Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » S »

security exploit


Another term for security vulnerability, a security exploit is an unintended and unpatched flaw in software code that exposes it to potential exploitation by hackers or malicious software code such as viruses, worms, Trojan horses and other forms of malware.

Security exploits may result from a combination of software bugs, weak passwords or software already infected by a computer virus or worm, and these security exploits require patches, or software fixes, in order to prevent the potential for unauthorized access or compromised integrity.

Also see vulnerability scanning and The Difference Between a Virus, Worm and Trojan Horse  in the Did You Know? section of Webopedia.







TECH RESOURCES FROM OUR PARTNERS
DID YOU KNOW?
Keeping Data Secure Is Tougher than Ever

If hackers get their hands on your company's data, they can wreak havoc on customer relationships and cause tremendous damage to your brand and... Read More »

Windows XP: Move Along, There's Nothing to See Here

After more than 12 years of holding the title of most popular operating system in the world, Windows XP is taking center stage for its final... Read More »

Report: The Role of Big Data in the Marketing Industry

According to a new study from Infogroup Targeting Solutions, we can expect to see companies spend heavily on big data marketing initiatives in... Read More »

QUICK REFERENCE
Flash Data Storage Vendor Trends

Although it is almost impossible to keep up with the pace of ongoing product releases, here are three recent highlights in the flash data storage... Read More »

15 Important Big Data Facts for IT Professionals

Keeping track of big data trends, research and statistics gives IT professionals  a solid foundation to plan big data projects. Here are 15... Read More »

Enterprise Storage Vendors

There's a number of vendors that sell enterprise storage hardware or offer cloud-based enterprise storage. View Webopedia's Enterprise storage... Read More »