WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Shining a spotlight on rootkits

    In this tip, contributor Scott Sidel discusses rootkit attacks, and unveils several free software tools that can help to assist security professionals in the rootkit detection process. 

  • Finding malware on your Windows box (using the command line)

    Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the config... 

  • Metamorphic malware sets new standard in antivirus evasion

    Mutating computer viruses have been around for some time, but one type of malware possesses the ability to constantly rewrite its own code to successfully evade the most sophisticated antivirus systems. Noah Schiffman explains how metamorphic malware... 

  • Using VMware for malware analysis

    Virtualization software like VMware helps ease the challenges of malware analysis. Malware expert Lenny Zeltser explains the steps enterprises must take to ensure malicious software doesn't leak out of their VMware-based labs and endanger production ... 

  • Polymorphic viruses call for new antimalware defenses

    Attackers are always looking for innovative ways to dodge antivirus software, and many of the bad guys are now creating polymorphic code to do just that. But it's not just the malware writers who are raising the bar. In this tip from our Ask the Expe... 

  • Eight top information security events of 2006

    From WMF exploits to the Veterans Affairs data breach, information security threats were plentiful in 2006. In this tip, contributor Joel Dubin reviews what grabbed the attention of hackers in the information security world in 2006 and explains how t... 

  • Strategic considerations for an integrated malware defense

    Not only does it take several technologies to keep an enterprise malware free, but those pieces must fit together like a well-crafted puzzle. Tom Bowers explains which product categories are must-haves and what to consider when putting your assemblin... 

  • Malware: The changing landscape

    Malware is arguably growing faster than ever before, but not in ways the industry has come to expect. Even though the days of the superworm might be numbered, contributor Mike Chapple says it's time for organizations to adapt their defense postures b... 

  • Mitigate botnets in five steps

    Don't let bots provide back door access to your computing environment. In this tip, Tony Bradley reveals the evolution of bot code, and strategies to mitigate the botnet threat. 

  • Spear phishing: Don't be a target

    Hackers are beginning to use targeted attacks to exploit network vulnerabilities. In this tip, Al Berg introduces a specific targeted attack, spear phishing, and provides tactics information security practitioners can use to protect their organizati...