Request a Demo

What Is a Zero Day Attack and How to Protect Your POS System

Businesses everywhere learn to worry about a zero day attack, but most don’t know what it is. Because there are multiple definitions out there, you may be a little confused. At Comodo, we want to remove that confusion, help you understand what they are and how they can affect POS security.

What is a Zero Day Attack?

Some people and companies define these attacks as those that focus on vulnerabilities that haven’t been patched or known to the public while others describe these attacks as hackers who take advantage of security vulnerabilities on the same day it becomes known, meaning there are no days between the time the attack happens and when vendors learn of a bug in the software or firmware.

The general definition describes a zero day attack or an exploit as an attack that target vulnerabilities that are publicly known but unpatched.

Good and Bad Guys

If a vulnerability is found by the good guys (software vendors or internet security companies), they usually keep it quiet until they develop a patch to fix it. However, sometimes these businesses and suppliers have to announce the flaw publicly because users could avoid the problem. For example, if you don’t use a website or don’t open a specific email attachment, you won’t get infected by the malware.

The vulnerability can also be discovered by a user and be publicly disclosed on a blog or forum. Either way, a race ensues between the good and bad guys. The software vendor is scrambling to create a fix while the hackers are working hard to exploit the situation before it can be fixed.

As you can see, the problem is severe, and we are part of the good guy team, searching for and finding fixes and keeping your network safe. Contact us today to learn more.