WhatIs definition: Zero-day vulnerability

Malware, Viruses, Trojans and Spyware

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Keylogger basics

    Keystroke loggers are a serious threat to security. In this tip by contributor Tony Bradley, learn how they work and what you can do to avoid them. 

  • 2006 Products of the Year: Antivirus

    Information Security magazine and SearchSecurity.com readers chose the best enterprise antispyware products of 2006. 

  • RSS: The next malware target?

    A recent report from Trend Micro names RSS as the next likely target for bot worm attacks and predicts feed hijackings will be prevalent with the release of IE 7. In this tip, security expert Mike Chapple explains how RSS could be exploited, and offe... 

  • Seven trends to expect from virus and worm authors in 2006

    This threat monitor tip outlines seven emerging trends among virus and worm writers, explains why it is important to implement enterprise-wide security measures and provides tools and tactics to defend against them. 

  • Don't hide sensitive information in hidden form fields

    Web security guru Michael Cobb, takes an in-depth look at the dangers of HIDDEN form fields, how attackers use them to gain unauthorized entry or hijack sessions, and most importantly, how to secure the information sent in these fields. 

  • Spycatcher Enterprise 3.2

    Learn if Tenebril's Spycatcher Enterprise 3.2 can help those looking to win the war on spyware. 

  • Antispam advice from your peers

    Find peer recommended tools and tactics to help your organization mitigate the risk of future spam attacks. 

  • How to tame Google Desktop

    Although not classified as spyware, if left unmanaged and unmonitored desktop search engines, like Google Desktop, can introduce serious security concerns. This tip examines these risks and explains how to block or secure Google Desktop in the enterp... 

  • Shopping for antispyware solutions

    This presentation by "Hardening Windows" author Jonathan Hassell explores the many options for enterprise-class spyware defense. 

  • Kaspersky Anti-Virus Business Optimal 5.0

    Information Security magazine reviews the strengths and weaknesses of Kaspersky's anti-virus solution.