About 369,000 results
Open links in new tab
  1. Spoofing and Phishing — FBI

    Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are …

  2. Spoofing: How It Works and How to Stay Safe in 2026

    Nov 21, 2025 · Spoofing is when a scammer disguises themselves as someone you trust in order to steal your identity. For example, if you’re a Best Buy customer, you might receive fake …

  3. Spoofing attack - Wikipedia

    In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to …

  4. What is Spoofing & How to Prevent it - Kaspersky

    Spoofing is a broad term for the type of behavior that involves a cybercriminal masquerading as a trusted entity or device to get you to do something beneficial to the hacker — and detrimental …

  5. What is Spoofing - Bitdefender InfoZone

    Spoofing is a form of digital deception where someone pretends to be someone else and tricks you into giving access, sharing sensitive info, or doing something harmful.

  6. Spoofing | Spoof Calls | What is a Spoofing Attack

    Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system, steal data, or spread malware.

  7. What is Spoofing? Spoofing Attacks Defined | CrowdStrike

    Spoofing is when a cybercriminal disguises communication or activity from a malicious source and presents it as a familiar or trusted source.

  8. What is spoofing? 12 examples of different spoofing attacks

    Dec 30, 2024 · Spoofing is the act of falsifying information to impersonate a trusted source, often to steal data or money. Learn more about spoofing here.

  9. What is spoofing? - Cisco

    Spoofing is a type of cyber attack designed to trick the user or system into thinking the hacker is a legitimate source with a valid request.

  10. What is Spoofing In Cybersecurity? Types & Examples - SentinelOne

    Dec 1, 2025 · Know the basics of spoofing, how it works, and explore different real-world examples with us. We also show you how to defend against spoofing attacks.