Spoofing Get Started
Bring yourself up to speed with our introductory content
Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities. Continue Reading
Learn in this expert response what protocol spoofing is and how it can be used as a WAN optimization technique. Continue Reading
Caller ID spoofing is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display... (Continued) Continue Reading
Evaluate Spoofing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Exchange 2010 includes more built-in security tools than previous server versions. This tip examines some common vulnerabilities and which native tools protect against them. Continue Reading
Learn to apply best practices and optimize your operations.
Early in the software development cycle ask, Who might attack the application? How would they do it? What are they after? This is threat modeling. Continue Reading
Problem Solve Spoofing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Nick Lewis details how misconfigured DNS resolvers can be used for DDoS DNS attacks and how organizations can secure them. Continue Reading
Storage expert Jon Toigo explains why virtualization causes slow performance, and how methods for speeding it up don't address the real problem. Continue Reading
Adding bandwidth to your network does not always fix slow applications problems. Consider these WAN optimization techniques first. Continue Reading