What is Spoofing?

by Keith Williams

Spoofing has its origins in 1884 when it was created as a game by a certain Comedian. It was developed as a game of trickery and deception. Today it has made its appearance as a nasty online virus which is able to hack into email accounts. It still maintains its characteristics as a malicious contender out to trick and deceive.

This little nasty hacks into email accounts and especially targets accounts that have been unused in a while. Once having access to the account it uses the account as a transmitter from where it send out emails to further its own evil wave of destruction. As with so many similar email viruses, the spoofing virus will let tricks the receiver to believe that the mail comes from an authentic source. Unfortunately, once it is downloaded and you have clicked through one of its links, the virus redirects to automatically to unsafe websites.

Recently such a spoofing virus has been extremely active on the Internet. It landed into peoples in boxes disguised as coming from transport companies such as FedEX and UPS. The virus contains a link requesting delivery confirmation.

With such a threat around one needs to ensure that you do everything in your power to intercept it before it is able to start its acts of destruction. There are a few simple things that you can do to protect yourself from such a threat, and to ensure that your account which is used very often has not been hacked into to be used by a spoofing spammer.

Many people use a number of online facilities which require a password. Some do the dangerous thing of using the same password for all of their accounts. Rather use different passwords for each of your accounts and use utility software to assist you in tracking your passwords. Passwords should also be at least 8 characters long and consist of a mixture of uppercase and lowercase letters, as well as some numeric characters as well.

Many people have use public mail providers such as Yahoo and Gmail. Your alternate email address is a potential target for a spoofing spammer. Check this account on a regular bases to ensure that your still have access to this account.

When you sign up for an email account it is natural procedure to enter personal information into the forms which as part of the registration process. Check for any changes in any of this information. Unauthorized changes could be an indication that your email account has been hijacked.

Make it a daily routine to run a full system scan for malware on your computer. Unfortunately the virus is often undetected when still unopened in your inbox. However it can be detected once it exposes itself and wants to use your email account as a spoof transmitter.

Make a point of always doing the above procedures without fail. This will make it a bit more difficult for a spoofing spammer to hack into your email account. Do not open any links which you do not know.

Similar Articles:
Remote Computer Repair – The Best Way to Resolve Your Computer IssuesPC Security – What’s the Biggest Threat to Your Computer?
Comments
Comments
Tell us your opinion.
Your E-mail
Your Name
Website
1+1 =
Comments: