What is a zero-day attack and how to avoid it?

Zero-Day

A zero-day attack is an attack against an application or system that targets the execution of malicious code thanks to knowledge of vulnerabilities unknown to the public or the manufacturer.

Logically, in order for it to occur, it is assumed that the vulnerabilities of the system or application to be used have not yet been corrected.zero-day attack

There are many types of computer attacks. Zero-day attacks are only one, but others that are also very common are DDoS or Distributed Denial of Service – like the one Telegram suffered a few days ago or the one Feedly suffered last year.

Broadly speaking, DDoS attacks use a very large number of clients that saturate the target server with requests and traffic, so that it ends up not being able to attend to as many and is blocked.

Another very common type of computer attack is the so-called Man-in-The-Middle or MiTM, of which we already spoke in our article on the big problems of HTTPS and SSL.

In this type of attack, a third party interposes itself between the communication between a client and a server, so that it can gain access to bank passwords, email accounts and sensitive information of all kinds.

However, although these two types of attacks are more common today, zero-day attacks are not something you don’t have to worry about.

What exactly is a zero-day attack?

Surely in the past you would have heard someone say that you shouldn’t turn on the computer on a certain day because “a virus comes in”.

The Internet had barely arrived in Spanish homes in the mid-1990s, and it is clear from the electricity grid that it was not going to come in, but we – poor digital palettes – believed it.

The news spread because the news services of the time were echoed, but always referred to corporate information systems. They never talked about domestic systems.

In any case, in these years, and without knowing it, we were already talking about these zero-day attacks. Malware waits until a certain day to activate, and that’s where its name comes from. If by that date the vulnerability that would open the window for the attack has not been fixed, then there is a chance that the system will become infected.

What can you do to protect yourself from a zero-day attack?

To protect yourself from these zero-day attacks we recommend using a tool called Malwarebytes Anti-Exploit. You’ve probably heard of Malwarebytes Antimalware, the manufacturer’s flagship product. This program arrives where antivirus programs fall short, and with Anti-Exploit the idea is the same.

Malwarebytes Anti-Exploit, in its free version, already serves to protect web browsers and their plug-ins, as well as other components installed in the computer such as Java. The paid version also shields other applications such as Adobe PDF Reader and Microsoft Office.

The anti-exploit programs can help you to protect you from serious attacks, and Malwarebytes Anti-Exploit is a good option -and free on top of that-.

All you have to do is install it for solid protection, and if you’re a Windows user you should consider trying it. It is a good way to put another line of defense, which given the current situation of computer security is never a bad idea.

Malwarebytes.org| Malwarebytees Anti-Exploit (gratis)

You may be interested:

Edit Free Photos Paint Net FREE

Siri Quote & The funny Siri Sayings

How to share WhatsApp Audios on Instagram

Facebook Comments