An undisclosed computer-software vulnerability that hackers can exploit to adversely affect computer programs, data, additional computers or a network. It is known as a “zero-day” because once the flaw becomes known, the software’s author has zero days in which to plan and advise any mitigation against its exploitation.
Learn the Terms
Keeping up with technical terms can be a struggle.
Review our Glossary of Terms to learn more.
Testimonial
-
As is always the case, you rock. Thanks for always doing a superb job, regardless of the task.
Joshua A., Waterborne Environmental, Inc.