Featured
- Get link
- X
- Other Apps
E-mail spoofing is a widely
The main threats posed by this scam are that, when you click on any of the links or attachments in the email, malicious software is installed on your computer, or that, with social engineering techniques, they try to convince you to make an economic income in a account number provided to you. They usually argue that this is how they will return your email or that by hacking it they have obtained information about you that they will make public. construction bolts
This is one of the many extortion campaigns that try to
capture the attention of the victims, but the peculiarity is that they write to
us from our own email and that alarms us. This fact arouses our curiosity and
concern. Simply because of this, we may start messing around in the e-mail, and
click on a link that we shouldn't. Directly, the simplest solution is to delete
the e-mail, without answering or clicking on the links.
They really don't . They are not stealing our email account, they are just making it look like it has been stolen from us. This is a technique known as 'spoofing' or impersonation, that is, through malicious data they pose as a different identity, in this case the identity of the recipient of the scam. These attacks, in addition to email spoofing, can also be IP address spoofing, ARP (address resolution protocol), DNS (domain name system) and even web spoofing.
E-mail spoofing is a widely
used technique, which is done through the use of an SMTP (
Simple Mail Transfer Protocol ) server , which is the protocol for simple mail
transfer, specially configured so that it appears that the senders are
different from the senders. that they really are . To configure an email, there
are other email management protocols that include authentication mechanisms
that are more robust and secure.
How to act against these e-mails and
how to prevent them?
To prevent these attacks, experts recommend creating SPF
records and DKIM digital signatures. With them, one or more authorized
providers for mailing are identified. Since the purpose of this log is to
identify the origin of emails, it can detect whether the email was sent from a
fraudulent email. We must bear in mind that most of these e-mails will enter
the 'spam' or SPAM tray since mail services use SPF records to identify spam.
It is vitally important to understand that these emails are
malicious and we should not respond to them, much less respond to their
requests. They are a common scam, an identity theft hoax, which has not had
access to our emails or to our computer.
- Get link
- X
- Other Apps
Popular Posts
Transformer Protection & Transformer Protection Circuits(1)
- Get link
- X
- Other Apps