{"id":139,"date":"2014-09-10T19:40:44","date_gmt":"2014-09-10T19:40:44","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=139"},"modified":"2025-06-06T18:01:09","modified_gmt":"2025-06-06T12:31:09","slug":"zero-day-threats-stop-unknown","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/","title":{"rendered":"Zero Day Threats: How Do You Protect Against the Unknown?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-143\" style=\"margin-left: 100px;\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR.png\" alt=\"ZERO DAY CALENDAR\" width=\"400\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR.png 847w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-225x171.png 225w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-300x227.png 300w\" sizes=\"(max-width: 847px) 100vw, 847px\" \/><br \/>\nAntivirus systems include a signature file, a so called &#8220;blacklist&#8221;, that allows them to identify and exterminate known threats. Some also include a so called &#8220;whitelist&#8221; of files that are known to be valid and ok to run. Conventional <a href=\"https:\/\/antivirus.comodo.com\/\">antivirus<\/a> does a good job of dealing with the good and the bad, but what about the unknown?<\/p>\n<p>Zero day threats are by definition <a href=\"https:\/\/enterprise.comodo.com\/security-solutions\/unknown-threats.php\" target=\"_blank\" rel=\"noopener\">unknown threats<\/a>. A zero day attack uses a new virus, worm or other malware that <a title=\"Free Antivirus\" href=\"https:\/\/antivirus.comodo.com\/\">antivirus<\/a> vendors have not yet added to their signature database or updated their software to protect against.<\/p>\n<p>Malware is called &#8216;zero-day&#8217; for the length of time between its discovery and the creation of the AV signature to combat it. Once discovered, most vendors update their update their AV signatures in a matter of hours. However, the malware itself may been at large and reeking havoc for a long time before it was discovered. Enterprises should never rely on signature based detection alone.<\/p>\n<p>Java, Adobe Reader, Adobe Flash and Internet Explorer have been victimized numerous times over the past few years by hackers who have identified defects they could exploit, known as zero day exploits. Last year, Homeland Security even recommended disabling the Java environment on all computers. Besides the most famous cases, any browser or software could be carrying a zero day threat.<\/p>\n<p>This is why\u00a0Comodo <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-8\/\">Antivirus for Windows 8<\/a> has built protection against <a href=\"https:\/\/blog.comodo.com\/pc-security\/zero-day-vulnerability-adobe-player-threatens-web-users\/\" target=\"_blank\" rel=\"noopener\"><strong>zero-day threats<\/strong><\/a> into its computer and <a title=\"Internet Security\" href=\"https:\/\/www.comodo.com\/home\/internet-security\/free-internet-security.php\" target=\"_blank\" rel=\"noopener\">Internet security<\/a> systems. The Comodo architecture contains multiple layers of technology to identify &#8216;unknown&#8217; malware. This includes real-time <a href=\"https:\/\/valkyrie.comodo.com\/\" target=\"_blank\" rel=\"noopener\">behavior analysis<\/a>, instant file look-up and advanced heuristic detection.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&amp;af=16166\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><br \/>\n<strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Antivirus systems include a signature file, a so called &#8220;blacklist&#8221;, that allows them to identify and exterminate known threats. Some also include a so called &#8220;whitelist&#8221; of files that are known to be valid and ok to run. Conventional antivirus does a good job of dealing with the good and the bad, but what about [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,8],"tags":[437,436],"class_list":["post-139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","category-how-to","tag-unknown-malware","tag-zero-day-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Day Threats: How to Protect Against the Unknown Malware?<\/title>\n<meta name=\"description\" content=\"Zero day threats are unknown threats. They use new virus, worm and other malware to attack that antivirus vendors have not yet added it to their database.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Day Threats: How to Protect Against the Unknown Malware?\" \/>\n<meta property=\"og:description\" content=\"Zero day threats are unknown threats. They use new virus, worm and other malware to attack that antivirus vendors have not yet added it to their database.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-10T19:40:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T12:31:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png\" \/>\n\t<meta property=\"og:image:width\" content=\"388\" \/>\n\t<meta property=\"og:image:height\" content=\"312\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/\",\"name\":\"Zero Day Threats: How to Protect Against the Unknown Malware?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png\",\"datePublished\":\"2014-09-10T19:40:44+00:00\",\"dateModified\":\"2025-06-06T12:31:09+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Zero day threats are unknown threats. They use new virus, worm and other malware to attack that antivirus vendors have not yet added it to their database.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png\",\"width\":388,\"height\":312},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Day Threats: How Do You Protect Against the Unknown?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Day Threats: How to Protect Against the Unknown Malware?","description":"Zero day threats are unknown threats. They use new virus, worm and other malware to attack that antivirus vendors have not yet added it to their database.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/","og_locale":"en_US","og_type":"article","og_title":"Zero Day Threats: How to Protect Against the Unknown Malware?","og_description":"Zero day threats are unknown threats. They use new virus, worm and other malware to attack that antivirus vendors have not yet added it to their database.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2014-09-10T19:40:44+00:00","article_modified_time":"2025-06-06T12:31:09+00:00","og_image":[{"width":388,"height":312,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/","name":"Zero Day Threats: How to Protect Against the Unknown Malware?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png","datePublished":"2014-09-10T19:40:44+00:00","dateModified":"2025-06-06T12:31:09+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Zero day threats are unknown threats. They use new virus, worm and other malware to attack that antivirus vendors have not yet added it to their database.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/ZERO-DAY-CALENDAR-SMALL.png","width":388,"height":312},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/zero-day-threats-stop-unknown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Day Threats: How Do You Protect Against the Unknown?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":38,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions"}],"predecessor-version":[{"id":21671,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/139\/revisions\/21671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/142"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}