[WEBINAR] Better to Ask Permission? Best Practices for Privacy and Security

Email Spoofing

Definition - What does Email Spoofing mean?

Email spoofing is a fraudulent email activity hiding email origins. The act of e-mail spoofing occurs when imposters are able to deliver emails by altering emails' sender information. Although this is usually done by spammers and through phishing emails for advertising purposes, email spoofing can have malicious motives such as virus spreading or attempts to gain personal banking information. Simple Mail Transfer Protocol (SMTP) does not provide any type of authentication process for persons sending emails. Yet, it is the primary email system for most people, facilitating email spoofing. Now a days, most email servers can provide further security. Also many digital software vendors have created products remedying this problem.

Techopedia explains Email Spoofing

There are very few legitimate reasons for email spoofing to exist. Whistle blowing, or reporting an immoral or illegal activity, may prompt an individual to engage in email spoofing and remain anonymous. However, the primary reasons for email spoofing involve advertising, but are just considered nuisances. Unfortunately, misleading or corrupt emails are more common than legitimately spoofed emails.

Spammers use open relay as a method for sending email spoofs. An incorrectly configured SMTP server, known as open relay, is vulnerable to the use of spammers since it is easy to manipulate to and from areas of the emails. This lends itself well to those who send spam and phishing emails.

Some U.S. states are beginning to enact laws against email spoofing where the use of third-party emails is a crime. Another legislative safeguard against email spoofing is the CAN SPAM Act, which prohibits unsolicited emails containing false headers or disguised impertinent subject lines. Yet the irony of this law is evident when one considers that the act of spoofing deliberately disguises the real sender’s identity. This can cause problems when trying to identify and stop those responsible for the email spoofing. Even so, the Federal Trade Commission encourages reporting instances of email spoofing.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.