Explaining automated IPv6 attacks and how to stop them

Network Protocols and Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • digest authentication

    Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller... (Continued) 

  • Is a transition from IPv4 to IPv6 worth the effort?

    Very few organizations are currently runing IPv6. Should you follow their lead? Network security expert Mike Chapple explains whether the transition from IPv4 to IPv6 is worth the effort. 

  • Can Skype phones threaten an enterprise network?

    There are certainly some security concerns when it comes to Skype technology, but are the phones a serious threat to your enterprise network? In this expert Q&A, Mike Chapple explains what the risks really are. 

  • Secure Sockets Layer (SSL)

    SSL (Secure Sockets Layer) is a commonly-used protocol for managing the security of a message transmission on the Internet; it uses a program layer located between the Internet's HTTP and TCP program layers. 

  • Database security undermined by protocol loopholes, lax defenses

    A database security vendor says database client-server protocols are being targeted by attackers. An analyst says enterprises are adding defenses. 

  • 'Worm' targets Sun Solaris Telnet flaw

    Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet. 

  • Can a TCP connection be made without an open port?

    A company may claim it has an "application" that allows computers to communicate without opening any ports, but network security expert Mike Chapple reveals whether you should believe the hype or not. Read more in this SearchSecurity.com Q&A. 

  • Better VoIP training needed, SANS director says

    As director of training and certification for the Bethesda, Md.-based SANS Institute, Stephen Northcutt is always looking for better ways to prepare IT professionals for the threats of cyberspace. This year's SANS Top 20 Attack Targets list has given... 

  • Is the SANS Top 20 still useful?

    This week in Security Blog Log: Some experts ponder whether the SANS Institute's Top 20 vulnerability list is as valuable than it once was. Others weigh in on the VoIP threat. 

  • SANS: VoIP, zero-day threats surge

    Digital miscreants are using VoIP and a growing pile of zero-day flaws to launch a ferocious wave of targeted, financially-motivated attacks, according to the SANS Institute.