Questions tagged [spoofing]
A kind of attack in which one system, program, or user successfully masquerades as another.
300 questions
0
votes
0
answers
18
views
Spoofing text messages [duplicate]
Is it possible for someone to send text messages to my husband using the number of someone in his contacts?
1
vote
0
answers
218
views
Can RCS messages have a spoofed sender ID?
Our company relies on sending out SMSes to our customers from our own short code phone number. There are 3 telecom operators in our local market and we have agreements/integrations with all of them to ...
1
vote
0
answers
64
views
Can Someone configure their calls to look like they originate from my area? [closed]
I received calls from a 'friend' - sometimes on his UK number - other times on a restricted number. When I look at my bill - those restricted numbers show up as originating from my area. This even ...
2
votes
2
answers
230
views
GPG Impersonation
I was watching Sun Knudsen's videos and in one of them, he talks about GPG. Specifically, he said that he has 3 locations where he provides fingerprints of his signatures. YouTube, Github and his ...
2
votes
1
answer
794
views
How to spoof browser fingerprint without it being obvious?
Is there a way to spoof browser fingerprint without websites being able to tell you have done it? This includes spoofing most or all types of known browser/device fingerprints such as canvas, ...
1
vote
2
answers
953
views
Bank scammer and banking app
There are plenty of scammers trying to get access to my bank account. Usually they call me claiming they are from my bank’s fraud department, and try to convince my that there is a problem with my ...
0
votes
0
answers
155
views
How to avoid non-in-person "handshakes" and spoofing due to compromised URL data on NFC card
I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website.
The System
For the sake of explanation, assume the website is hosted at domain ...
0
votes
0
answers
173
views
Detecting SMS spoofing when there is multiple routing
How can SMS spoofing be detected? I know we can find it by message centre, but what if in the case of multiple routing?
1
vote
2
answers
284
views
Isolating encrypted and unecnrypted Windows installations and protecting the boot loader
I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don't want them to be able to access my ...
4
votes
1
answer
2k
views
Modern VPNs and average MITM attacks
I am trying to untangle a number of concepts (all of which i am unfamiliar with) in this question, but they all point to a seemingly basic question;
With modern tunneling protocols, SSL ciphers and ...
1
vote
1
answer
1k
views
How to prevent hackers from using my phone number to make accounts?
It seems a hacker is using my phone number to make fraudulent account, and I would like to prevent that.
Usually, if a person has your phone number, they're not able to make an account because a ...
0
votes
1
answer
2k
views
Would a spoofed SMS message show up in the same chat history as a legitimate SMS?
I received an odd SMS message from xfinity earlier. The message looks real, and the link they provided is real, but they said I ordered a movie through their service, which I did not. I am wondering ...
0
votes
1
answer
6k
views
SMS spoofing in the US
Long story short(ish), I have a friend who's been in a relationship with this girl for a while. When they started she had just moved across country and was in something open with some other dude. She ...
1
vote
1
answer
522
views
Windows 10 Update - Man In The Middle Attack - Tamper Update [duplicate]
I am connecting to a wi-fi network and blocked all IP addresses in this network with a regular Windows 10 firewall. The only available IP addresses are:
192.168.1.1 = gateway
192.168.1.102 = my own ...
1
vote
2
answers
599
views
How to block personal devices on corporate network
Currently we are working to secure our internal LAN and due to this we are planning to stop mobile devices (such as personal laptops and mobile phones) to connect on corporate network. Our key area of ...