![]() ![]() All screen sharing applications have the ability to pass keyboard and mouse input, with a rigid permission structure in place that dictates who has the authority to send and receive remote control. The vulnerability allowed an attacker to access the permissions that govern who can control the sharing host. ![]() ![]() In early December of 2017, a vulnerability was found in the popular sharing application TeamViewer. A question we often receive from customers using Scrutinizer for monitoring network utilization and traffic is, “How can we identify screen sharing traffic on our network?” With vulnerabilities recently found in products like TeamViewer, it is more important than ever to gain visibility into the who, what, when, and where of screen sharing network traffic. This greatly simplifies telecommuting, support calls, or remote access to files. These tools allow users to remotely control another PC and receive image data that represents what the local user would see on their monitor. Screen sharing applications have changed the landscape of the modern office. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |