Description
Spoofer programs substitute the address of the party sending a message or network requests.
These programs may be used for a range of purposes (for example, to prevent the recipient from identifying the sender or to transmit a message sent by another party).
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!