Have you disabled java on all your machines?

dvarian

Another day, another java exploit. A new browser based exploit apparently lets attackers execute arbitrary code on client systems, and there is no patch available. From what I've read, the vulnerability exists in JRE 1.7 or later, but 1.6 or earlier is ok. I didn't really see an option, and disabled Java on all of our machines (including Macs). Was this an overreaction on my part, or have you disabled Java as well?

Topic: Security
Answer this Question

Answers

2 total
dthomas
Vote Up (8)

I haven't, but I guess I probably should.  http://www.theregister.co.uk/2012/08/27/disable_java_to_block_exploit/

jimlynch
Vote Up (8)

Yep, I don't really have much of a need for it on my Macs. So it's been disabled.

Ask a question

Join Now or Sign In to ask a question.
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
Privacy campaign group Europe-v-Facebook is inviting Facebook users outside the U.S. and Canada to join a lawsuit against the company, which it alleges violates privacy laws.
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness