What is a Zero-Day Vulnerability?

This site uses a Mac computer with the highest most updated Operating System, (O.S.), El Capitan

 

Safari their browser had vulnerability but was immediately fixed by a “White-Hat Hacker,” for Apple.

A zero-day vulnerability refers to a hole in software that is unknown to the vendor.

In essence, it refers to our own government’s ability to hack our computers as well as enemies hacking as well.

It’s doubtful that the amount of hacking going on at the individual level is significant.

This is between “The Good Guys and The Bad Guys,” including the United States Government.

 

 

This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it, this exploit is called a zero-day attack. Uses of

Uses of zero-day attacks can include infiltrating malware, spyware or allowing unwanted access to user information.

The term “zero-day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.

In order for the vendor to rectify the vulnerability, the software company must release a patch.

Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday.

On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes.

 

If, however, a critical vulnerability is discovered, a patch may be released outside of schedule.

 

 

 

Browsers are similarly vulnerable; it’s a good idea to update your browser often, for updated security as well as features. To check if any updates are available for your browser of choice, open the browser and click either “Help” or the browser name, depending on which browser you’re using. A quick online search will provide step-by-step instructions.

Alternately, you could set up automatic updates, again, depending on the browser.

zero-day-updates

Zero-day vulnerabilities can be serious security risks. When searching for an appropriate antivirus solution, look for security software that protects against both known and unknown threats.

THE END

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s