• Homepage
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Galaxkey
  • Home
  • Products
    • Secure Email
    • Secure Workspace
    • Secure Sign
    • Secure Files & Rights Management
    • Secure Messaging – LockChat
    • Galaxkey Shield
  • Contact Us
  • Login
Search site...

Tag / spoofing

  • Computer hacker silhouette of hooded man

    LinkedIn becomes most mimicked brand in world

    US-based business and employment service company LinkedIn has taken the top spot as the brand most impersonated by threat operators in phishing attacks.

    28 April 2022
    Secure Communications
  • Email security key on computer keyboard

    Why do cybercriminals spoof emails?

    You receive an email from a colleague in your enterprise inbox, but something doesn’t click. They’re asking you for sensitive data they should have no

    6 February 2021
    Secure Communications
  • Email attacks and email encryption

    Safeguarding staff against email spoofing

    Email spoofing is just one of the techniques used by cybercriminals in their insidious campaigns. Hackers understand that while there are many new ways of…

    6 January 2021
    Secure Communications
  • Email security key on computer keyboard

    How to protect your firm from BEC attacks

    A Business Email Compromise (BEC) attack starts with a hacker using spoofed email accounts to effectively impersonate a firm’s CEO or managers. After penetrating email…

    26 December 2020
    Secure Communications
  • data protection and internet security concept, woman user typing password

    How to protect against website spoofing

    When cybercriminals create their own version of a trusted website – specifically designing it to fool visitors for phishing purposes – it is called “website…

    30 November 2020
    Secure Communications
  • Virus and malwares

    What is a network spoofer and how do I protect against it?

    In terms of IT security, a spoofer is an individual who assumes the identity of another person, program or computer to fool other people, devices,…

    18 October 2020
    Secure Communications
  • compromised data

    What are the dangers with my email being spoofed?

    When threat actors send out emails with a sender address that is not their own, it is called email spoofing. Email spoofing is used for…

    17 October 2020
    Secure Communications
  • Email security key on computer keyboard

    My email has been spoofed – what should I do?

    Spoofing emails is among the most prevalent forms of hacker activity involving email communications. Exposed email addresses can easily be acquired by cybercriminals, from

    17 October 2020
    Secure Communications
  • Many e-mail over the finger pressing the computer keyboard blurred background, business technology concept

    How to protect your business against email spoofing

    Email spoofing refers to fraudulent attempts by cybercriminals to impersonate an individual or enterprise by taking advantage of servers and mailing software to disguise

    15 October 2020
    Secure Communications
  • Virus and malwares

    How do I know if my email address has been spoofed?

    Email spoofing is a malicious tactic used by scammers and cyber criminals to forge the sender of an email. Whether to spread disruptive spam campaigns…

    13 October 2020
    Secure Communications
12
Next
  • The Technology
  • FAQs
  • Legal
  • News & Our Thoughts
  • About Us
  • Compliance
  • Case Studies
  • Privacy Policy

Galaxkey Leap Limited
1st Floor Annexe, New Barnes Mill,
Cotton Mill Lane, St Albans, AL1 2HA
+44 (0) 333 150 6660
sales@galaxkey.com

© Copyright 2025  Galaxkey. All Rights Reserved. Galaxkey® and LockChat® are registered trademark of Galaxkey Limited, UK