Explaining automated IPv6 attacks and how to stop them

Network Protocols and Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Why does Skype connect to so many servers?

    Skype is a peer-to-peer service that uses a distributed network of "supernodes" to facilitate communication throughout the world. But is it safe to have so many "volunteer" connections? Mike Chapple explains. 

  • What is the relationship between open port range and overall risk?

    Exposing a large number of well-known ports could be a substantial risk, depending upon their nature. In this expert Q&A, Mike Chapple explains why it may be best to narrow down a port range. 

  • Will iptables screen UDP traffic?

    UDP is a connectionless protocol that can't be screened using strict stateful inspection. However, most modern firewalls, including iptables, treat UDP in the same manner as a connection-oriented protocol. Mike Chapple explains the process in this Se... 

  • Will deploying VoIP on an 802.1x network create security problems?

    Voice over IP telephony is beginning to replace traditional PBX in the enterprise. In this expert Q&A, Mike Chapple explains how the popular VoIP technology has its own unique security implications. 

  • Is a transition from IPv4 to IPv6 worth the effort?

    Very few organizations are currently runing IPv6. Should you follow their lead? Network security expert Mike Chapple explains whether the transition from IPv4 to IPv6 is worth the effort. 

  • Can Skype phones threaten an enterprise network?

    There are certainly some security concerns when it comes to Skype technology, but are the phones a serious threat to your enterprise network? In this expert Q&A, Mike Chapple explains what the risks really are. 

  • Can a TCP connection be made without an open port?

    A company may claim it has an "application" that allows computers to communicate without opening any ports, but network security expert Mike Chapple reveals whether you should believe the hype or not. Read more in this SearchSecurity.com Q&A. 

  • How do we create a restrictive ruleset to manage our TCP ports?

    Learn how implementing stateful inspection firewalls can help network administrators keep tabs on TCP connections in this network security Ask the Expert Q&A. 

  • How to prevent VoIP phishing

    Don't fall prey to a VoIP phishing scam. In this Information Security Threats Ask the Expert Q&A, Ed Skoudis explains why end-to-end encrypted VoIP phones cannot prevent VoIP scams and how to protect against them. 

  • How can you test whether a network would suffer from VoIP?

    How would VoIP behave for a customer who receives a fax, given that you can't predict how the Internet is being used at any given time, by how many people or how it's impacting the call you're on?