A SearchSecurity.com reader recently asked our threats expert Nick Lewis: Can you describe what a "spoofing attack" is, and if there is any way organizations can protect themselves from this new threat?If an attacker is able to send spoofed IP packets, they could attempt a denial-of-service or attack external hosts to make the attack look like it is coming from a different network.
,
