu in Control Panel, but Microsoft has now confirmed to The Verge that it was merely a bug. The statement to The Verge says that being listed in that menu is an issue that "will be fixed in an upcoming update."

Read more
My favorite Steam app can now quadruple your frame rate
Cyberpunk 2077 running on the LG UltraGear Dual Mode OLED.

Lossless Scaling is diving into insanity. It's one of my favorite Steam apps, and something I've come to recommend to every PC gamer I know over the past few months. Now, the developer is pushing things further once again with a setting that can quadruple your frame rate. As if frame generation with any game wasn't enough, and if tripling your frame rate didn't sell you, now you can get a 4X increase in performance.

At least in theory. The developer announced the 4X update for Lossless Scaling last week, and it rolled out over the weekend. I downloaded it and played around in a few games. It works, and shockingly well considering how few rendered frames you're actually seeing. But it definitely gets into absurd territory when it comes to image quality.
A refresher on Lossless Scaling

Read more
Update your Chrome browser now to gain this critical security feature
Google Chrome icon in mac dock.

Yesterday, in a blog post on Google's security blog, Willian Harris from Chrome's Security Team said that Google is improving the security of Chrome cookies on Windows PCs by adopting a similar method used in macOS to help protect users from info-stealing malware.

The security update addresses session cookies that authenticate your identity when you switch apps without logging back in. Google wants to adopt the security system used by Keychain on macOS and start using "a new protection on Windows," which updates Data Protection API (DPAPI) and brings a new security tool called "application-bound" encryption.

Read more