WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • KHOBE attack technique fails to gain major security threat status

    Security experts say the potential of the attack shouldn't strike fear at enterprises. Enterprise CISOs should place their focus on other priorities. 

  • Tips on how to remove malware manually

    In this expert response, Nick Lewis explains how to remove malware manually, step by step. 

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub... 

  • Judge orders permanent shutdown of rogue ISP, forfeit $1 million to FTC

    3FN.net had its operations permanently halted this week. The rogue ISP was hosting botnet command and control servers, child pornography and malware. 

  • New tool enables botnet command and control via Twitter

    A new tool simplifies the process of using Twitter for command and control, but experts doubt its viability. Still, attackers are using social networks to send out orders to bots. 

  • Trojan poses as Windows 7 compatibility tool

    Email deceives users into opening a zipped file attachment by faking a Microsoft Upgrade Advisor. Instead, victims receive password stealing malware and other malicious files. 

  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)

    The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other methods of using the Internet to obtain sensitive pers... 

  • government Trojan

    A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation. Government Trojans represent a step in turning the tables on cybercriminals b... 

  • Latest Storm worm variant poses little security threat

    Latest variant emerges with a few tweaks and could be stealthier on corporate networks, but researchers studying its code base have found the same earlier flaws that weaken it. 

  • Detect rootkit alternate data streams (ADS) with StreamArmor

    In this month's screencast, Peter Giannoulis of TheAcademyPro.com explains how to use StreamArmor, a new tool that can detect alternate data streams that may be hiding rootkit data.