spoofing

Related to spoofing: Email spoofing

spoof

1. noun A satirical imitation, mockery, or parody of someone or something. The film is a spoof of old film noirs from the 1940s and '50s. This pivotal scene in the play is meant to serve as a spoof on the maddening, nonsensical bureaucracy surrounding such legal issues.
2. verb To imitate, mock, or parody someone or something in such a satirical manner. It's clear the writer is spoofing the peculiar way in which the former president was known to speak. I always wanted to make a movie that spoofs the over-the-top action films from the '80s.
3. verb In information security, to masquerade as a particular person, device, program, etc., in order to gain illegitimate access to something, such as information or control over a network or system. Please be aware that hackers are spoofing email addresses from the bank in order to obtain customers' login credentials. Someone spoofed the IP address of a trusted device in order to deliver message across the company network containing malware.

spoofing

The practice of stealing, or attempting to steal, personal information over the phone or on the internet by pretending to be someone or something that legitimately requires such details. We've gotten reports of a number of spoofing attempts being made against our customers recently. Remember, we will never ask you for your password under any circumstances, whether on the phone or by email. The use of the so-called dark web makes the culprits behind these spoofing attacks nearly impossible to catch.
See also: spoof
Farlex Dictionary of Idioms.

spoofing

and carding and phishing 1
n. stealing passwords and personal information on the internet. (see also phish for an explanation.) He set up an evil twin for spoofing at the coffee shop.
See also: spoof
McGraw-Hill's Dictionary of American Slang and Colloquial Expressions
See also:
  • project (something) upon (someone or something)
  • popcorn film
  • lights, camera, action
  • box-office bomb
  • on location
  • skin flick
  • return to form
  • a demolition job
  • a hatchet job
  • BTS
References in periodicals archive
Overall, there are four categories of countermeasures for spoofing attacks: (1) data-driven characterization, (2) user behavior modeling, (3) user interaction, and (4) additional devices for multi-modalities [11].
FINRA CEO Richard Ketchum said in a statement that market manipulation tactics like spoofing and layering "take advantage of other investors and harm public confidence in market integrity.
Spoofing an IP address involves changing the header of an internet protocol address (that allows servers to know where information is coming from) to match someone else's IP.
If you've never tried caller ID spoofing before now's your chance.
The appearance is the same, but the numbers assigned to certain names are different," he said, in an effort to explain how DNS spoofing works.
Problems in ARP and ARP Spoofing. As ARP updates the host's ARP cache table in the absence of reliable mutual agreement procedures while transmitting the request/reply messages, it has a few fundamental security problems.
The people who are involved in SIM spoofing can tell the exact location, including the area and the city, wherever a customer has gone.
Dynamic key generation and incremental deployment makes this methodology a self-resilient against IP spoofing attacks.
The company said the SDA, available at http://www.spoofem.com, provides consumers with easy access to all of the services that are available on SPOOFEM.COM, including caller-id spoofing, spoofing text and e-mail messages, celebrity entertainment news, computer security news, along with a complete list of the spy shop products.
With a combination of caller ID spoofing and freely available voice modification software, posing convincingly as someone else is relatively easy-similar to Web site spoofing and phishing.
THIS week is our third and final instalment (honest) on spoofing.
Central Oregon Community College, gives tips for protecting home computers and introduces its website readers to the terms "phishing" and "spoofing," formerly just known inside computer centers.
Since most e-mail threats rely on sender address spoofing, adopting authentication technologies can go a long way toward keeping fraudulent e-mails from hitting enterprise inboxes.
This patent-pending technology enables full protection against email spoofing, electronic messaging fraud, and email Phishing attacks.
This fast-spreading scam that mimics e-mail and Web sites from legitimate companies is known as "spoofing," or as "phishing," since it fishes for personal information including user-names, passwords and social security numbers.