WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Antimalware technologies and techniques to the rescue

    Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love to break into top-level enterprise systems, but now they're also aiming low, taking advantage of the... 

  • Cyberthreats: Know thy enemy

    The complexity of emerging technologies and trends such as BYOD has security teams operating at full speed, and there's no sign of slowing down. In our inaugural issue of 2014, we look at the top cyberthreats that security professionals are likely to... 

  • Help! Evaluating AV solutions and tech support

    We tested AV solutions from 5 vendors and their tech support. Find out who answered the call. Also in this issue, read features on spyware threats, prosecuting hackers and self-defending networks. 

  • Weight lifter: Appliances that lighten your security load

    "All-in-one" security appliances offering similar features can be surprisingly different under the hood. To better understand the capabilities of these security gateways, Information Security compared six appliances designed for midsized compa... 

  • Comeback kid: Sanjay Kumar on Computer Associates' security strategy

    After a tumultuous several years, Sanjay Kumar believes Computer Associates' security strategy will be what leads the company back to the top. Also in this issue: Ed Skoudis examines the proliferation of combo malware and why the worst may be yet to ... 

  • Robert Morris worm

    The Robert Morris worm is widely acknowledged as the first computer worm to be distributed across the Internet and the first computer virus to receive mainstream media attention. 

  • zero-day vulnerability

    A zero-day vulnerability is a flaw in software, hardware or firmware that is exploited as soon as or before it becomes generally known to the public. 

  • Kaptoxa

    Kaptoxa (pronounced kar-toe-sha) is a type of point-of-sale (POS) malware designed to compromise payment information systems. 

  • micro VM (micro virtual machine)

    A micro VM (micro virtual machine) is a virtual machine program that serves to isolate an untrusted computing operation from a computer's host operating system. 

  • rainbow table

    A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. 

  • Conduit browser hijacker

    Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download. The malware, which is frequently bundled with freeware and shareware, presents as a browser toolbar and search engine. Once installed, C... 

  • madware

    Madware is a type of aggressive advertising that affects smartphones and tablets. The name, which is a portmanteau combining the words mobile and adware, was coined by the security vendor Symantec to describe a type of intrusive advertising that curr... 

  • antimalware (anti-malware)

    Antimalware (anti-malware) is a type of software program designed to prevent, detect and remediate malware infections on individual computing devices and IT systems. The terms antivirus software and antimalware software are often used as synonyms. 

  • Bitcoin mining

    Bitcoin mining is the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as a blocks, are added to the record of past transactions, known as the block chain. A Bitcoin is defined by ... 

  • Hand of Thief

    Hand of Thief is banking crimeware that targets Linux operating systems. The Hand of Thief uses a form grabber to steal IDs, passwords and other information pertaining to Internet banking. 

  • See more Definitions on Malware, Viruses, Trojans and Spyware
About Malware, Viruses, Trojans and Spyware

Get tips and tricks on how to remove and detect malware, viruses, worms, Trojan, rootkits, spyware and adware. Experts also offer advice detection and prevention software, including antivirus and antispam.