Chart showing how an attack works (IMAGE)
Caption
Example of a spoofed email attack exploiting open forwarding and relaxed validation policies for forwarded email from well-known providers.
Credit
University of California San Diego
Usage Restrictions
No restrictions.
License
Public Domain