Geek-Guy.com

Category: Authentication, Internet Security, Vulnerabilities

Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers

There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say Belgian researchers, who warn that, unless action is taken by CISOs and network product manufacturers, those hosts can be abused as one-way proxies, enabling an adversary to spoof the source address of packets to permit access to an organization’s…

WordPress Appliance - Powered by TurnKey Linux