What does zero day or zero hour attack or threat means? What are its targets? Can a zero day attack be targeted at private or some to large corporation? Can someone be vulnerable through the opening of e-mail attachment? What rigorous security and personal strategy can be implemented to prevent a zero day or zero hour attack? What different vectors are used in zero day attacks?
What is a Zero day attack or threat?
Zero day attack or threat refers a hole in the software that is unknown to the vendor. In this type of attack, the hole which was undetected will be exploited by the intruders before they comes to know and fixes that attack. Zero day attack can also be done through email attachments. Any organization may be prone to zero day attack when connected to internet. To identify this attack, company must release a patch. To protect from this attack, some security measures have to be followed like port locking, using Secure Socket Layer (SSL) for secure information transfer, using firewalls.
What is a Zero day attack or threat?
Zero Day attack or threat refers to a process hackers usually perform to target flaws, or holes on applications, or software before the developer able to learn that these such flaws or holes exists. Depending on the level of attacks, it could take few weeks or even months before the developer able to react and issue a fix or a preventive measure via patches or updates on the application or software.