answersLogoWhite

0

AllQ&AStudy Guides
Best answer

Its an email virus... Many e-mail viruses now use random e-mail addresses from an infected computer's address book in the FROM and TO fields of messages the virus sends. Most likely the virus on someone else's computer has found your e-mail address in an address book and used it in the FROM field as the virus replicates itself via e-mail. The messages look like they came from you, but they did not. This is called e-mail spoofing.

This answer is:
Related answers

Its an email virus... Many e-mail viruses now use random e-mail addresses from an infected computer's address book in the FROM and TO fields of messages the virus sends. Most likely the virus on someone else's computer has found your e-mail address in an address book and used it in the FROM field as the virus replicates itself via e-mail. The messages look like they came from you, but they did not. This is called e-mail spoofing.

View page

This is a typical case of e-mail address spoofing. There is nothing you can do about it, some spammer forged the header and made it look as if you sent the e-mail. The spammer don't even need access to your e-mail account, spoofs like these are mostly done outside the e-mail system of the spoofed victim.

If your e-mail address is spoofed a lot, you will receive a lot of bounce backs to e-mails that you did not send.

View page

Unfortunately, yes. It is possible for an email to be sent from an address without actual access to the mailbox associated with it. This is known as "email address spoofing".

There is a verification system known as Sender Policy Framework, or SPF, to avoid this spoofing practice. It must be implemented on the mail servers directly, so unless one is actually running a mail server there isn't much one can do to enable it. Most mail servers do support SPF already, however, greatly reducing the risk of spoofing.

View page

iv'e checked. it is just spoofing. i don't think there is a word for your 'spoofing'!! XD

View page

yea its same

View page
Featured study guide

Why is phishing still widespread

How do threat actors deploy phishing attacks

Why do victims repeatedly fall prey to phishing

How to stay safe from such attacks

➡️
See all cards
5.0
1 Review
More study guides
4.88
8 Reviews

3.0
3 Reviews
Search results