What is Spoofing?
“Spoofing” refers to the act of imitating or masquerading as a trustworthy source. Spammers and scammers often use some form of this technique in order to gain personal information from unsuspecting victims. Here’s a few ways a scammer can implement this:
-Email Spoofing
By altering the “From” and “Reply-to” fields in an email, a spammer can make an email look like it’s from anyone. This is surprisingly easy to do, and yet many people assume that the “From” field is a true sign of legitimacy.
If a scammer can gain access to an address book, another tactic is to send the victim an email from what appears to be a friend. These can elicit less suspicion than, say, a poorly worded email that’s supposedly from the bank.
-Caller ID Spoofing
With the advent of VoIP (Voice Over Internet Protocol), there are now multiple programs that will allow a user to place a call purporting to be from any number they wish. In other words, a scammer can call from a different country, but have your Caller ID display a local number or familiar name.
While this practice has been illegal since 2010, it’s hardly slowed down the growth of this type of deception, particularly amongst overseas offenders. Don’t assume that Caller ID is infallible; if you’re suspicious, ask for a number where you can call back. If it doesn’t match, it’s time to hang up.
Spoofing is just one of the many tools a hacker can use to try and access your personal info. Oftentimes, it’s coupled with a Phishing attempt as well. But a little caution and a healthy dose of skepticism can help protect you from even the most determined of identity thieves.