{"id":1246,"date":"2015-08-08T04:49:58","date_gmt":"2015-08-07T20:49:58","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1246"},"modified":"2015-08-08T04:49:58","modified_gmt":"2015-08-07T20:49:58","slug":"definition-zero-day-exploit","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/","title":{"rendered":"Definition of the Day: Zero Day Exploit"},"content":{"rendered":"

A zero-day exploit<\/strong> is a vulnerability in a software program that is unknown to the company or person who created the software. This hole is then exploited by hackers before the vendor is aware the vulnerability exists and can fix it. Hence, \u2018zero day’ attack.<\/p>\n

A zero-day exploit highlights the essential weakness of today\u2019s computer security model: the constant struggle to identify zero day vulnerabilities and patch them. Software companies are forever playing cat and mouse with hackers who find new vulnerabilities. This means systems are regularly vulnerable. Vulnerabilities combined with social engineering expose businesses to cyber heists. The only solution to protect one\u2019s bank accounts online is using BankVault \u2013 which bypasses one\u2019s local machine and thus negating any vulnerabilities and malware within it.<\/p>\n

You can reduce your risk by practicing safe computing best practices like regularly updating your operating system and software to include the latest \u2018fixes’ and being alert to new vulnerabilities and which operating systems and software can be impacted by them.<\/p>\n","protected":false},"excerpt":{"rendered":"

A zero-day exploit is a vulnerability in a software program that is unknown to the company or person who created the software. This hole is then exploited by hackers before the vendor is aware the vulnerability exists and can fix it. Hence, \u2018zero day’ attack. A zero-day exploit highlights the essential weakness of today\u2019s computer […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[55,263,41,48,340,341],"class_list":["post-1246","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-heist","tag-definition-of-the-day","tag-hackers","tag-malware","tag-zero-day-exploit","tag-zero-day-vulnerability"],"yoast_head":"\nDefinition of the Day: Zero Day Exploit - BankVault<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of the Day: Zero Day Exploit - BankVault\" \/>\n<meta property=\"og:description\" content=\"A zero-day exploit is a vulnerability in a software program that is unknown to the company or person who created the software. This hole is then exploited by hackers before the vendor is aware the vulnerability exists and can fix it. Hence, \u2018zero day’ attack. A zero-day exploit highlights the essential weakness of today\u2019s computer […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-07T20:49:58+00:00\" \/>\n<meta name=\"author\" content=\"A. Yost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Definition of the Day: Zero Day Exploit - BankVault","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/","og_locale":"en_US","og_type":"article","og_title":"Definition of the Day: Zero Day Exploit - BankVault","og_description":"A zero-day exploit is a vulnerability in a software program that is unknown to the company or person who created the software. This hole is then exploited by hackers before the vendor is aware the vulnerability exists and can fix it. Hence, \u2018zero day’ attack. A zero-day exploit highlights the essential weakness of today\u2019s computer […]","og_url":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-08-07T20:49:58+00:00","author":"A. Yost","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"A. Yost","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/"},"author":{"name":"A. Yost","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a"},"headline":"Definition of the Day: Zero Day Exploit","datePublished":"2015-08-07T20:49:58+00:00","dateModified":"2015-08-07T20:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/"},"wordCount":175,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"keywords":["cyber heist","definition of the day","hackers","malware","zero day exploit","zero day vulnerability"],"articleSection":["Definition of the Day"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/definition-zero-day-exploit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/","url":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/","name":"Definition of the Day: Zero Day Exploit - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"datePublished":"2015-08-07T20:49:58+00:00","dateModified":"2015-08-07T20:49:58+00:00","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/definition-zero-day-exploit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/definition-zero-day-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Definition of the Day: Zero Day Exploit"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a","name":"A. Yost","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","caption":"A. Yost"},"url":"https:\/\/www.bankvault.com\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/1246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=1246"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/1246\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=1246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=1246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=1246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}