WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • China-based IMDDOS botnet offers DDoS services for hire

    Researchers at Damballa Inc. have discovered one of the largest active global botnets, which can rented out to flood domains with unwanted traffic. 

  • Adobe Flash alternatives: The best way to avoid Adobe Flash malware?

    It's no secret that Adobe Flash is plagued with malware, so, do enterprises really need it? In this expert response, Nick Lewis discusses how you can weigh the importance of functionality and security when it comes to Flash. 

  • bot worm

    A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that ... 

  • Botnets can yield clues for security teams

    Botnets are difficult to bring down, but as malware expert Joe Stewart of SecureWorks explains, researchers can get useful data by tapping into botnet command-and-control servers. 

  • Researchers, ISPs fail to contain notorious Pushdo botnet

    Despite an effort by ISPs and security research teams to cripple the botnet, follow-up analysis finds it recovering its strength with new command and control servers. 

  • What does the Stuxnet worm mean for SCADA systems security?

    SCADA systems have been highlighted in recent months for their insecurities, perhaps most notably with the release of the Stuxnet worm targeting them directly. But is the Stuxnet worm unique, or simply a sign of SCADA insecurity? Learn more in this e... 

  • Kaspersky researcher sees tough road ahead for antivirus detection

    Security researchers who develop signatures to detect malware and other insidious software are finding themselves increasingly under attack, according to Vitaly Kamluk, Kaspersky Lab's chief security expert based in Japan. Kaspersky is currently in a... 

  • Fake antivirus pop-up scams: Forming a security awareness training plan

    Rogue antimalware programs have been around for a while, and, according to a recent Google report, are more prominent and more difficult to detect than ever before. In this expert tip, Michael Cobb explains how to train employees to deal with these f... 

  • Slovenian man charged with creating Mariposa botnet

    Suspect allegedly developed and sold the malware behind massive botnet that was used to steal bank account information. 

  • Black Hat: Targeted network security attacks beating forensics efforts

    Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings.