• The creation and use of a false email return address, IP address, or the like. Used, for instance, by spammers which wish to hide their identity, elicit confidence, or otherwise deceive a recipient. Spoofing may also be used by individuals, programs, or entities wishing to extract confidential information from unwary users.

Not what you were looking for?