WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Does SMS spoofing require as much effort as email spoofing?

    SMS text message spoofing demands a little more technical knowledge than email spoofing. But not much, says information security threat expert Ed Skoudis. In this Q&A, Skoudis explains how that technical know-how has now been embedded in easy-to-use,... 

  • Can an antivirus program's behavior-based functions be judged?

    Most antivirus tools do not give users the configuration option to turn specfic detection functions on or off, making it difficult to judge the accuracy of a program's behavior-based technology. In this expert Q&A, Ed Skoudis explains the best ways t... 

  • Is it possible to detect today's peer-to-peer (P2P) botnets?

    Historically, botnets used centralized architectures for command and control. In this SearchSecurity.com Q&A, Ed Skoudis explains how attackers have upgraded the botnet structure using peer-to-peer (P2P) technology. 

  • Is the Storm worm virus still a serious threat?

    Today, attackers continue to have success with the Storm worm and its many variations, using the malware to strengthen their nasty botnets. In this SearchSecurity.com Q&A, expert Ed Skoudis explains why these rather run-of-the-mill attacks are still ... 

  • Who's fighting the spyware operators?

    There are plenty of malicious hackers who use spyware to gather others' personal data, so why aren't these cybercriminals behind bars? In this SearchSecurity.com Q&A, Ed Skoudis explains some of the challenges facing law enforcement. 

  • Should USB token data be copied to a hidden directory called 'IEDW?'

    If the data from your USB token is being copied into a hidden directory called "IEDW," be extra cautious. Whether spyware is the root of the problem or not, security threat expert Ed Skoudis explains why it's certainly a cause for concern. 

  • Why can't antimalware tools scan inside virtual machines?

    You'd think that it would be easy for an antimalware tool to see what's going on inside a virtual workstation. Unfortunately, it's not. In this expert Q&A, Ed Skoudis explains the difficulty of scanning a guest virtual machine. 

  • What are the risks of social networking sites?

    Social networking sites allow someone to post information that thousands of other users can read. But that's not at all. In this Q&A, information security threats expert Ed Skoudis reveals how sites like Myspace and Youtube let the bad guys post some... 

  • What tools can remove rookits or prevent their installation?

    Once installed, rootkits can stealthily monitor your traffic and keystrokes. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis offers four ways to keep the malware off of your systems in the first place. 

  • What are polymorphic viruses?

    Polymorphic viruses are built to dodge signature-based detection technologies. In this expert Q&A, Ed Skoudis examines the morphing malware and reveals which defenses are keeping up with the threat.