Security Expert Finds Port Scans Not Tied To Hack Attacks
Nearly three-quarters of the attacks prefaced by some kind of scan came after both a port and a vulnerability scan were run against the exposed PCs, noted Cukier's report.
"The identification of port scans and vulnerability scans launched from a single source IP address is a good indicator that an attack will follow from the same IP address," said the report.
The link for this article located at Security Pipeline is no longer available.