A vulnerability scanner, as its name implies, scans your network or system (such as a computer, server or router) and identifies and reports back on open ports, active Internet Protocol (IP) addresses and log-ons, not to mention operating systems, software and services that are installed and running. The scanner software compares the information it finds against known vulnerabilities in its database or a third-party database such as CVE, OVAL, OSVDB or the SANS Institute/FBI Top 20.
- Microsoft's big Windows Defender ATP update: bad macros, fileless malware and faster response
- Singapore's central bank launches S$30 million cybersecurity grant for finance sector
- Huawei security fears - paranoia, blowback, or both?
- UK Facebook internal docs reveal Zuckerberg plans for exploiting user data
- Chrome 71 is out: swats 43 bugs and clamps down on bad ads