Zero Day Exploits
Once hackers detect a security glitch in an application, it's only a matter of time before they develop malicious code to attack vulnerable systems before a patch is created. These vulnerabilities often affect Web browser and applications relegated to a specific platform. But recently, security researchers detected a variation of a cross-platform Domain Name Server vulnerability that can open the door wide open for what is known as cache poisoning attacks—tricking the DNS to accept an incorrect request which subsequently reroutes unsuspecting users to another, usually malicious, Web site. Once a user is rerouted to the malicious site, financially driven cyber criminals then have the ability to dump Trojans, keystroke loggers and an array of malicious payloads onto users' vulnerable computers. Meanwhile, attackers are working to develop malicious software that can automate Web browser vulnerability exploits, reducing the time it takes to exploit a system to seconds.
Read The Full Report.