Problem solve Get help with specific problems with your technologies, process and projects.

How e-mail identity spoofing works

Can you explain how e-mail identity spoofing works and how I can protect my systems from that happening?

E-mail identity spoofing is performed by the malicious user simply entering someone/anyone else's e-mail address into his own e-mail client. Any e-mail he sends out will look as if they came from the victim. Unfortunately, there's not a great way to prevent this from happening, since the misbehavior takes place on the bad guys' systems. For those who get messages bounced back, they can check the e-mail headers to see where the e-mail originated, but that's likely to be spoofed as well.

This was last published in September 2004

Dig Deeper on Network intrusion detection and prevention and malware removal

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.