Question

In: Computer Science

Spoofing email is a common occurrence these days. Have you received a spoofed email? Briefly, describe...

Spoofing email is a common occurrence these days. Have you received a spoofed email? Briefly, describe the email and how did you notice it was not legit? Anything else that was odd concerning the spoofed email?

Solutions

Expert Solution

Email spoofing is the method of creating email messages that pranks or misleads the reader about the origin of the message. Its soul purpose is to frame the receiver into believing that the message is from a person they know. Since the emails do not have any authentication protocol so people use them for spamming and sending spoofing mails. Such mails are sent with an intention to trick the receiver into clicking on some link, downloading some script, or may ask him to enter his credentials or other sensitive information. These mails pose a threat not only for an individual but business organizations too. There is a lot at stake in the business world. A single click on any such mail can land the organizations into trouble.

These mails rely heavily on spelling mistakes and similarity in spellings in order to trick the reader, however they are sent from the genuine domains so that the inbuilt security protocols do not classify them under spam or block them.

Yes I happened to receive such an email once. It was the time when Big Billion Day Sale was live. The email contained a link, an order no, delivery date and the time and date of attempted delivery. It apolozised for the unsuccessful attempt of parcel delivery. Please login on the provided link to update your delivery timings. It was quite surprising for me initially because I wasn't expecting any parcel, then assuming a surprise gift from someone since my birthday was approaching i thought of clicking on that link. I had to go to market just then for some urgent work so I postponed it for later that night. But as usual I forgot to respond to that mail that night. I came across that mail after two three days and pondered deeply over that for a few minutes. Then I realized why did the delivery person not call me when he came to deliver the parcel. Every delivery person contacts on phone before delivering the parcel. That was when I came to know it was a trap. Had i not had some urgent work in the market I would have definitely fallen prey to it.

The cases of such spoofing mails have been on the rise. It pose a great threat for big organizations with large workforce and weak implementation of network protocols. All that a hacker wants is a single click on the link by the employee of the organization which is good enough to activate the malicious code hacker has developed and return sensitive data to hacker.  

Hope this helps :)


Related Solutions

Email from Suresh Batik I received the following email from a former student. I hope you...
Email from Suresh Batik I received the following email from a former student. I hope you are doing well. I took your Managerial Accounting class ten years ago and have a question on how to do costing in a service-based business. Currently, I am working for a firm that manufactures various products used in pipelines (torque wrenches, flange pullers, bolts and flanges, grinding machines, etc.). Five years ago we began servicing pipelines in refineries, offshore/onshore platforms, nuclear plants, etc. Our...
   Briefly describe how to present bad news positively in an email in a corpoate work...
   Briefly describe how to present bad news positively in an email in a corpoate work setting? Briefly describe the guidelines and considerations for apologies in a refused request for a work setting?
A few days ago, I received an email notification saying "New York Fed purchases $12.801 billion in Treasury coupons".
In this problem we will study the predictions of the Quantity Theory of money using some real world data for the U.S.Here is our data (these are the most recent observations I could find).Money Supply (M) = 5,395 (billions of $)Monetary Base (B) = 4,807 (billions of $)1. A few days ago, I received an email notification saying "New York Fed purchases $12.801 billion in Treasury coupons". For simplicity, we will use 12.8 (billions of $) in our computations.What is...
You have an email program to 1000000 customers where the cost is $.10 per email and...
You have an email program to 1000000 customers where the cost is $.10 per email and a direct mail program to 500000 customers at a cost of $1.00 per piece. Which program would you focus on why? What process must occur concurrently with understanding the data? A CEO wants to maximize revenue. Why would you advise him against the use of the data mining technique?
In real-world data, tuples with missing values for some attributes are a common occurrence. Describe various...
In real-world data, tuples with missing values for some attributes are a common occurrence. Describe various methods for handling this problem.
-Describe briefly the basic difference in service provided by an email server using POP3 protocol compared...
-Describe briefly the basic difference in service provided by an email server using POP3 protocol compared to an email server using IMAP protocol. Please don't copy and paste from the internet. Thank you
Eric received an email from Amazon Customer Service that said "Thank you for contacting us." But...
Eric received an email from Amazon Customer Service that said "Thank you for contacting us." But Eric did not contact them. Instead, an attacker had contacted them and pretended to be Eric. When Amazon Customer Service asked the attacker to identify himself all he had to do was give Eric’s name, email address, and mailing address—which the attacker got from Whois, which contains Eric’s registration information for his website. However, Eric knew to protect his actual mailing address so the...
What geological occurrence did the Permian-Triassic, Triassic-Jurassic and Cretaceous-Tertiary Extinctions have in common?
What geological occurrence did the Permian-Triassic, Triassic-Jurassic and Cretaceous-Tertiary Extinctions have in common?
A. Suppose you have three possible outcomes following the occurrence of an event. These are {no...
A. Suppose you have three possible outcomes following the occurrence of an event. These are {no harm, some harm, a lot of harm}. Are elements of this set of outcomes mutually exclusive? Statistically independent? Can they be both? Why or why not? B. Suppose you have three dimensions of harm of concern - confidentiality, integrity, and availability. Following the occurrence of an event, you may or may not suffer a breach of confidentiality, integrity or availability. Whether you suffer loss...
Briefly describe the common Manifestation of cell injury and cell death..
Briefly describe the common Manifestation of cell injury and cell death..
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT