Explaining automated IPv6 attacks and how to stop them

Network Protocols and Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Comparing FTP vs. TFTP

    There are some differences between FTP and TFTP, but here's the catch: both are inherently insecure protocols. 

  • What OSI Layer 4 protocol does FTP use to guarantee data delivery?

    What OSI Layer 4 protocol does FTP use to guarantee data delivery? 

  • Can DNS be used to support encryption?

    Expert Michael Cobb says it's more likely that encryption will be used to support DNS than the other way around. 

  • Are open recursive DNS servers inherently insecure?

    Recursion was meant to make the Internet run better, but expert Michael Cobb explains why the willingness of malicious users to abuse open recursive DNS servers has made it part of numerous ongoing threats. 

  • Will VoIP attacks result in more than just spam?

    Today's enterprises are seeing VoIP installations of every scale. Mike Chapple explains why that means attacks with results far more serious than unwanted messages. 

  • Should organizations lag behind on IPv6 adoption?

    In this expert Q&A, network security pro Mike Chapple explains why a delay on IPv6 adoption is nothing to worry about. 

  • How to protect DNS servers

    The DNS database is the world's largest distributed database, but unfortunately, DNS was not designed with security in mind. Application security expert Michael Cobb explains how to keep a DNS server from being hijacked. 

  • Has FFIEC made any VoIP-specific mandates?

    Mike Rothman discusses the FFIEC risk management program and explains what FFIEC considerations should be made when using VoIP. 

  • What to consider before opening a port

    Recently, a reader asked network expert Mike Chapple, "What would be the security implications of opening six ports through a firewall?" Chapple reviews what questions need to be addressed before an organization exposes any network ports. 

  • Does Teredo present security risks to the enterprise?

    Teredo allows internal networks to transition to IPv6, interconnecting them through their NAT devices and across the IPv4 Internet. Ed Skoudis explains why this function isn't as innocent as it seems.