About 330,000 results
Open links in new tab
  1. Spoofing and Phishing — FBI

    Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are …

  2. Spoofing: How It Works and How to Stay Safe in 2026

    Nov 21, 2025 · Spoofing is a trick scammers use to impersonate reputable businesses and government agencies to steal your data. These cybercriminals may even act as co-workers, …

  3. Spoofing attack - Wikipedia

    In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to …

  4. What is Spoofing & How to Prevent it - Kaspersky

    Spoofing is a broad term for the type of behavior that involves a cybercriminal masquerading as a trusted entity or device to get you to do something beneficial to the hacker — and detrimental …

  5. What is Spoofing - Bitdefender InfoZone

    Spoofing is a form of digital deception where someone pretends to be someone else and tricks you into giving access, sharing sensitive info, or doing something harmful. In cybersecurity, …

  6. Caller ID Spoofing - Federal Communications Commission

    Spoofing is often used as part of an attempt to trick someone into giving away valuable personal information so it can be used in fraudulent activity or sold illegally, but also can be used …

  7. Spoofing | Spoof Calls | What is a Spoofing Attack

    Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system, steal data, or spread malware.

  8. What is spoofing? 12 examples of different spoofing attacks

    Dec 30, 2024 · Spoofing is the act of falsifying information to impersonate a trusted source, often to steal data or money. Learn more about spoofing here.

  9. What is spoofing? - Cisco

    Spoofing is a type of cyber attack designed to trick the user or system into thinking the hacker is a legitimate source with a valid request.

  10. What is Spoofing In Cybersecurity? Types & Examples - SentinelOne

    Dec 1, 2025 · Know the basics of spoofing, how it works, and explore different real-world examples with us. We also show you how to defend against spoofing attacks.