WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Is Warezov a security concern?

    Warezov, also known as Stration and Stratio, is a widespread scourge, already infecting hundreds of thousands of systems. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis reveals the dangerous capabilities that separate ... 

  • Who should install handheld device security: Vendors or customers?

    Shipping companies use mobile devices to track their packages, but who should be in charge of the security software: the vendor or the customer? In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis suggests who should be pro... 

  • How can rootkit hypervisors affect operating system security?

    What can rookit hypervisors do to your operating system? "Whatever their creators want!" says application security expert Michael Cobb. In this SearchSecurity.com Q&A, Cobb explains how rootkit hypervisors could defeat the security defenses of a virt... 

  • Why is spyware still a powerful data theft weapon?

    Spyware isn't going anywhere; information security threats expert, Ed Skoudis, explains why in this SearchSecurity.com Q&A. 

  • How can I prevent an FU rootkit from spreading throughout a network?

    Information security threats expert, Ed Skoudis, explains the best way to stop an FU rootkit outbreak. Learn how to clean up your infected machine and prevent the malware from spreading across your network. 

  • What is 'Trixie' and how do we remove it?

    There are several tools that call themselves Trixie. Luckily, SearchSecurity.com's information security threats expert, Ed Skoudis, can tell the good from the bad and will help you rid your system of the malicious Trixie worm. 

  • References to Beowulf in /var/log/messages.0 file

    Clusters and servers expert Don Becker explains that references to Beowulf in a user's /var/log/messages.0 file are not a hacker's intrusions but kernel messages from an old device driver. 

  • Are there any Trojans or malware that target Blackberries?

    Use a Blackberry? In this information security threats Ask the Expert Q&A, Ed Skoudis examines what, if any, attacks threaten the stability of its environment 

  • How to perform an email scan to protect against viruses

    Scanning your email for viruses before it reaches your Exchange Server can prevent the spread of viruses. In this applicaton security Ask the Expert Q&A, SearchSecurity's resident expert explains how to perform and effective email scan. 

  • What is the best antivirus software to use when running Linux?

    In this Ask the Expert Q&A, Threat and mitigation expert Ed Skoudis reveals what he believes to be the best antivirus products on the market today for Linux users.