Z is for …

Zero Day The time taken between a¬†vulnerability existing and a¬†patch being released to fix it can be several weeks, months or even years. An exploit written to take advantage of this gap is known as a Zero Day. The bad guys are particularly interested in carrying out attacks against systems with vulnerabilities but no patches, … Continue reading Z is for …

E is for…

Encryption The process of scrambling a message or data as part of cryptography is called encryption. This is what makes the message impossible to read unless you know how to unscramble it using decryption. As the years have gone by this process has become more and more complicated, and there is heavy reliance on computing … Continue reading E is for…