In email spoofing, for instance, a malicious actor sends an email that appears to come from a legitimate source, such as a colleague or a business partner. The email may contain a link to a phishing site or an attachment that installs malware. Phone spoofing involves masking the caller ID to make it look like the call is coming from a trusted number. GPS spoofing, on the other hand, involves manipulating the GPS system to provide false location data.