Attack Vectors
Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment. Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information.
Read more about this topic: Zero-day Attack
Famous quotes containing the word attack:
“Adolescents swing from euphoric self-confidence and a kind of narcissistic strength in which they feel invulnerable and even immortal, to despair, self-emptiness, self-deprecation. At the same time they seem to see an emerging self that is unique and wonderful, they suffer an intense envy which tears narcissism into shreds, and makes other peoples qualities hit them like an attack of lasers.”
—Terri Apter (20th century)