spoofing attack


Also found in: Wikipedia.

spoofing attack

The practice of stealing, or attempting to steal, personal information over the phone or on the internet by pretending to be someone or something that legitimately requires such details. We've gotten reports of an increasing number of spoofing attacks being made against our customers recently. Remember, we will never ask you for your password under any circumstances, whether on the phone or by email. The use of the so-called dark web makes the culprits behind these spoofing attacks nearly impossible to catch.
See also: attack, spoof
References in periodicals archive ?
A spoofing attack occurs when a person with no authority tries to masquerade an authorized person by falsifying the data captured by acquisition sensors [5].
Last week, in a similar case, a federal appeals court in New York ruled that a commercial crime insurance policy covered wire transfer losses resulting from an email spoofing attack. The ruling ((https://www.insurancejournal.com/app/uploads/2018/07/Medidata-v-Federal-Insurance.pdf) Medidata Solutions Inc.
Next, by combining multiscale, local, phase quantization representation, the robustness of the spoofing attack detector can be further improved.
Resistance of Various Attacks: We will show that the protocol can withstand insider attack, off-line password guessing attack, user impersonation attack, server spoofing attack, modification attack, stolen card attack, and man-in-the-middle attack.
To prevent against the spoofing attack, authentication provides users with the ability to verify the identity of transmitters.
The objective of the proposed authentication is to determine if a spoofing attack is occurred in either the wireless part or the wired part.
Unfortunately, in 2013, Kumari and Khan [13] pointed out that Chen et al.'s scheme cannot withstand user impersonation attack, server spoofing attack, and offline password guessing attack.
An ARP spoofing attack is an attack in which the media access control (MAC) address of a computer is masqueraded as that of another.
"People could monitor data to determine its format and then mount a spoofing attack," explained John Schwartz, technology strategist at Digi International.
If a service request lacks the security header--for example, a spoofing attack with an authentic login but no accompanying header--it will be denied.
Unlike a spoofing attack, both the user and the GPS receiver understand that satellite signals from space are not being received.
In a closely-watched case on insurance coverage in an age of expanding cyber risk, a federal appeals court in New York has upheld a lower court ruling that a commercial crime insurance policy covers wire transfer losses resulting from a spoofing attack.
However, this is an assumption which is not validated or enforced at all; therefore, there is the opportunity to perpetrate an IP source address spoofing attack (which consists in creating an IP packet with a false source IP address, hiding the identity of the real sender, or even impersonating another Internet entity).
Hsiang and Shih [17] found that Liao-Wang's protocol is vulnerable to insider's attack, masquerade attack, server spoofing attack, registration center spoofing attack.
Moreover, our proposal can avoid the server spoofing attack since the verification process relies on the server's private key.