HOW THE SPOOFERS OPERATE ?

   

            E-mail spoofing can assume a variety of forms. Basically, a spoofed e-mail  appears to be sent from one source when it actually was sent from another source entirely. However, any replies to a spoofed e-mail go directly to the legitimate e-mail account causing confidential customer information to be captured. It is extremely difficult to detect a spoofed e-mail address, at first glance. But it is possible to identify a spoofed e-mail by carefully analyzing e-mail headers .Examples of spoofed email that could potentially affect you include:  email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this , email claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information .

   

Back