A vulnerability scanner, as its name implies, scans your network or system (such as a computer, server or router) and identifies and reports back on open ports, active Internet Protocol (IP) addresses and log-ons, not to mention operating systems, software and services that are installed and running. The scanner software compares the information it finds against known vulnerabilities in its database or a third-party database such as CVE, OVAL, OSVDB or the SANS Institute/FBI Top 20.
- The week in security: As Intel patches yesterday’s threats, IoT and cryptocurrency are creating new ones for tomorrow
- Apple to stop ad firms hacking HTTPS protections to track iPhone users
- Surge in cryptocurrency-mining malware heralds bigger problems for CSOs
- Intel touts new Spectre-resistant Cascade Lake chips later this year
- “Truly frightening” IoT security should motivate CSOs to reconsider their endpoint strategies