The glossary below contains many of the terms you will find in common use throughout our website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.


The day a security researcher reports the discovery of a new vulnerability to either the technology manufacturer, a security news group, or both. This starts the "time to exploit clock" which tracks the number of days between the discovery of the vulnerability and the exploitation of it.