Forging the sender address

One of the ways an attacker tries to penetrate an organisation is by emails. An attacker in a remote part of the planet can send a malicious email and start attacking an organisation. For obvious reasons an attacker would not want to be identified, therefore the attacker forges the sender address to cover his/her tracks. […]

Fixes for Spoofing

Even the most optimistic experts accept that the problem will persist, though much progress is being made on technical solutions. No amount of training, it seems, will stop computer-users clicking on malicious links or opening booby-trapped attachments in fake emails, so a technical solution is needed to defeat phishing — a tactic that still provides the baseline method of network […]

Difference between Phishing and Spoofing

What is Phishing? phishing is a form of criminal activity using social engineering techniques, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises […]

Scroll to top