View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. What Is
July 11, 2016updated 22 Sep 2016 12:45pm

What is spoofing?

There are various types of spoofing - all involving forgery.

By Ellie Burns

In the context of computing, spoofing can relate to a number of things, with nearly all concerning forgery and malicious intent.

IP address spoofing involves the creation of IP packets with a forged IP address in order to conceal the sender's identity or to impersonate another computer system. IP spoofing is most often used in denial-of-service attacks because it can hide the true source of attack as well as making filtering more difficult.

Email spoofing is when emails are created using a forged sender address. Email spoofing is commonly used as a phishing technique in order to make an email look like it has come from a legitimate source. Spam and worms also make use of spoofing, using the credible forged addresses to lure people to open and click malicious emails.

Website spoofing, SMS spoofing and protocol spoofing are all different types of spoofing methods – all deceiving individuals and businesses through forged credentials.

 

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU