Among observed financial domains, 62% were determined to be connected to phishing attacks that target legitimate institutions through spoofing websites.
There has been an increase in “selfie spoofing” scams, or scams in which a fraud actor takes a target’s selfie in order to authenticate a stolen identity and open fraudulent accounts.
The research from Florida State University and Rutgers University scientists aims to establish a new level of security for voice biometrics and claims that the tech is vulnerable to spoofing.
Spoofed websites are a common avenue for cyberattacks. To better understand the scope of this phenomenon, it’s important for security professionals and organizations to know just how widespread the problem is.
Abnormal Security researchers discovered attackers were impersonating the Texas Department of State Health Services to send fake Request for Quotations (RFQs) to vendors in a type of multi-layered email attack.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.