A vulnerability scanner, as its name implies, scans your network or system (such as a computer, server or router) and identifies and reports back on open ports, active Internet Protocol (IP) addresses and log-ons, not to mention operating systems, software and services that are installed and running. The scanner software compares the information it finds against known vulnerabilities in its database or a third-party database such as CVE, OVAL, OSVDB or the SANS Institute/FBI Top 20.
- Business-like cybercriminals are outsourcing malware R&D – and giving new hope to CSOs
- Three responsible for Mirai botnet attacks plead guilty
- Changing fraud patterns are forcing fintech to temper automation with security
- Connected ‘things’ to fuel the local cyber insurance market
- Microsoft fixes 33 bugs in December patch, mostly for IE and Edge