
![]() |
PDF Document Download Document: How to Detect Security VulnerabilitiesYou must be a logged in to view this document.
|
![]() Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology! |

Excerpt: Exploiters on the Internet have caused billions of dollars in damages. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chests ranging from spyware, rootkits, Trojans, viruses, worms, bots, and zombies as well as various other blended threats. Exploits can be grown and harvested the same day a security hole is announced-in so-called “zero-day attacks”- so they are getting much harder to stop. Open source malware code, freely available on the Internet is enabling this phenomenon and cannot be reversed. Not all exploits are created equal. Most are evolutionary improvements on existing exploits. What's very interesting is that the average exploit currently has a dozen names. Knowing if you have any CVEs is the only way to find out and is considered due diligence. Removing critical CVEs is considered due care. Frequent and consistently scheduled security audits for CVEs and their removal is the only prudent thing to do as a proactive information security manager. |