Spoofing

Spoofing attacks impersonate trusted identities — email addresses, phone numbers, websites, IP addresses, GPS signals — to deceive victims into trusting malicious traffic. Coverage of email spoofing and DMARC, caller ID spoofing, website and DNS spoofing, and the authentication and verification controls that disrupt impersonation-based attacks.