Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!

Zero-day (computing)

Index Zero-day (computing)

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software). [1]

68 relations: Access control, Antivirus software, Ars Technica, Buffer overflow, Bug bounty program, C't, Complexity, Computer security, Computer virus, Computer worm, Content Threat Removal, Convention on Cybercrime, Electronic signature, Engadget, Exploit (computer security), Federal government of the United States, Framework decision, Google, Hacker, Halting problem, Heuristic (computer science), Heuristic analysis, Internet, Julian Assange, Linear bounded automaton, Linux, Machine code, MacOS, Malware, Market for zero-day exploits, Microsoft, Microsoft Windows, Network Access Control, Network Access Protection, Network Admission Control, Patch (computing), RFPolicy, Sandbox (computer security), Security and safety features new to Windows Vista, Simple Mail Transfer Protocol, Society for Worldwide Interbank Financial Telecommunication, Software, Software-defined protection, Solaris (operating system), Static program analysis, Stuxnet, Symantec, Targeted threat, The Intercept, The Shadow Brokers, ..., The Washington Post, Threat (computer), Timeline of computer viruses and worms, TippingPoint, United States Computer Emergency Readiness Team, Unix, Vault 7, Vulnerabilities Equities Process, Vulnerability (computing), Web browser, Website, White hat (computer security), WikiLeaks, Windows Vista, Workaround, Zero Days, Zero-day (computing), Zeroday Emergency Response Team. Expand index (18 more) »

Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.

New!!: Zero-day (computing) and Access control · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Zero-day (computing) and Antivirus software · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: Zero-day (computing) and Ars Technica · See more »

Buffer overflow

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

New!!: Zero-day (computing) and Buffer overflow · See more »

Bug bounty program

A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities.

New!!: Zero-day (computing) and Bug bounty program · See more »


c't – Magazin für Computertechnik (magazine for computer technology) is a German computer magazine, published by the Heinz Heise publishing house.

New!!: Zero-day (computing) and C't · See more »


Complexity characterises the behaviour of a system or model whose components interact in multiple ways and follow local rules, meaning there is no reasonable higher instruction to define the various possible interactions.

New!!: Zero-day (computing) and Complexity · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Zero-day (computing) and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Zero-day (computing) and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Zero-day (computing) and Computer worm · See more »

Content Threat Removal

Content Threat Removal (CTR) is a cyber security technology that defeats the threat posed by handling digital content in cyber space.

New!!: Zero-day (computing) and Content Threat Removal · See more »

Convention on Cybercrime

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.

New!!: Zero-day (computing) and Convention on Cybercrime · See more »

Electronic signature

An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign.

New!!: Zero-day (computing) and Electronic signature · See more »


Engadget is a multilingual technology blog network with daily coverage of gadgets and consumer electronics.

New!!: Zero-day (computing) and Engadget · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Zero-day (computing) and Exploit (computer security) · See more »

Federal government of the United States

The federal government of the United States (U.S. federal government) is the national government of the United States, a constitutional republic in North America, composed of 50 states, one district, Washington, D.C. (the nation's capital), and several territories.

New!!: Zero-day (computing) and Federal government of the United States · See more »

Framework decision

A framework decision was a kind of legislative act of the European Union used exclusively within the EU's competences in police and judicial co-operation in criminal justice matters.

New!!: Zero-day (computing) and Framework decision · See more »


Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

New!!: Zero-day (computing) and Google · See more »


A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem.

New!!: Zero-day (computing) and Hacker · See more »

Halting problem

In computability theory, the halting problem is the problem of determining, from a description of an arbitrary computer program and an input, whether the program will finish running (i.e., halt) or continue to run forever.

New!!: Zero-day (computing) and Halting problem · See more »

Heuristic (computer science)

In computer science, artificial intelligence, and mathematical optimization, a heuristic (from Greek εὑρίσκω "I find, discover") is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.

New!!: Zero-day (computing) and Heuristic (computer science) · See more »

Heuristic analysis

Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".

New!!: Zero-day (computing) and Heuristic analysis · See more »


The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Zero-day (computing) and Internet · See more »

Julian Assange

Julian Paul Assange (born Hawkins; 3 July 1971) is an Australian computer programmer and the editor of WikiLeaks.

New!!: Zero-day (computing) and Julian Assange · See more »

Linear bounded automaton

In computer science, a linear bounded automaton (plural linear bounded automata, abbreviated LBA) is a restricted form of Turing machine.

New!!: Zero-day (computing) and Linear bounded automaton · See more »


Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Zero-day (computing) and Linux · See more »

Machine code

Machine code is a computer program written in machine language instructions that can be executed directly by a computer's central processing unit (CPU).

New!!: Zero-day (computing) and Machine code · See more »


macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: Zero-day (computing) and MacOS · See more »


Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Zero-day (computing) and Malware · See more »

Market for zero-day exploits

The market for zero-day exploits refers to the commercial activity that happens around the trafficking of software exploits.

New!!: Zero-day (computing) and Market for zero-day exploits · See more »


Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Zero-day (computing) and Microsoft · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Zero-day (computing) and Microsoft Windows · See more »

Network Access Control

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

New!!: Zero-day (computing) and Network Access Control · See more »

Network Access Protection

Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer, based on its health.

New!!: Zero-day (computing) and Network Access Protection · See more »

Network Admission Control

Network Admission Control (NAC) refers to Cisco's version of Network Access Control, which restricts access to the network based on identity or security posture.

New!!: Zero-day (computing) and Network Admission Control · See more »

Patch (computing)

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it.

New!!: Zero-day (computing) and Patch (computing) · See more »


The RFPolicy states a method of contacting vendors about security vulnerabilities found in their products.

New!!: Zero-day (computing) and RFPolicy · See more »

Sandbox (computer security)

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.

New!!: Zero-day (computing) and Sandbox (computer security) · See more »

Security and safety features new to Windows Vista

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

New!!: Zero-day (computing) and Security and safety features new to Windows Vista · See more »

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

New!!: Zero-day (computing) and Simple Mail Transfer Protocol · See more »

Society for Worldwide Interbank Financial Telecommunication

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment.

New!!: Zero-day (computing) and Society for Worldwide Interbank Financial Telecommunication · See more »


Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.

New!!: Zero-day (computing) and Software · See more »

Software-defined protection

Software-defined protection (SDP) is a computer network security architecture and methodology that combines network security devices and defensive protections which leverage both internal and external intelligence sources.

New!!: Zero-day (computing) and Software-defined protection · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Zero-day (computing) and Solaris (operating system) · See more »

Static program analysis

Static program analysis is the analysis of computer software that is performed without actually executing programs.

New!!: Zero-day (computing) and Static program analysis · See more »


Stuxnet is a malicious computer worm, first uncovered in 2010.

New!!: Zero-day (computing) and Stuxnet · See more »


Symantec Corporation (commonly known as Symantec) is an American software company headquartered in Mountain View, California, United States.

New!!: Zero-day (computing) and Symantec · See more »

Targeted threat

Targeted threats are a class of malware destined for one specific organization or industry.

New!!: Zero-day (computing) and Targeted threat · See more »

The Intercept

The Intercept is an online news publication dedicated to what it describes as "adversarial journalism".

New!!: Zero-day (computing) and The Intercept · See more »

The Shadow Brokers

The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016.

New!!: Zero-day (computing) and The Shadow Brokers · See more »

The Washington Post

The Washington Post is a major American daily newspaper founded on December 6, 1877.

New!!: Zero-day (computing) and The Washington Post · See more »

Threat (computer)

In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

New!!: Zero-day (computing) and Threat (computer) · See more »

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

New!!: Zero-day (computing) and Timeline of computer viruses and worms · See more »


Trend Micro TippingPoint’s Intrusion Prevention System (IPS) deals with IT threat protection.

New!!: Zero-day (computing) and TippingPoint · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Zero-day (computing) and United States Computer Emergency Readiness Team · See more »


Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Zero-day (computing) and Unix · See more »

Vault 7

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare.

New!!: Zero-day (computing) and Vault 7 · See more »

Vulnerabilities Equities Process

The Vulnerabilities Equities Process (VEP) is a process used by the U.S. federal government to determine on a case-by-case basis how it should treat zero-day computer security vulnerabilities; whether to disclose them to the public to help improve general computer security, or to keep them secret for offensive use against the government's adversaries.

New!!: Zero-day (computing) and Vulnerabilities Equities Process · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Zero-day (computing) and Vulnerability (computing) · See more »

Web browser

A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.

New!!: Zero-day (computing) and Web browser · See more »


A website is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server.

New!!: Zero-day (computing) and Website · See more »

White hat (computer security)

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

New!!: Zero-day (computing) and White hat (computer security) · See more »


WikiLeaks is an international non-profit organisation that publishes secret information, news leaks, and classified media provided by anonymous sources.

New!!: Zero-day (computing) and WikiLeaks · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Zero-day (computing) and Windows Vista · See more »


A workaround is a bypass of a recognized problem or limitation in a system.

New!!: Zero-day (computing) and Workaround · See more »

Zero Days

Zero Days is a 2016 American documentary film directed by Alex Gibney.

New!!: Zero-day (computing) and Zero Days · See more »

Zero-day (computing)

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).

New!!: Zero-day (computing) and Zero-day (computing) · See more »

Zeroday Emergency Response Team

In computer security, the Zeroday Emergency Response Team (ZERT) was a group of volunteer security researchers who produced emergency patches for zero day attack vulnerabilities in proprietary software.

New!!: Zero-day (computing) and Zeroday Emergency Response Team · See more »

Redirects here:

0-day attack, 0-day exploit, 0day, Day zero attack, Day zero worm, Day zero worms, Next-generation malware, Zero day attack, Zero day exploit, Zero day exploits, Zero day flaw, Zero day threat, Zero day virus, Zero day vulnerability, Zero day worm, Zero day worms, Zero hour attack, Zero-Day Attack, Zero-Day Exploit, Zero-day (software), Zero-day attack, Zero-day exploit, Zero-day malware, Zero-day virus, Zero-day vulnerability.


[1] https://en.wikipedia.org/wiki/Zero-day_(computing)

Hey! We are on Facebook now! »