@TheAnonymouseJoker@lemmy.mlM to Technology@lemmy.mlEnglish • 8 months ago[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.comexternal-linkmessage-square18fedilinkarrow-up199file-textcross-posted to: privatelife@lemmy.mltechnews@radiation.party
arrow-up199external-link[URGENT] WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April (Update to WinRAR 6.23 now!) [ArsTechnica]arstechnica.com@TheAnonymouseJoker@lemmy.mlM to Technology@lemmy.mlEnglish • 8 months agomessage-square18fedilinkfile-textcross-posted to: privatelife@lemmy.mltechnews@radiation.party
minus-square@XtalllllinkEnglish7•8 months agoIf the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
minus-square@TheAnonymouseJoker@lemmy.mlOPMlinkfedilink3•edit-28 months agoMost users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.
If the solution for the vulnerability is to update to a newer software version isn’t it by definition not a 0-day exploit?
Most users who read news do not really mean what a 0day means, and it helps bring more attention. Benevolent clickbait term that is not a fallacy. Also I cleverly added the (brackets) info for ease of knowing the solution.