Imagine what happens if there is a vulnerability in once such security unit meant to protect your internet.

In some deployment configurations* an attacker could tamper with traffic, inserting backdoors or worse.

The devices are supposed to passively monitor connection traffic from HTTP, FTP, SMTP connections.

A single email can give hackers access to the entire network

In instances where theres a file transfer, the security appliance will scan it for malware.

The researchers used theJODEJava decompiler to reverse engineer Java Archive files used by the FireEye devices.

In addition, we will be releasing a fix to support our out-of-contract customers.

spot_img

source: www.techworm.net