Spoofing:
The invader creates a misleading context which false you in making an unsuitable securityappropriate decision. For example false ATM machines have been set up. If they will be having PIN number they will be having enough information to steal from the account.