WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Robert Morris worm

    The Robert Morris worm is widely acknowledged as the first computer worm to be distributed across the Internet and the first computer virus to receive mainstream media attention. 

  • zero-day vulnerability

    A zero-day vulnerability is a flaw in software, hardware or firmware that is exploited as soon as or before it becomes generally known to the public. 

  • Kaptoxa

    Kaptoxa (pronounced kar-toe-sha) is a type of point-of-sale (POS) malware designed to compromise payment information systems. 

  • micro VM (micro virtual machine)

    A micro VM (micro virtual machine) is a virtual machine program that serves to isolate an untrusted computing operation from a computer's host operating system. 

  • rainbow table

    A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. 

  • Conduit browser hijacker

    Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download. The malware, which is frequently bundled with freeware and shareware, presents as a browser toolbar and search engine. Once installed, C... 

  • madware

    Madware is a type of aggressive advertising that affects smartphones and tablets. The name, which is a portmanteau combining the words mobile and adware, was coined by the security vendor Symantec to describe a type of intrusive advertising that curr... 

  • antimalware (anti-malware)

    Antimalware (anti-malware) is a type of software program designed to prevent, detect and remediate malware infections on individual computing devices and IT systems. The terms antivirus software and antimalware software are often used as synonyms. 

  • Bitcoin mining

    Bitcoin mining is the processing of transactions in the digital currency system, in which the records of current Bitcoin transactions, known as a blocks, are added to the record of past transactions, known as the block chain. A Bitcoin is defined by ... 

  • Hand of Thief

    Hand of Thief is banking crimeware that targets Linux operating systems. The Hand of Thief uses a form grabber to steal IDs, passwords and other information pertaining to Internet banking.