Can you spot the deception? At first glance, it looks like a genuine Microsoft password reset email. The sender’s name even says “Microsoft noreply@microsoft.com.” But a closer look exposes the fraud: the domain is not microsoft.com; it’s rnicrosoft.com, where the attackers replaced the letter “m” with “r” + “n.” When typed together (“rn”), it visually mimics “m.” This is called a homograph phishing attack, a social engineering trick designed to exploit how the human eye reads text quickly. In cybersecurity, we call this visual spoofing, and it’s one of the most effective tactics in email-based fraud. What’s really happening The…


