WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Integration migration

    Today John Swainson, president and chief executive officer of CA, will be making his first keynote speech at an RSA conference. Since joining CA in 2004, John has focused the company on its core strengths of systems, network, security and storage man... 

  • WebSense: PortAuthority deal, Web 2.0 apps reflect changing threat landscape

    Websense's December acquisition of PortAuthority marries ingress and egress detection capabilities, giving the vendor a foothold in defending not only Web threats, but sensitive customer data and intellectual property leaving the network perimeter. C... 

  • Dozens of Web sites spread malicious Trojan

    Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites. 

  • Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products. 

  • Super Bowl stadium Web site hacked, delivered malware

    Discovered Friday and now reportedly resolved, the incident involved a malicious Javascript file on the site's front page header that exploited two known Microsoft flaws. 

  • New security vendors take on sophisticated attackers

    Some security vendors are developing technologies that show promise in preventing unknown attacks and protecting machines with zero-day vulnerabilities. 

  • Microsoft disputes Word zero-day report

    Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new. 

  • Storm Trojan was worse than it should have been

    The "Storm" attack made a big splash because people keep falling for social engineering and there was simply little else in the news, experts say. 

  • McAfee: Malware all about ID theft

    The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee. 

  • Storm worm keeps spreading

    Update: A Trojan that first exploited concerns about a storm that battered Europe last week has broken into new variants with new techniques and a wider range of fake headlines.