A vulnerability scanner, as its name implies, scans your network or system (such as a computer, server or router) and identifies and reports back on open ports, active Internet Protocol (IP) addresses and log-ons, not to mention operating systems, software and services that are installed and running. The scanner software compares the information it finds against known vulnerabilities in its database or a third-party database such as CVE, OVAL, OSVDB or the SANS Institute/FBI Top 20.
- CSO Roadshow 2018: How do we build a secure IoT?
- Outlook.com and Hotmail block all state govt email after hijacked account sends 8 million spam messages
- VirusTotal lets devs check whether a legit app will wrongly be flagged as malware
- The Humble Cybersecurity Bundle offers everything you need to protect your PC for $15
- Olympic Destroyer destructive malware targets EU bio-weapons research groups