Attack Vectors
Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment. Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information.
Read more about this topic: Zero-day Attack
Famous quotes containing the word attack:
“Remote and ineffectual Don
That dared attack my Chesterton.”
—Hilaire Belloc (18701953)
Related Phrases
Related Words