Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

Top 5 Zero-Day Threats Of 2013

Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.

Back 1   2   3   ... 6 Next

photo
Internet Explorer Zero-Day Threats

In January, an Internet Explorer zero-day exploit surfaced, enabling attackers to bypass the browser's built-in restrictions. Security experts from malware detection appliance maker FireEye first detected attacks targeting the Internet Explorer zero-day flaw being delivered from the Council on Foreign Relations website. Days after the zero-day surfaced, proof-of-concept code also was released for the Metasploit Framework, making the attack technique more widely available.

In May, a second Internet Explorer zero-day was detected being delivered on the Department of Labor website. Security experts said the target appears to be Department of Energy employees who frequented the Department of Labor's Site Exposure Matrices page. Microsoft rushed out a temporary Internet Explorer patch in September to address another zero-day flaw.

 
 
Back 1   2   3   ... 6 Next

sponsored resources