Terry Cutler – The Ethical Hacker
Home » What is spoofing?
Articles Blog Business Content Consumer Content Consumer Scams Internet Safety Media

What is spoofing?

Spoofing is when a malicious person masquerades as someone or a well-known company to win your trust. The idea is to gain access to your computer or device. The goal is to steal your data, money, and spread malware.

When it comes to spoofing, hackers will use fake emails and websites. Much like a phishing attack, a spoofed email will claim to be from your financial institution or a subscription-based company like Netflix. Spoofing attacks make it appear as though the hacker’s communications can be trusted.  

The spoof reports that your account has been compromised by a fraudster in many cases. The email will have a level of urgency and instructs you to log into their fake site with the link provided. Once you do that, you will be asked to enter your account information to verify your identity. If you do, you are the one compromised. 

Here’s an example. 

Hello, we have encountered difficulties with your information and debiting.

As a result, we will end your Neetflix subscription.

You can use your account to watch Netflix on your favourite devices.

Click here: Restart your subscription

We’re here to help you if you need it.

The Netfnlix Team

If you check closer, Netflix is spelled Neetflix. The Netfnlix Team is also spelt wrong.

If you’re still being spoofed and click on the link, the link more than likely connects you and your computer to a fake site the hacker controls. It’s easy to capture any data stored on your computer. 

Be vigilant

If you receive an email claiming to be from your card issuer, call your provider for further information.

  • Remain vigilant against the most common types of spoofing. 
  • Call to confirm.  If you’re being asked to submit personal information, like a password or credit card number, call the sender to confirm. If you receive an email claiming to be from your card issuer, call your provider for further information.
  • Look out for strange attachments: Don’t open attachments that you don’t expect to receive.

Subscribe to our mailing list

* indicates required

Related posts

SecurityWeek Top 25 Picks for 2010

Terry Cutler

Heartbleed bug causes headaches for Montreal accountants

Terry Cutler

Ethical hacker Terry Cutler says developers aren’t building code with security in mind

Terry Cutler

Internet safety, hacking, piracy. Radio Interview on K103.7 the Monster

Terry Cutler

Does your staff have too much access?

Terry Cutler

What you need to know about popular scams and how to avoid being duped

Terry Cutler

LEARN THE SECRETS OF THE WORLD’S MOST SUCCESSFUL CYBER SECURITY EXPERTS. Close I'm Interested

Privacy & Cookies Policy