Explaining Zero Days. They are on your computer. And pretty much every connected device on the planet.

1
1719

Melanie Teplinsky, cybersecurity expert and adjunct professor at American University’s Washington College of Law, explains the lifecycle of a zero day: A previously unknown vulnerability in software that could allow hackers access to people’s data without them knowing.

Remember last year when the NSA was hacked? They stole all the Zero Day bugs the Agency had collected. We’re all screwed. These Zero Days can be used to weaponize critical infrastructure like trains, planes, automobiles, medical equipment, drones, etc.