exploit

(redirected from zero-day exploit)
Also found in: Dictionary, Thesaurus, Encyclopedia.
References in periodicals archive ?
This is a simple case for security metrics, but it does not apply to the attacker who holds the zero-day exploits of certain target, mainly for the following two reasons.
(480) See, e.g., Ryan Gallagher, supra note 460 (explaining the dangers of an unregulated zero-day exploit market for national governments and agencies).
The post Kaspersky Lab uncovers new Windows zero-day exploit appeared first on TahawulTech.com.
According to CNET, the zero-day exploit allows attackers to install malware on your computer without one's permission, and that could be used to hack personal information or gain control of the computer.
This brings it dangerously close to realizing the much-feared "zero-day exploit," in which an attack will exploit a vulnerability that is not yet known.
This was the second consecutive zero-day exploit used in a series of cyber-attacks in the Middle East in just one month.
The assumption behind this tactic was simple: if Toropov tried to sell a zero-day exploit to Hacking Team, it was highly probable that he did the same with other spyware vendors.
The Java 7 Update 11 is the instant critical security update required to fix the zero-day exploit present in Java 7 Update 10 and previous versions of the Java software.
Microsoft has issued a security advisory that provides customers with guidance and workarounds for dealing with a zero-day exploit aimed at Internet Explorer.
"The zero-day exploit is always going to be a challenge," says TippingPoint chief technology officer Marc Willebeek-LeMair.
The cloud service enabling platform offers the only zero-day Attack-Loop[TM] preventative technology, protecting secondary storage data using bi-directional malware detection, zero-day exploit protection, variable repository naming, and two-factor authentication (2FA).
A zero-day exploit is an error within software that will allow a hacker to bypass all internal control mechanisms and let hackers do whatever they wish.