Faxploit: Exploiting Fax Machines to Enter an IT Network
In a ground breaking new discovery, Check Point researchers have shown how cyber criminals could infiltrate any home or organization’s entire IT network using nothing more than a mere fax number.
While fax machines may seem outdated, millions of companies and individuals worldwide still rely on it as a main method of communication to conduct their business.
In this webinar replay you will learn:
- How cyber criminals can infiltrate any IT network using merely a fax number.
- What the attack looks like via a live demonstration.
- How you can protect your home or corporate network from such an attack.
To learn more, please read our full investigation.
Watch Replay
*Notice: By clicking submit you agree that the information you provide will be processed in accordance with Check Point's privacy policy.