A vulnerability scanner, as its name implies, scans your network or system (such as a computer, server or router) and identifies and reports back on open ports, active Internet Protocol (IP) addresses and log-ons, not to mention operating systems, software and services that are installed and running. The scanner software compares the information it finds against known vulnerabilities in its database or a third-party database such as CVE, OVAL, OSVDB or the SANS Institute/FBI Top 20.
- When it comes to next-gen security, smartphones are opening doors – literally
- Dridex, BEC attacks and ‘brandjacking’ surge as phishing volumes pick up again after lull
- Unencrypted hard-coded password risks patient info in Philips’ x-ray dose app
- Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets
- NotPetya to cost Maersk up to $300m, some systems not yet recoverable