WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Spam poses as Internet Explorer 7 download

    Beware of emails from "admin@microsoft.com." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware. 

  • IT pros give new antispyware guidelines a mixed review

    The Anti-Spyware Coalition's "best practices" documents will aid the spyware fight, IT pros say. But some wanted a better threat-rating system and more of the corporate IT viewpoint. 

  • Symantec: Data thieves thrive on zero-day flaws

    According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007. 

  • Online game exploits threaten IT security

    Gary McGraw, chief technology officer of Dulles, Va.-based security firm Cigital Inc., is a security luminary with several books to his credit, including "Software Security: Building Security In," "Java Security" and "Exploiting Software." His latest... 

  • Schmidt: Cybersecurity a private affair

    Howard Schmidt's career in defense, law enforcement and corporate security spans nearly 40 years and includes a stint as vice president, CISO and chief security strategist for online auction giant eBay. He most recently served as chief security strat... 

  • 'Worm' targets Sun Solaris Telnet flaw

    Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet. 

  • Storm rages again: Self-morphing Trojan uses blogs to spread rootkits

    A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments. 

  • Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. 

  • Rootkit dangers at an 'all-time high'

    Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users. 

  • New zero-day attack targets Microsoft Excel

    Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.