Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- adjective computing  Pertaining to the day on which 
software isreleased . 
Etymologies
Sorry, no etymologies found.
Support
				Help support Wordnik (and make this page ad-free) by adopting the word zero-day.
Examples
- 
								
This is called a "zero-day flaw", and it's not quite as simple as just changing the clock; developers did plan and guard against anyone doing something that obvious.
 - 
								
This is called a "zero-day flaw", and it's not quite as simple as just changing the clock; developers did plan and guard against anyone doing something that obvious.
 - 
								
Apple has not yet offered a patch for the vulnerability, known as a "zero-day" weakness because the company has not been informed ahead of time of the weakness.
Apple device security flaws revealed by German watchdog 2011
 - 
								
The first is it's suggestive that there were four zero-day exploits because if it would have been criminals, they would have taken the first one and been off trying to make money.
 - 
								
So right now, it uses four zero-day vulnerabilities, and what zero-day vulnerabilities are, basically, vulnerabilities that can be exploited to allow them to automatically run on your machine, unauthorized, due to a bug in that software.
 - 
								
Latest Microsoft zero-day attack may come from gamers
 - 
								
The first is it's suggestive that there were four zero-day exploits because if it would have been criminals, they would have taken the first one and been off trying to make money.
 - 
								
So right now, it uses four zero-day vulnerabilities, and what zero-day vulnerabilities are, basically, vulnerabilities that can be exploited to allow them to automatically run on your machine, unauthorized, due to a bug in that software.
 - 
								
The first is it's suggestive that there were four zero-day exploits because if it would have been criminals, they would have taken the first one and been off trying to make money.
 - 
								
So right now, it uses four zero-day vulnerabilities, and what zero-day vulnerabilities are, basically, vulnerabilities that can be exploited to allow them to automatically run on your machine, unauthorized, due to a bug in that software.
 - 
								
A zero-day is when an exploit is publicly available before a project has any chance to reply to it.
 
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.