SPOOFING AND WAYS TO STAY SAFE FROM THEM
- Get link
- X
- Other Apps
WHAT IS SPOOFING?
The ' spoofing' (in English, falsify or deceive) is another
technique that phishing is implemented to commit virtual crimes. This
methodology involves three parties: the attacker, the attacked and the
impersonated virtual system. In order for the cybercriminal to achieve his
objective, it is necessary to establish a false communication by intercepting,
for example, emails or browsing web pages.
These attacks are classified according to the technology
they use. The most common are:
'Web
spoofing': It is the impersonation of a real web page by a false one,
with the aim of obtaining certain information from a person such as viewed web
pages, information from forms, passwords, relevant numbers, etc.
The victim can open the fake web page by any kind of
deception, usually accessed through a link. From that moment on, all traffic
from the victim's browser passes through a filter program and the cybercriminal
can modify any information from and to any server visited by the affected
person.
'Email
spoofing': This is a fraudulent email. The sender address and subject
are modified to appear to be from a trusted source. This is a commonly used
technique for 'spam' and ' phishing'. Although the content of most of these
emails is irrelevant, the mere act of opening them can cause great risks to
computer security.
'IP Spoofing': It consists of replacing the source IP address of a packet with another fraudulent IP address. The 'spoofing' seeks to appropriate the IP of another user on the network. Once the address is spoofed, all information that circulates will be altered and will be directed to the falsified IP.
How to
avoid these attacks?
Here are the following tips to prevent computer fraud and
preserve personal and professional information, as well as identity:
· Avoid
entering sites by clicking on addresses or links that are received by mail.
· Pay
special attention to the URLs that appear in the status bar to ensure that the
address of the site is correct. Although this is a simple and time-consuming
action, it is one of the most relevant when it comes to preserving computer
data. Verify that the URL you are entering begins with https and has a green
padlock.
· Observe
the appearance of websites and emails, as small elements can reveal deception.
Unknown senders, strange fonts, fonts or a different style and arrangement of
the texts should attract attention in order to detect possible fraud.
· Do not
respond to any email that asks for personal information. Be wary of any entity
or person who asks for your passwords, or any other information that may be
considered confidential. Never share your passwords or credit card details by
phone, email, or SMS.
· Do not
download files of questionable origin or from people you do not know. Doing so
can incentivize the installation of viruses, Trojans, etc. which are then used
to steal your personal and private data.
· Check
the sender of the mail before opening it.
· Use
proper antivirus to
keep you protected from all the viruses and cyber threats that will try to take
your information for the wrong use.
Comments
Post a Comment