This is the act of fraudulently appearing as a different source. Hackers will spoof email addresses to appear as if they’re from certain companies. They could use this to trick the recipient into giving up sensitive info or downloading malware. A more advanced form is IP spoofing, which makes a website appear legitimate. Then the victim is unknowingly redirected to a false address where attackers can download malware.

Technology Elevated