
Cyberwarfare
The Naked Scientists Podcast
00:00
How to Prevent Zero Day Attacks
Vulnerabilities come in the form of bugs in the code pieces softway that aren't working quite as they 're supposed to. The data bases are long lists of these bugs found by other people. If i can't find one of those, if i have a big development team, you can go in with one known as zero day. It's called zero day because it's being used before. But often the defence is a step behind. As with zerodays, what happens when the line is broken? So it depends really what the person attacking a web sight is trying to do. M but from a vulnerable application point of view, having a vigorous vulnerability management program places is
Transcript
Play full episode