The ability to fool or “spoof” a biometric sensor. Incorrectly verifying an imposter against a claimed identity on file in a biometric system. (See BHSUG 29, July 2002, “Beating Biometric Systems”, By David Mintie.)
Misrepresentation of its host name, domain name, or IP address by a client attempting to gain access to or send a message to a server.
Forged email addresses that hide the origin of a spam or virus message. It is used to trick people into opening an email because they believe it has come from a legitimate source.
The process of forging data packets so they appear to come from another host, commonly used to gain access through packet-filtering firewalls and other security systems.
To forge something, such as an IP address. IP spoofing is a common way for hackers to hide their location and identity
The act of impersonating a user or source machine or IP Address. For example, connecting to the Internet using an IP Address assigned to another machine.
Forging of another person's or company's e-mail address to get users to trust and open a message.
Attempting to gain unauthorized system access by impersonating another user of machine.
Impersonating the identity of an individual (such as a storage administrator) or of a device (such as a storage switch) to gain unauthorized access to a storage resource.
The use of fraudulent web sites designed to look like legitimate ones in an attempt to capture personal details.
Pretending to be someone or something else (e.g. entering someone else’s password).
A short-term form of identity theft by spammers, who steal someone's e-mail address to send out thousands of e-mails. One lawsuit targeting spammers says spoofing "severely and irreparably damages the business reputation of innocent individuals or companies who are often falsely identified or implicated by the spammer..."
Pretending to be someone else. The deliberate inducement of a user or a resource to take an incorrect action. Attempt to gain access to an AIS by pretending to be an authorized user. Impersonating, masquerading, and mimicking are forms of spoofing.
This is when one party imitates or masquerades as someone else on line.
Impersonating another person or organization to make it appear that an email message originated from somewhere other than its actual source.
the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
Unauthorized use of legitimate identification and authentication data, however it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.
The practice of falsifying email headers to disguise the origin of an email for the purpose of spamming.
When an attacker uses a fake Internet address so that the source address of an IP packet is not the actual source. An attacker from outside of the network (meaning, from the Internet) may send packets with a source address on the LAN. This deceives the internal servers into identifying the attacker as a legitimate internal network user and the internal address becomes the victim. Spoofing is used in most of the well-known DOS attacks.
forgery of an e-mail header so that the message appears to have originated from an entity or location other than the actual source.
Sending email messages which have been created to appear that they were sent by a (typically trustworthy) third party. Spoofing is commonly used to commit fraud using "Phishing" schemes, and to evade responsibility for large unsolicited email compaigns. See also "Authentication" and "Phishing".
the process of disguising one computer user as another
The act of forging an email so that it looks to have come from someone else. Some common types of virus effectively spoof email since they scour an infected PC for email addresses which they then used to send out copies of themselves.
A generic term covering a range of computer network attacks whereby the attacker attempts to forge or intercede in a chain of communication. This can take a number of forms: email spoofing, IP spoofing and webpage spoofing.
Forged email addresses that hide the origin of a spam or virus message. Used to trick people into opening an email in the belief that it has come from a legitimate source.
Spoofing is when a spammer or scammer fakes his origin or pretends to be someone else i.e. of a sent mail, where the header is made to appear from someone other than who it really is. This is often the case when someone sends you either phishing mails, making it look like it came from a legitimate sender to try to trick you.
Disguising the sender address of an email message to make it appear as thought it is from another person, usually for malicious reasons.
The falsification of an email header so that the email appears to have originated from someone or somewhere other than the actual source. Illegitimate marketers use spoofing to disguise their identity in an attempt to commit fraud and avoid prosecution for sending UCE or spam. Federal law prohibits spoofing, however, until sender identity can be established, spammers will continue to escape the law.
Faking the sending address or otherwise masquerading as an authorized user in an attempt to gain illegal entry into a secure system.
Forged email addresses that hide the origin of a spam message. The sender aims for the recipient to believe that the message has come from a legitimate source. We will never send emails asking for personal security information.
The process of sending an email from a faked address.
Spoofing is sending a message pretending to be someone else. For example, an email server could be used to create an email as if it had been written by someone, and then "forwarding" it to its final destination. The IP address of the sender of a message can be spoofed, too. Anything that can be spoofed should not be trusted.
The disreputable and often illegal act of falsifying the sender email address to make it appear as if an email message came from somewhere else.
A security breach in which one machine on the network masquerades as another.
Spoofing is a general term for several different activities that involve disguising the source of a communication or the identity of a user. For example, spammers often attempt to cover their tracks through e-mail spoofing, in which the spam e-mail appears to originate from one source when in fact it was sent from another. Another type of spoofing can result from a PC hijacking, in which the attacker assumes the identity of the victim to gain access to privileged information and/or Web sites storing valuable data, such as online banking sites.
Sending email (or other information) by deceptive means. Usually using another computers identity. Example: Sending an email and making it appear that it did not come from the originator, but rather another person’s computer.
A Web site posing as another site to gather confidential or sensitive information, alter data transactions, or present false or misleading data.
The practice of changing the sender's name in an email message so that it looks as if it came from another address.
Use of a forged IP address for transmitting data, used to conceal or mislead systems about the data source. E-mail spoofing is the forgery of an e-mail HYPERLINK "http://WhatIs.techtarget.com/definition/0,,sid9_gci213480,00.html" header, resulting in a message that appears to have originated from someone or somewhere other than the actual source.
Pretending to be someone or something else (e.g. by forging the sender's address in e-mail).
Faking the sending address of a transmission to make it look like it is coming from a trusted host or address in order to gain illegal entry into a secure system. A generic term for activities in which trusted relationships or protocols are exploited. Impersonating, masquerading, and mimicking are forms of spoofing.
When a virus finds an e-mail address on an infected computer's hard drive and sends out e-mails that say they came from that e-mail address.
a technique used to gain unauthorized access to a computer, whereby the intruder sends a message to the computer indicating that the message is coming from a trusted source.
Altering an email's sending address so as to appear to be from a different sender.
A technique use to make network traffic or e-mails masquerade as originating from a different location or person to its actual origin.
Spoofing refers to the practice of making an email appear to have been sent from one source while concealing the true identity of the originator. Spoofing can be used to trick people into disclosing sensitive information such as passwords online. This is also commonly known as phishing.
The act of pretending to be someone else. For example, a person can pretend to have the email address
[email protected], or a computer can identify itself as a site called www.iPlanet.com when it is not. Spoofing is one form of impersonation. See also misrepresentation, impersonation.
is when an e-mail message appears to come from a legitimate source but in fact is from an impostor. E-mail spoofing can be used for malicious purposes such as trawling for sensitive business data and other industrial espionage activities.
Phishing, carding, and spoofing refers to the same thing. There are also other terms that are used for similar deceptions. Phishing is when someone attempts to fraudulently get sensitive information from you, such as passwords and credit card details, by masquerading as a trustworthy person or business in a seemingly official email message.
similar to military techniques but designed for computer systems-(web spoofing-shadow web site 'In the worst possible case, a criminal could use a false Web site to discover passwords and account numbers, assume the victims' identities, possibly defraud them or merchants, or access or modify victims' private data' Edward Felten, Prof computing science Princeton (Australian 12-13 April 1997, pp. 1 and 6).
Spoofing is a method used by some people to hide where an email comes from. All emails have a 'From:' field which tells the email server where the email came from. By using a badly configured email proxy server, it is possible to set the 'From:' field of an email to be anything, effectively hiding who sent the original email.
When someone receives e-mail that appears to have originated from one source when it actually was sent from another source. E-mail spoofing is often an attempt to trick the user into releasing sensitive information such as passwords. Phishing is the Web page version of this.
When spammers forge an email address to hide the origin of a spam message. Email scammers and virus writers also use this trick. Scammers spoof address lines to fool people into thinking an email has arrived from a legitimate source, such as an online bank. Similarly, virus writers have passed off viruses as security patches by spoofing their origin as being, for example, from Microsoft technical support.
sending out email using someone else's email address ( More...)
Forging an e-mail address or IP address to hide one's location and identity.
Addressing a web page or an email with a false referrer. Like sending an email from a false address.
A method that spammers use to conceal their identities. Spoofing may include sending spam using a third party's domain name or e-mail address in the “From” line of the message, without permission.
The falsification of an e-mail header (originating address) so that the e-mail appears to have originated from someone or somewhere other than the real source.
Addressing a web page or an e-mail with a false referrer. Like sending an e-mail from a false address.
Method of rendering a GPS unit useless. The attacker transmits fake radio signal on the same frequency as satellite signals causing the unit to calculate an incorrect position. See Anti-Spoofing.
Assuming the identity of another as in sending email under someone else's name.
While originally used to refer to e-mail that was sent without explicit permission from the recipient, now it's used more broadly to refer to any unwanted e-mail. Spam filters attempt to identify spam e-mail and prevent it from being delivered to your inbox.
Spoofing is a term that is most commonly used to describe the act of impersonating or masquerading as a person or organisation. Typically the term will be used to describe the use of an official email address in a Phishing email or the content of a fake website.
Impersonation, assumption of another entity's identity in a communication protocol for the purpose of gaining access to someone else's resources or distributing fake data. Examples might include faking an Internet address so that one looks like a certain kind of Internet user, or faking an enterprise's server to distribute false product pricing data).