What is (E-Mail or IP)Spoofing?

 

Spoofing :

The most Common Type of Spoofing that You are Likely to encourage is IP Or E-Mail Spoofing. 

Primarily used to Spoof  The Source Address of the E-Mail or IP of the Device.

In this Case E-Mail is look Just Like E-Mail come from the Trusted Server or Website.But its come from the Wrong Or Harmful sites Which Directly or Indirectly Affect the Customer In Various Ways.

It's Common In Now Days People Submitted Their Emails at many untrusted websites and We Don't know where they use our information. 

E-Mail Marketing is also a very Big-market your E-mails also used for that purpose to send you some deals by them and many other uses.  


                                                              fig:-  Example Of Spoofing

E-Mail Spoofing used to :-

(1) .Delivery phishing message (One that cons the user into divulging confidential information)  Replying to the E-mail won't work properly,but clicking on links in the E-mail will take the user to a spoofed Web site.

(2).Delivery a Malware payload,such as a Virus,Worms,or Trojan Horse.                                                       The Malware may come as an attachment that must be Downloaded or may be coded into the E-Mail So that all the user need to do is open the E-Mail.

One Of the most annoying Spoofing Trick is to use the content of E-Mail Address book on a Compromised Machine as the source of Spoofing.

A Spoofed E-Mail is Easy to detect by examining the E-Mail header information and is something technologically savvy user can be taught to do so.While in other spoofing attack,we cannot stop the spoofer from the spoofed message.

How To Avoid Spoofing: 

If the User of an Organization are not enough knowledgeable to understand an E-Mail header,then are some ways can be used to avoid much of the damage from E-Mail Spoofing-

1. User Can be trained to Download attachments from untrusted sources.Depending on the Nature of organization,the e-mail attachment can be blocked.

2.User of Organization should avoid address book software.such as Microsoft Outlook,that is vulnerable to surfing by malware.This can go a long way to prevent the address in an address book from being used as spoofed addresses.

3.User can be taught to be skeptical about E-Mail that Promises something that is too good to be true,even if that E-Mail appears to come from a trusted sources.The sources could be spoofed.

4.Reminds User Frequently that well-Known sites like Paypal,paytm,eBay,etc,,.Never Ask for any confidential Information about in an E-Mail,nor do they provide links in email to give some confidential Information.  


Comments

Popular posts from this blog

What is Cyber Crime? | Its Classifications.

What is Router and Router Network ?

How SEO works?