zero-day attack


Also found in: Encyclopedia, Wikipedia.

ze·ro-day attack

 (zîr′ō-dā′, zē′rō-)
n. Computers
An often malicious attack on a computer or network resource, usually exploiting a coding error or other flaw, that occurs before the vendor has released a software patch.
References in periodicals archive ?
5 as Mozilla works to fix a vulnerability that is the focus of a zero-day attack.
Worm storms are particularly effective when hackers use a zero-day attack to spread the attack as there is no patch or signature to impede their propagation.
FireEye provided protection from this sophisticated and targeted zero-day attack without any changes or content updates to the product.
McAfee Software-as-a-Service Email Protection fully managed protection against viruses, spam, phishing, zero-day attacks, and other email threats.
To defend against zero-day attacks, companies should track reports of zero-day vulnerabilities and beef up intrusion detection, with an eye toward suspicious activity that appears to target those vulnerabilities.
On Thursday, AirDefense discovered 309 out of 547 wireless devices, such as laptops, PDAs, phones and vendor PCs susceptible to "Evil Twin" types of attacks, combined with some of the latest zero-day attacks.
On Wednesday, AirDefense discovered 481 out of 847 wireless devices, such as laptops, PDAs, phones and vendor PCs susceptible to "Evil Twin" types of attacks, combined with some of the latest zero-day attacks.
Third Brigade Deep Security allows businesses to apply comprehensive security profiles to hosts that protect against known and zero-day attacks using deep packet inspection.
AirDefense studied the wireless LAN traffic throughout the day Tuesday and found more than half of the 347 wireless devices, such as laptops, PDAs, phones and vendor PCs susceptible to "Evil Twin" types of attacks, combined with some of the latest zero-day attacks.
The Ally ip100 is designed to protect small-to-medium-sized business networks, as well as an Enterprise's wireless access points and branch or remote offices from network reconnaissance, zero-day attacks, DNS cache poisoning and denial of service attacks.
It's lightweight and has no performance impact and yet it stops all zero-day attacks dead.
Today's malware threat has evolved into a destructive force that outpaces even the best anti-virus signatures, leaving consumers' personal data completely exposed to zero-day attacks.