a Security Vulnerabity


An unintended flaw in software code or a system that leaves it open to the potential for exploitation in the form of unauthorized access or malicious behavior such as viruses, worms, Trojan horses and other forms of malware.

Also referred to as security exploits, security vulnerabilities can result from software bugs, weak passwords or software that’s already been infected by a computer virus or script code injection, and these security vulnerabilities require patches, or fixes, in order to prevent the potential for compromised integrity by hackers or malware.

Read Also:

  • Google Nexus

    A line of smartphones and tablet devices developed by Google and various hardware partners. The Google Nexus first debuted in early 2010 as the Nexus One, and today the line consists of the Google Nexus 4, Nexus 7 and Nexus 10 devices. Google Nexus devices are powered by Google’s Android open source mobile operating system. […]

  • 802.11ad

    A wireless LAN (WLAN) specification under development by the IEEE (Institute of Electrical and Electronics Engineers) that will serve as the successor to the 802.11ac specification, which is also currently under development. The 802.11ad standard is expected to be approved by the IEEE in 2014. The 802.11ad specification operates in the 60GHz frequency band, as […]

  • Phablet (phone tablet hybrid)

    A phrase used to describe a half-smartphone and half-tablet mobile device (a phone/tablet hybrid). A phablet is a small pocket-sized mobile device that is a bit larger than the size of an average smartphone, with a touch screen ranging in size from 5 inches (e.g. the Sony Xperia Z) to 6.1 inches (e.g. the Huawei […]

  • 802.11ac (Gigabit Wi-Fi)

    A wireless LAN (WLAN) specification under development by the IEEE (Institute of Electrical and Electronics Engineers) that delivers wireless data transfer rates in the range of 433 Mbps (Megabits per second) per spatial stream. With support for up to eight streams, the 802.11ac specification offers a theoretical maximum data transfer speed of more than 3Gbps […]

  • Wearable Technology (wearable gadgets)

    Wearable technology (also called wearable gadgets) is a category of technology devices that can be worn by a consumer and often include tracking information related to health and fitness. Other wearable tech gadgets include devices that have small motion sensors to take photos and sync with your mobile devices. Examples of wearable tech include: CommBadge: […]


Disclaimer: a Security Vulnerabity definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.