Safari their browser had vulnerability but was immediately fixed by a “White-Hat Hacker,” for Apple.
A zero-day vulnerability refers to a hole in software that is unknown to the vendor.
In essence, it refers to our own government’s ability to hack our computers as well as enemies hacking as well.
It’s doubtful that the amount of hacking going on at the individual level is significant.
This is between “The Good Guys and The Bad Guys,” including the United States Government.
This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it, this exploit is called a zero-day attack. Uses of
Uses of zero-day attacks can include infiltrating malware, spyware or allowing unwanted access to user information.
The term “zero-day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.
In order for the vendor to rectify the vulnerability, the software company must release a patch.
Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday.
On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes.
If, however, a critical vulnerability is discovered, a patch may be released outside of schedule.
Browsers are similarly vulnerable; it’s a good idea to update your browser often, for updated security as well as features. To check if any updates are available for your browser of choice, open the browser and click either “Help” or the browser name, depending on which browser you’re using. A quick online search will provide step-by-step instructions.
Alternately, you could set up automatic updates, again, depending on the browser.
Zero-day vulnerabilities can be serious security risks. When searching for an appropriate antivirus solution, look for security software that protects against both known and unknown threats.