Skip navigation

When vulnerability is found within a system, an “exploit” is needed to provide access to the computer. The vulnerability can be a glitch, a bug, or even a simple design weakness within the hardware or software.  Once the weakness is discovered, an attacker can use software or commands to carry out some sort of malicious intent such as a worm, virus, or a denial-of-service attack.  On many occasions, once a vulnerability is discovered by a hacker, it is immediately posted to a website or discussed in forums so others can take advantage of it.  Even though there are no known inoculations against future exploits, patches and/or fixes are our only line of defense to protect us once a weakness is discovered.  Thus, it is very important for us to update our systems often.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: