Featured
- Get link
- X
- Other Apps
E-mail spoofing: a hoax with the appearance of 'hacking'
There are scams that do not go out of style, and this deception returns repeatedly to our mailboxes. You receive an email, apparently, sent from your own email address and they try to make you believe that your account has be situated hacked.
This cyber scam focuses its deception on writing to you from
your own email or from the company you work for. The subject that appears in
this malicious e-mail tends to be strange to the recipient , on the one hand,
they may directly allude to the fact that your email has been hacked, or
happening the other hand, they possibly will go around and around until they ask
you for a financial retribution so as not to reveal information that they have
allegedly stolen from your personal account.
This is one of the many extortion campaigns that try to
capture the attention of the victims, but the peculiarity is that they write to
us from our own email and that alarms us. This fact arouses our curiosity and
concern. Simply because of this, we may start messing around in the e-mail, and
click on a link that we shouldn't. Directly, the simplest solution is to delete
the e-mail, without answering or clicking on the links.
How do they steal our email account?
They really don't . They are not stealing our email account,
they are just making it look like it has been stolen from us. This is a
technique known as 'spoofing' or impersonation, that is, through malicious data
they pose as a different identity, in this case the identity of the recipient
of the scam. These attacks, in addition to email spoofing, can also be IP
address spoofing, ARP (address resolution protocol), DNS (domain name system)
and even web spoofing.
E-mail spoofing is a widely used technique, which is done
through the use of an SMTP ( Simple Mail Transfer Protocol ) server , which is
the protocol for simple mail transfer, specially configured so that it appears
that the senders are different from the senders. that they really are . To
configure an email, there are other email management protocols that include
authentication mechanisms that are more robust and secure.
- Get link
- X
- Other Apps
Popular Posts
Transformer Protection & Transformer Protection Circuits(1)
- Get link
- X
- Other Apps