About 368,000 results
Open links in new tab
  1. Spoofing and Phishing — FBI

    Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are …

  2. Spoofing attack - Wikipedia

    In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to …

  3. Caller ID Spoofing - Federal Communications Commission

    Spoofing is often used as part of an attempt to trick someone into giving away valuable personal information so it can be used in fraudulent activity or sold illegally, but also can be used …

  4. Spoofing: How It Works and How to Stay Safe in 2025

    Nov 21, 2025 · Spoofing is when a scammer disguises themselves as someone you trust in order to steal your identity. For example, if you’re a Best Buy customer, you might receive fake …

  5. What is Spoofing & How to Prevent it - Kaspersky

    Spoofing is a broad term for the type of behavior that involves a cybercriminal masquerading as a trusted entity or device to get you to do something beneficial to the hacker — and detrimental …

  6. What is a Spoofing Attack? - Verizon

    Spoofing is when someone disguises themselves as a trusted contact to access personal information. Learn the types of spoofing attacks and how to prevent them.

  7. What is spoofing? How to protect yourself with 12 different ...

    Dec 30, 2024 · Spoofing is the act of falsifying information to impersonate a trusted source, often to steal data or money. Learn more about spoofing here.