What is 'Spoofing'

Spoofing is a type of scam where an intruder attempts to gain unauthorized access to a user's system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information in order to gain access to one's bank account, computer system or to steal personal information, such as passwords.

BREAKING DOWN 'Spoofing'

There are several kinds of spoofing including email, caller ID, and uniform resource locator (URL) spoof attacks.

Email spoofing (or phishing), used by dishonest advertisers and outright thieves, occurs when email is sent with falsified “From:” entry to try and trick victims that the message is from a friend, their bank, or some other legitimate source. Any email that claims it requires your password or any personal information could be a trick.

In a caller ID attack, the spoofer will falsify the phone number he/she is calling from.

URL spoofing is when scammers set up a fraudulent website to obtain information from victims or to install viruses on their computers. For instance, targets might be directed to a site that looks like it’s from their credit card company and be asked to log in. If one falls for it and actually logs in, the scammer could then log onto the real site and commit mishap by using the account information the victim used to log in. (For more, see: 6 Ways To Protect Yourself From Cybercrime)

Be extremely cautious whenever you receive a message asking for personal information and only download files from trusted sources. Install firewalls to block suspicious inquiries and keep antivirus software installed and up-to-date on any computer you use. If you get an inquiry seeking personal information, don’t provide it. Hang up (or log off) and then independently look up the phone number or customer service email address from the entity purportedly contacting you for your personal information. If you think you’ve been spoofed, contact the FCC at 1-888-CALL-FCC or via email at www.fcc.gov/complaints.

RELATED TERMS
  1. Spoofy

    Spoofy is the nickname for a mysterious cryptocurrency trader ...
  2. Phishing

    A method of identity theft carried out through the creation of ...
  3. Smishing

    The use of SMS (short messaging services) technology to phish ...
  4. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
  5. Two-Factor Authentication (2FA)

    Two-factor authentication (2FA) is a second layer of security, ...
  6. Mobile Banking

    Mobile banking is the act of making financial transactions on ...
Related Articles
  1. Tech

    Cybersecurity: Protect Yourself This Tax Season

    Take a little extra time to review online communications and avoid becoming a cybercrime victim.
  2. Tech

    Tips For Keeping Your Financial Data Safe Online

    Find out how to protect your personal information from phishers, scammers and thieves.
  3. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  4. Tech

    7 Ways to Protect Yourself From Online Identity Theft

    These seven steps can help protect your online identity from hackers and scammers.
  5. Tech

    Protecting Private Information From Hackers

    Two examples of how security measures protected clients' money from email hackers.
  6. Taxes

    How To Safeguard Your Tax Returns From Identity Theft

    Identity thieves love tax season. In 2012, there were 13 million victims of identity theft. As easy as it is for thieves to steal your information, there are also simple measures you can take ...
  7. Tech

    7 Cybersecurity Tips to Protect Your Finances

    These seven cybersecurity tips will help protect your finances from online fraud and hacking.
  8. Managing Wealth

    High Net Worth Investors Are Worried About Cybersecurity

    Many wealthy investors are more afraid of cybersecurity attacks than acts of terrorism.
  9. Tech

    Cybersecurity Steps Everyone Should Take

    Anyone using a device connected to the internet should employ these cybersecurity practices.
RELATED FAQS
  1. What are the top Social Security scams targeted at the elderly?

    Prevent Social Security scams by learning to recognize the most common types of scams that target senior citizens receiving ... Read Answer >>
  2. Is getting a free credit report safe?

    Discover whether getting a free credit report is safe, and find out how to get a legitimate free credit report. Understand ... Read Answer >>
Trading Center