WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • form grabber

    A form grabber is a type of malware that captures data such as IDs and passwords from browser forms. The target of a form grabber is the user’s Internet banking information. Form grabbers typically gain access through a Trojan horse. 

  • Shamoon

    Shamoon, also called W32.Disttrack, is a computer virus that has been used for cyber espionage, particularly in the energy sector. 

  • attack vector

    An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. 

  • adware

    Generically, adware (spelled all lower case) is any software application in which advertising banners are displayed while the program is running. 

  • Zeus Trojan (Zbot)

    Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse. A Trojan Horse is programming that appears to be legitimate but actually hides an attack. 

  • memory-scraping malware

    Memory-scraping malware is a type of malware that helps hackers to find personal data. It examines memory to search for sensitive data that is not available through other processes. 

  • botnet (zombie army)

    A zombie army (also known as a botnet) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers on the Internet... (Continued) 

  • Tilded platform

    The Tilded platform is a malicious software communicator specifically designed as a vessel for transmitting malware undetected. 

  • Duqu (W32.Duqu)

    Duqu is a remote access Trojan (RAT) that is designed to steal data from computers it infects. 

  • TDL-4 (TDSS or Alureon)

    TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.  The program is the fourth generation of the TDL malware, which was itself based on an earlier malicious program known as TDSS or Alureon.