The Naked Scientists Podcast cover image

Cyberwarfare

The Naked Scientists Podcast

00:00

How to Prevent Zero Day Attacks

Vulnerabilities come in the form of bugs in the code pieces softway that aren't working quite as they 're supposed to. The data bases are long lists of these bugs found by other people. If i can't find one of those, if i have a big development team, you can go in with one known as zero day. It's called zero day because it's being used before. But often the defence is a step behind. As with zerodays, what happens when the line is broken? So it depends really what the person attacking a web sight is trying to do. M but from a vulnerable application point of view, having a vigorous vulnerability management program places is

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app