November 11, 2015
Microsoft's November 2015 Patch Tuesday delivers 12 total bulletins, four of which are critical, and one issue with font handling that angers one expert.
May 22, 2015
News roundup: New research highlights the changing nature of DDoS attack frequency and methodology. Plus: New malware strains double in second half of 2014; two new address bar spoofing vulnerabilities.
March 10, 2015
Microsoft's March 2015 Patch Tuesday bulletins include a fix for the FREAK vulnerability, as well as five critical fixes, but surprisingly, an expert says one of the fixes deemed non-critical actually demands immediate attention.
July 17, 2014
Apple iOS 8 will add a MAC address spoofing feature to iPhones and iPads for wireless privacy. It could interfere with Wi-Fi location-based services used by many consumer-facing businesses.
Spoofing Get Started
Bring yourself up to speed with our introductory content
Security will be a hot topic this year. Here are some new security features for Hyper-V virtual machines to keep your environment safe. Continue Reading
Distributed denial-of-service attacks continue to use spoofing. But there are means to stop the practice. Continue Reading
Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities. Continue Reading
Evaluate Spoofing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A jump in multi-vector attacks highlights the threat of distributed reflection denial-of-service attacks. Enterprise threats expert Nick Lewis explains how these threats differ from traditional DoS attacks and offers prevention techniques. Continue Reading
Exchange 2010 includes more built-in security tools than previous server versions. This tip examines some common vulnerabilities and which native tools protect against them. Continue Reading
Learn to apply best practices and optimize your operations.
Early in the software development cycle ask, Who might attack the application? How would they do it? What are they after? This is threat modeling. Continue Reading
Problem Solve Spoofing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn in this expert response what protocol spoofing is and how it can be used as a WAN optimization technique. Continue Reading
Expert Nick Lewis details how misconfigured DNS resolvers can be used for DDoS DNS attacks and how organizations can secure them. Continue Reading
Storage expert Jon Toigo explains why virtualization causes slow performance, and how methods for speeding it up don't address the real problem. Continue Reading