WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Antimalware technologies and techniques to the rescue

    Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love to break into top-level enterprise systems, but now they're also aiming low, taking advantage of the... 

  • Cyberthreats: Know thy enemy

    The complexity of emerging technologies and trends such as BYOD has security teams operating at full speed, and there's no sign of slowing down. In our inaugural issue of 2014, we look at the top cyberthreats that security professionals are likely to... 

  • Help! Evaluating AV solutions and tech support

    We tested AV solutions from 5 vendors and their tech support. Find out who answered the call. Also in this issue, read features on spyware threats, prosecuting hackers and self-defending networks. 

  • Weight lifter: Appliances that lighten your security load

    "All-in-one" security appliances offering similar features can be surprisingly different under the hood. To better understand the capabilities of these security gateways, Information Security compared six appliances designed for midsized compa... 

  • Comeback kid: Sanjay Kumar on Computer Associates' security strategy

    After a tumultuous several years, Sanjay Kumar believes Computer Associates' security strategy will be what leads the company back to the top. Also in this issue: Ed Skoudis examines the proliferation of combo malware and why the worst may be yet to ...