What is a zero day vulnerability?

ernard

I understand zero day to mean that there is a serious security issue, but I don’t know what it actually means. Where does the term “zero day” come from?

Topic: Security
Answer this Question

Answers

2 total
ttopp
Vote Up (4)

Zero day refers to a situation where there has been “zero days” since the time a vulnerability was publicly identified and the first attack. It means that there has been a problem identified, but there isn’t a patch yet. 

http://www.pctools.com/security-news/zero-day-vulnerability/

jimlynch
Vote Up (3)

Zero-day attack
http://en.wikipedia.org/wiki/Zero-day_attack

"A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch.[1] There are zero days between the time the vulnerability is discovered (and made public), and the first attack.[2] It is common for individuals or companies who discover zero-day attacks to sell them to government agencies for use in Cyberwarfare.[3][4][5][6]"

Ask a question

Join Now or Sign In to ask a question.
A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.
Researchers have concluded that those billions of connected devices could help save lives in the event of disaster, even one that knocks out the Internet
Goodwill Industries International said Monday federal authorities are investigating a possible payment card breach at its U.S.-based retail outlets.
A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.
Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded.
It's not just dissidents looking for anonymous email, but everyday people who'd rather not reveal their true identity.
In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies.
This reduces time-to-mitigation for numerous types of events.

White Papers & Webcasts

See more White Papers | Webcasts