Skip to main content

Questions tagged [spoofing]

A kind of attack in which one system, program, or user successfully masquerades as another.

0 votes
0 answers
18 views

Is it possible for someone to send text messages to my husband using the number of someone in his contacts?
Kendall Fulton's user avatar
1 vote
0 answers
218 views

Our company relies on sending out SMSes to our customers from our own short code phone number. There are 3 telecom operators in our local market and we have agreements/integrations with all of them to ...
Vilx-'s user avatar
  • 1,122
1 vote
0 answers
64 views

I received calls from a 'friend' - sometimes on his UK number - other times on a restricted number. When I look at my bill - those restricted numbers show up as originating from my area. This even ...
user avatar
2 votes
2 answers
230 views

I was watching Sun Knudsen's videos and in one of them, he talks about GPG. Specifically, he said that he has 3 locations where he provides fingerprints of his signatures. YouTube, Github and his ...
Xoteric's user avatar
  • 95
2 votes
1 answer
794 views

Is there a way to spoof browser fingerprint without websites being able to tell you have done it? This includes spoofing most or all types of known browser/device fingerprints such as canvas, ...
UNRESTR1CTED's user avatar
1 vote
2 answers
953 views

There are plenty of scammers trying to get access to my bank account. Usually they call me claiming they are from my bank’s fraud department, and try to convince my that there is a problem with my ...
gnasher729's user avatar
  • 3,544
0 votes
0 answers
155 views

I am designing a system that allows users to purchase my NFC cards and sign up for an account on my online SaaS website. The System For the sake of explanation, assume the website is hosted at domain ...
user512716's user avatar
0 votes
0 answers
173 views

How can SMS spoofing be detected? I know we can find it by message centre, but what if in the case of multiple routing?
Gayatri Kandula's user avatar
1 vote
2 answers
284 views

I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don't want them to be able to access my ...
Vlad's user avatar
  • 111
4 votes
1 answer
2k views

I am trying to untangle a number of concepts (all of which i am unfamiliar with) in this question, but they all point to a seemingly basic question; With modern tunneling protocols, SSL ciphers and ...
myol's user avatar
  • 185
1 vote
1 answer
1k views

It seems a hacker is using my phone number to make fraudulent account, and I would like to prevent that. Usually, if a person has your phone number, they're not able to make an account because a ...
user3041883's user avatar
0 votes
1 answer
2k views

I received an odd SMS message from xfinity earlier. The message looks real, and the link they provided is real, but they said I ordered a movie through their service, which I did not. I am wondering ...
Zaku's user avatar
  • 101
0 votes
1 answer
6k views

Long story short(ish), I have a friend who's been in a relationship with this girl for a while. When they started she had just moved across country and was in something open with some other dude. She ...
Arkyris's user avatar
1 vote
1 answer
522 views

I am connecting to a wi-fi network and blocked all IP addresses in this network with a regular Windows 10 firewall. The only available IP addresses are: 192.168.1.1 = gateway 192.168.1.102 = my own ...
Minerva Developer's user avatar
1 vote
2 answers
599 views

Currently we are working to secure our internal LAN and due to this we are planning to stop mobile devices (such as personal laptops and mobile phones) to connect on corporate network. Our key area of ...
ZAHID HASEEB's user avatar

15 30 50 per page
1
2 3 4 5
20