E-mail identity spoofing is performed by the malicious user simply entering someone/anyone else's e-mail address...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
into his own e-mail client. Any e-mail he sends out will look as if they came from the victim. Unfortunately, there's not a great way to prevent this from happening, since the misbehavior takes place on the bad guys' systems. For those who get messages bounced back, they can check the e-mail headers to see where the e-mail originated, but that's likely to be spoofed as well.
Dig Deeper on Network intrusion detection and prevention and malware removal
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.