Watch this video on YouTube
Which type of attack exploits vulnerabilities that are unknown to the software vendor or security community?