7 tricks to avoid SPOOFING

Lovers of other people's things have found the perfect niche on the Internet for their particular atrocities and thefts; they are always up to date when it comes to online attack technology. One of the most popular lately is the spoofing. But do we know what this technique consists of? We tell you in technology.net.

Spoofing could be translated as... impersonating another person. In computer security terms, it refers to the use of identity theft or phishing techniques. So, as you may have imagined, they are usually malicious uses or scams related to people who pretend to be someone else for a multitude of reasons, from stealing your data, money or extorting money from you.

Depending on the technology used, there are different types of spoofing. Among them are IP spoofing, ARP spoofing, DNS spoofing, Web spoofing or e-mail spoofing.

Watch the sites you visit

Avoid visiting sites by clicking on addresses or links that you receive by email or that are sent to you through WhatsApp groups, they can sneak you a fake website from any site.

Look at the url in your browser bar

Lend special pay attention to the urls that appear in browsers to make sure the site address is correct. It is a simple action and does not take us much time.

Padlock on the web

We will verify that the url we are entering begins with https and has a green padlock. This way we know that it is verified by the server with an SSL certificate.

Dubious appearance

Observe the appearance of websites and emails that they send us, perhaps an image without the correct resolution or spelling mistakes. Although it must be said, these identity thieves are increasingly replicating the pages they copy.

Confidential information

Distrust any entity or person that asks for your passwords or passwords or any other information that may be considered confidential or with which you can be extorted.

Do not download files

Do not download files of dubious origin or from people you do not know, malware or viruses that control your computer can take away all your passwords.

Adds a Sender Policy Framework (SPF) record

If you own a domain, to protect yourself from spammers, add a registration framework. sender policies (SPF) to the host of your domain. This way, the recipients of your messages will be able to know which servers have permission to send emails from your domain and that those emails are not forged.