That's the term for a security risk resulting from mis-typed email addresses.

The BBC explains the scam this way:

a large American financial group may take bank.com as its corporate home but internally use us.bank.com for staff email. Usually, if an address is typed with one of the dots missing, ie usbank.com, then the message is returned to its sender.But by setting up similar doppelganger domains, the researchers were able to receive messages that would otherwise be bounced back.

Researchers Peter Kim and Garrett Gee bought 30 domain names similar to subdomains used by Fortune 500 companies. Six months later, they had over 120,000 emails and over 20 GB of data at their disposal.

Here are a few examples of what Kim and Gee found, according to the Naked Security Blog:

Passwords for an IT firm's external Cisco routers

Precise details of the contents of a large oil company's oil tankers

VPN details and passwords for a system managing road tollways

And all this is just by buying domain names. Real, villainous typosquatters would probably run a "man in the middle" scam, where they would forward your message to the correct recipient after grabbing your email's contents, leading you and everyone to believe that you can safely send more email to the wrong address.

“I think the best compliment I can give is not to say how much your programs have taught me (a ton), but how much Marketplace has motivated me to go out and teach myself.” – Michael in Arlington, VA

As a nonprofit news organization, what matters to us is the same thing that matters to you: being a source for trustworthy, independent news that makes people smarter about business and the economy. So if Marketplace has helped you understand the economy better, make more informed financial decisions or just encouraged you to think differently, we’re asking you to give a little something back.

Become a Marketplace Investor today – in whatever amount is right for you – and keep public service journalism strong. We’re grateful for your support.

Follow John Moe at @johnmoe