Latest Zero day attack Stories

2008-07-29 13:30:00

New research shows that Internet hackers are narrowing the time frame they need to unleash computer attacks that take advantage of publicly disclosed security holes. Many sites are being compromised within 24 hours after a vulnerability is disclosed. IBM Corp.'s latest Internet Security Systems X-Force report said security flaws are being exploited in Web browsers, computer operating systems and other programs before many people even have had time to learn there's a problem. Released on...

2008-07-29 09:00:00

IBM (NYSE: IBM) today released results from its X-Force 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. According to...

Word of the Day
  • The hard inner (usually woody) layer of the pericarp of some fruits (as peaches or plums or cherries or olives) that contains the seed.
This word comes from the Greek 'endon,' in, within, plus the Greek 'karpos', fruit.