Attack Vectors
Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment. Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information.
Read more about this topic: Zero-day Attack
Famous quotes containing the word attack:
“The small perplexities of small minds eddy and boil about you. Confident from the experience that has led you out of these same dangers, you attack each problem as it appears, unafraid.”
—Alice Foote MacDougall (18671945)