Wikileaks' Vault 7: What Are 'Zero Day' Vulnerabilities?


27% profit every 20 days?

This is what Nic Chahine averages with his option buys. Not selling covered calls or spreads… BUYING options. Most traders don’t even have a winning percentage of 27% buying options. He has an 83% win rate. Here’s how he does it.


A lot of terms on cyberhacking are thrown around these days, especially after the Wikileaks report regarding software tools the CIA used to break into smartphones, computers and TVs.

"Vault 7" Leaks

ENTER TO WIN $500 IN STOCK OR CRYPTO

Enter your email and you'll also get Benzinga's ultimate morning update AND a free $30 gift card and more!

The new series of leaks was codenamed "Vault 7" and the first full part of the series released on Tuesday was called "Year Zero." The disclosure made a mention of something called "zero day" weaponized exploits that were used to hack into products of U.S. and European companies, including Apple Inc. (NASDAQ:AAPL), Alphabet Inc (NASDAQ:GOOGL, NASDAQ:MSFT) and Samsung.

What "Zero Day" Vulnerabilities Mean?

A "zero day" vulnerability is a hole in a software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware of it and attempts to fix it. This is termed as "zero day" attack, with the phrase "zero day" referring to the unknown nature of the hole to people other than the hackers.

The hacker exploits the vulnerability by attacking with infiltrating malware, spyware or allowing unwanted access to user information.


FREE REPORT: How To Learn Options Trading Fast

In this special report, you will learn the four best strategies for trading options, how to stay safe as a complete beginner, ​a 411% trade case study, PLUS how to access two new potential winning options trades starting today.Claim Your Free Report Here.


Cybersecurity firm FireEye Inc (NASDAQ:FEYE) outlines on its website a timeline for vulnerability:

  • A company develops a software, which although possesses a vulnerability unknown to them.
  • The hacker spots the vulnerability before the developer does or acts on it before the developer has a chance to fix it.
  • The hacker writes and implements exploit code while the vulnerability is still open.
  • Once the exploit is released, the public identifies it as an identity or information theft or the developer catches it and creates a patch to fix it.

Thus, CIA's "zero day" exploits are the result of a lengthy ordeal of poring over several thousands of lines of codes, probing of software and applications with an array of reverse engineering tools and techniques to reveal some crack.

See Also:

WikiLeaks: The CIA 'Weaponized' Apple, Samsung And Microsoft Products For Surveillance Purposes

Source Confirms Part Of WikiLeaks Report; Here's What You Should Know


27% profit every 20 days?

This is what Nic Chahine averages with his option buys. Not selling covered calls or spreads… BUYING options. Most traders don’t even have a winning percentage of 27% buying options. He has an 83% win rate. Here’s how he does it.


Posted In: EducationTechTrading IdeasGeneralVault 7Vault7WikiLeaks