Searching all of TechTarget| 3,181 results for "proxy"

SearchSecurity

By Nick Lewis Evaluate May 19, 2016

ProxyBack malware: How does it affect Internet proxies?

ProxyBack malware turns infected user systems into Internet proxies, which can obfuscate the attack source. Expert Nick Lewis explains how the malware works, and its purpose. Continue Reading

SearchCloudSecurity

By Dan Sullivan Get Started Jan 22, 2016

How can a reverse proxy mode improve cloud security?

Skyhigh Networks recently obtained a patent to use reverse proxies for cloud access security broker services. Expert Dan Sullivan explains how the method works. Continue Reading

SearchNetworking

By Andrew Froehlich Evaluate Nov 16, 2015

Blue Coat ProxySG: Secure Web gateway overview

With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading

ComputerWeekly

Mar 10, 2015

Software-defined storage: a proxy for storage transformation

Software-defined storage reflects important trends that affect storage, such as increasing separation between hardware and software Continue Reading

SearchSecurity

By Nick Lewis Evaluate Jun 01, 2015

How can phishing attacks that use proxy programs be stopped?

Phishing attacks are adopting new functionality to avoid detection, including the use of proxy programs to simplify the attack process. Learn how to defend against this type of risk. Continue Reading

SearchSecurity

By Nick Lewis Problem Solve Oct 22, 2014

Attack obfuscation: Detecting attacks that use Web proxies

While many Web proxies are legitimate, some attackers use them to hide their attacks. Expert Nick Lewis explains how block the malicious proxies. Continue Reading

SearchSecurity

By Nick Lewis Get Started Dec 06, 2013

Assessing the threat of proxy auto-config malware

Expert Nick Lewis explains how attackers are taking advantage of proxy auto-config capabilities in browsers and what mitigations can be put in place. Continue Reading

SearchSecurity

By Robert Richardson News Aug 09, 2016

Bluetooth LE security hit with GATTack at Black Hat

Amid varying attacks targeting IoT devices at Black Hat 2016, a new software proxy offered leverage against the latest Bluetooth LE security protections. Continue Reading

SearchSecurity

By Peter Loshin News Jul 18, 2016

Responsible disclosure of latest named vulnerability, 'httpoxy'

Responsible disclosure wins as researchers roll out branded website for 'httpoxy,' a set of vulnerabilities in server-side web apps that use the HTTP_PROXY variable. Continue Reading

SearchExchange

By Steve Goodman Get Started Oct 21, 2013

Configuring Web Application Proxy with AD to future-proof Exchange

To use Web Application Proxy for publishing Exchange to the Internet, admins can ease the process with simple AD and Exchange configurations. Continue Reading