May 2nd, 2019 | By Administrator
An Introduction To Zero day Vulnerability Stuxnet is a computer worm that affected the computers in Iran’s nuclear plant Natanz back in 2010. This malware exploited a zero day vulnerability in Windows at that time. It affected computers controlling the centrifuges of the nuc...
MORE
June 1st, 2018 | By Administrator
A zero-day attack exploits a security vulnerability in computer software or hardware, even before a specific preventive measure or patch exists for that vulnerability. Zero-day attacks come from criminal hackers who have taken advantage of a previously unknown vulnerability...
MORE
April 21st, 2018 | By Administrator
In recent times, there has been a sudden spike in the number and sophistication of cyber attacks globally. Due to this, cybersecurity experts have adopted various new technologies to combat Trojans, Ransomware, and other types of Malware. Infamous ransomware attacks like the...
MORE
April 14th, 2018 | By Administrator
Zero-day attacks take advantage of a previously unknown vulnerability in an application or Web service that has not been addressed or patched by the creators of that application or Web service. Since the zero-day vulnerability is previously not known, the zero-day exploits o...
MORE
March 7th, 2017 | By Administrator
Security researchers at Google’s Project Zero have now reported and exposed a Windows 10 vulnerability that Microsoft has obviously failed to patch on time… Project Zero, as we know, refers to the team of security experts and analysts who work on detecting and an...
MORE
March 1st, 2017 | By Administrator
When applications or software are created they may have vulnerabilities. It is nearly impossible to find out all the vulnerabilities in an application, and this is an accepted fact. Considerable time and effort are required to search for vulnerabilities and even then they ma...
MORE
February 14th, 2017 | By Administrator
Buying and selling zero-day exploits had been common, for many years now. Hackers who do this had been doing it in the underground Dark Web (or darknet) marketplace, like for example, the Silk Road. In the recent past, some other such marketplaces too have opened up. Here...
MORE