What is spoofing

m
m
 
Line 1: Line 1:
 +
<seo title="What is spoofing" metakeywords="what is spoofing,how to spoof,spoofed email" metadescription="What is spoofing" />
 +
 
<div align=justify>There are different forms of email spoofing, but all have a similar result: a user receives email that is claimed to be sent from one source but actually being sent from a different source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing some sensitive information (e.g. passwords or credit card number). Nowadays there are several ways how to spoof emails but we'll outline the basic one.
 
<div align=justify>There are different forms of email spoofing, but all have a similar result: a user receives email that is claimed to be sent from one source but actually being sent from a different source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing some sensitive information (e.g. passwords or credit card number). Nowadays there are several ways how to spoof emails but we'll outline the basic one.
  
Line 10: Line 12:
 
* using some good antivirus software, which is updated on the regular basis.
 
* using some good antivirus software, which is updated on the regular basis.
  
* setting up SPF Record. Sender Policy Framework (SPF) records allow
+
* setting up SPF Record.  
domain owners to specify the hosts  permitted to send email on behalf
+
Sender Policy Framework (SPF) records allow domain owners to specify the hosts  permitted to send email on behalf
 
of their domains. Normal SMTP allows any computer on the net to send
 
of their domains. Normal SMTP allows any computer on the net to send
an email claiming to be from anyone. This is quite often used by spammers to
+
an email claiming to be from anyone. This is quite often used by spammers to send emails with forged ''From:'' addresses. SPF record makes it difficult to forge ''From:'' addresses and, therefore, send spoofed emails
send emails with forged From: addresses. SPF record makes it difficult
+
to forge From: addresses and, therefore, send spoofed emails
+
  
For example, if you own the domain example.com, you can specify the
+
For example, if you own the domain ''example.com'', you can specify the
authorized hosts to send email originating from user@example.com.
+
authorized hosts to send email originating from ''user@example.com''.
 
Setting up a record will ensure that messages sent from users in your
 
Setting up a record will ensure that messages sent from users in your
 
domain are not rejected by the recipient's domain.
 
domain are not rejected by the recipient's domain.
Line 24: Line 24:
 
Also some additional tips to prevent getting spoofed email:
 
Also some additional tips to prevent getting spoofed email:
  
* Look at the "From" address on the email you receive. Anything to the
+
* Look at the ''"From"'' address on the email you receive. Anything to the
right of the "@" symbol should be the name of the legitimate company.
+
right of the ''"@"'' symbol should be the name of the legitimate company.
  
 
* Look at the URL address that appears in your browser address bar
 
* Look at the URL address that appears in your browser address bar
Line 31: Line 31:
 
same address as the legitimate address for that company's website.
 
same address as the legitimate address for that company's website.
  
'''Note:''' there are a few articles on the net providing the
+
'''Note:''' there are a few articles on the net providing the information on how to spoof. Look for them as well. They will help you to take additional steps to prevent spoofing.</div>
information on how to spoof. Look for them as well. They will help you to take additional steps to prevent spoofing.</div>
+

Latest revision as of 12:41, 7 November 2011

rss feed for my website