WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Discovery of malware cesspool triggers attack fears

    Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack. 

  • Black Hat 2007: Rootkit hunters caught in cat-and-mouse game

    Is Joanna Rutkowska's infamous Blue Pill rootkit really undetectable? Researchers at Black Hat USA explain how to find it, but there's a catch: their method may not always work. 

  • Spammers tweak Storm to push PDF spam, less image spam

    Spammers that target enterprises are switching from image spam to emails containing PDF attachments that could eventually perform denial of service attacks and spread bot code. 

  • Antispyware legislation gets tepid reviews

    Congress is debating three different bills that would punish spyware pushers, but some IT professionals have their doubts about legislation as a solution to the problem. 

  • Symantec plugs dangerous flaw in Norton security software

    Attackers could exploit a flawed ActiveX control in Symantec Norton Internet Security and Norton Personal Firewall to run malware on targeted machines. 

  • When signature based antivirus isn't enough

    Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products. 

  • Technology making headway in spam battle

    Few people in the world know more about identifying and stopping spam and other unwanted email than Paul Judge. Now the chief technology officer at Secure Computing Inc., Judge spent years at CipherTrust studying spammers, their motives and tactics a... 

  • Hackers get free reign to develop techniques says Microsoft security chief

    A patchwork of laws in the United States and foreign apathy toward cyber crimes give attackers an advantage over law enforcement, said Microsoft's top security chief Scott Charney. 

  • DNS worm strikes at Microsoft flaw

    A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers. 

  • Malware outbreak 'largest in almost a year'

    Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.