It sounds like something out of a science fiction movie and perhaps it could be, in a sense. In all those movies where the self-proclaimed “hackers” pound the keyboards with super-fast clicks, it seems so easy to get access to a bank account, or a security system, or – ya know – a top secret government facility.
In real life, hacking isn’t done so easily or quickly, but as more an more hacking attacks break the news, the vulnerabilities found in the security framework of companies like Target®, JP Morgan® and Anthem® are becoming all too prominent. Of course, your home computer isn’t a big company. That doesn’t mean it isn’t vulnerable to attacks.
Zero-day malware is a way to describe tools that help hackers exploit vulnerabilities. The reason and old idea gets a new name is because of the rate at which these attacks can be formulated and carried out.
What is it?
The term zero-day malware has been applied to different things all in the same category of threat. It is perhaps best to think of zero-day malware as more of a family name than a single label. The top items inside the “zero-day malware family” include:
• An attack using a vulnerability in software that was there from the beginning. A sneak attack using a crack in a digital foundation, if you will.
• A virus that is deployed through a sneak attack. This includes just about any type of malware under the sun.
What makes the zero-day malware unique in regards to all of the other malware we hear so much about is how it is sent to unsuspecting users. Continue reading