What is a Zero-Day Vulnerability?

This site uses a Mac computer with the highest most updated Operating System, (O.S.), El Capitan


Safari their browser had vulnerability but was immediately fixed by a “White-Hat Hacker,” for Apple.

A zero-day vulnerability refers to a hole in software that is unknown to the vendor.

In essence, it refers to our own government’s ability to hack our computers as well as enemies hacking as well.

It’s doubtful that the amount of hacking going on at the individual level is significant.

This is between “The Good Guys and The Bad Guys,” including the United States Government.



This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it, this exploit is called a zero-day attack. Uses of

Uses of zero-day attacks can include infiltrating malware, spyware or allowing unwanted access to user information.

The term “zero-day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.

In order for the vendor to rectify the vulnerability, the software company must release a patch.

Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday.

On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes.


If, however, a critical vulnerability is discovered, a patch may be released outside of schedule.




Browsers are similarly vulnerable; it’s a good idea to update your browser often, for updated security as well as features. To check if any updates are available for your browser of choice, open the browser and click either “Help” or the browser name, depending on which browser you’re using. A quick online search will provide step-by-step instructions.

Alternately, you could set up automatic updates, again, depending on the browser.


Zero-day vulnerabilities can be serious security risks. When searching for an appropriate antivirus solution, look for security software that protects against both known and unknown threats.



About JCscuba

I am firmly devoted to bringing you the truth and the stories that the mainstream media ignores. Together we can restore our constitutional republic to what the founding fathers envisioned and fight back against the progressive movement. Obama nearly destroyed our country economically, militarily coupled with his racism he set us further on the march to becoming a Socialist State. Now it's up to President Trump to restore America to prominence. Republicans who refuse to go along with most of his agenda RINOs must be forced to walk the plank, they are RINOs and little else.
This entry was posted in What is a Zero-Day Vulnerability? and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.