{"id":6454,"date":"2012-09-18T09:23:31","date_gmt":"2012-09-17T23:23:31","guid":{"rendered":"http:\/\/michaelwyres.com\/?p=6454"},"modified":"2012-09-18T09:23:31","modified_gmt":"2012-09-17T23:23:31","slug":"zero-day-credibility-hole","status":"publish","type":"post","link":"https:\/\/michaelwyres.com.au\/mwdc\/2012\/09\/zero-day-credibility-hole\/","title":{"rendered":"Zero Day Credibility Hole"},"content":{"rendered":"<p>In another episode of why writers shouldn&#8217;t be writing articles when the don&#8217;t know what they are talking about, the Fairfax press have come up with this one this morning about a new vulnerability in Microsoft&#8217;s Internet Explorer:<\/p>\n<p><center>\n<table border=\"0\" width=\"80%\" cellpadding\t=\"0\" cellspacing=\"0\">\n  <tr>\n    <td class=\"linkbox\"><a class=\"linkboxtext\" target=\"_blank\" href=\"http:\/\/www.theage.com.au\/digital-life\/consumer-security\/internet-explorers-huge-security-hole-20120918-2635k.html\">Internet Explorer&#8217;s Huge Security Hole<\/td>\n  <\/tr>\n<\/table>\n<\/center>\n<\/p>\n<blockquote><p>&#8220;Zero-day exploits involve software that takes advantage of a security hole within a site to carry out an attack.&#8221;<\/p><\/blockquote>\n<p>Umm, what?  That&#8217;s not a &#8220;zero day&#8221; exploit.  <a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Zero-day_attack\"><i>This<\/i> is a &#8220;zero day&#8221; exploit<\/a>:<\/p>\n<blockquote><p>&#8220;A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on &#8220;day zero&#8221; of awareness of the vulnerability.  This means that the developers have had zero days to address and patch the vulnerability.  Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability.&#8221;<\/p><\/blockquote>\n<p>The entire crux of a &#8220;zero-day&#8221; exploit is that they are exploited before the developers were aware of them.  Such exploits also are not contained to &#8220;sites&#8221;, and can be carried out against any software &#8211; not just internet-based services.<\/p>\n<p>Googling &#8220;<a target=\"_blank\" href=\"https:\/\/www.google.com.au\/search?q=zero+day+exploit&#038;aq=0&#038;oq=zero+day+exp&#038;sugexp=chrome,mod=15&#038;sourceid=chrome&#038;ie=UTF-8\">zero day exploit<\/a>&#8221; presents the above Wikipedia article as the first result.  It took me 10 seconds to get the exact definition that the writer should have used.<\/p>\n<p>Bravo for highlighting that there&#8217;s a problem, but a little fact-checking and basic research would be nice too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In another episode of why writers shouldn&#8217;t be writing articles when the don&#8217;t know what they are talking about, the Fairfax press have come up with this one this morning about a new vulnerability in Microsoft&#8217;s Internet Explorer: Internet Explorer&#8217;s Huge Security Hole &#8220;Zero-day exploits involve software that takes advantage of a security hole within [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[293,339,475],"class_list":["post-6454","post","type-post","status-publish","format-standard","hentry","category-technology","tag-internetexplorer","tag-mediafail","tag-security"],"_links":{"self":[{"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/posts\/6454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/comments?post=6454"}],"version-history":[{"count":0,"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/posts\/6454\/revisions"}],"wp:attachment":[{"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/media?parent=6454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/categories?post=6454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michaelwyres.com.au\/mwdc\/wp-json\/wp\/v2\/tags?post=6454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}