January 12, 2016
Microsoft's January 2016 Patch Tuesday started the year with the IE end of life for older versions of the browser and an important address-spoofing patch.
November 11, 2015
Microsoft's November 2015 Patch Tuesday delivers 12 total bulletins, four of which are critical, and one issue with font handling that angers one expert.
May 22, 2015
News roundup: New research highlights the changing nature of DDoS attack frequency and methodology. Plus: New malware strains double in second half of 2014; two new address bar spoofing vulnerabilities.
March 10, 2015
Microsoft's March 2015 Patch Tuesday bulletins include a fix for the FREAK vulnerability, as well as five critical fixes, but surprisingly, an expert says one of the fixes deemed non-critical actually demands immediate attention.
Spoofing Get Started
Bring yourself up to speed with our introductory content
Security will be a hot topic this year. Here are some new security features for Hyper-V virtual machines to keep your environment safe. Continue Reading
Antispoofing is a technique for countering spoofing attacks on a computer network. Continue Reading
Distributed denial-of-service attacks continue to use spoofing. But there are means to stop the practice. Continue Reading
Evaluate Spoofing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A jump in multi-vector attacks highlights the threat of distributed reflection denial-of-service attacks. Enterprise threats expert Nick Lewis explains how these threats differ from traditional DoS attacks and offers prevention techniques. Continue Reading
Apple iOS 8 will add a MAC address spoofing feature to iPhones and iPads for wireless privacy. It could interfere with Wi-Fi location-based services used by many consumer-facing businesses. Continue Reading
Expert Michael Cobb discusses how developing a response plan in conjunction with service providers can help enterprises better thwart DoS attacks. Continue Reading
Learn to apply best practices and optimize your operations.
Despite a loud group claiming the burden of proof is harder to meet with digital evidence, an agent says FBI cyber investigations are not much different from traditional cases. Continue Reading
In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading
Email attacks are inevitable, so supporting incident response policies and procedures is necessary to ensure your enterprise is adequately prepared for an attack. Continue Reading
Problem Solve Spoofing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A proof of concept showed that hackers can use Unicode domains to make phishing sites look legitimate. Expert Matthew Pascucci explains how this spoofing attack works. Continue Reading
Researchers found that facial recognition systems can be bypassed with 3D models. Expert Nick Lewis explains how these spoofing attacks work and what can be done to prevent them. Continue Reading
Major email providers are adopting DMARC policies to reduce spam. Expert Michael Cobb explains how DMARC works and why it's is a good thing for email security. Continue Reading