What do you do to minimize the security risks created by Java?
RomanZ 1 year ago
In my experience, two of the greatest risks to system security are Flash and Java. Flash has a pretty central place in web design, as those of use who have used iPads, iPhones and Android 2.1 or earlier are well aware. Hopefully the widespread use of Java will fall off now that Adobe has killed support for development of flash for mobile platforms and HTML5 is on the rise. Java, on the other hand, doesn't seem to be going anywhere and remains a popular vehicle for exploits. What do you do at your company to minimize the risks that are created by using Java?
Topic: SecurityAnswer this Question
Ask a question
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
The U.S. is collecting nearly 5 billion records a day on the location of cellphones around the world to feed a large database of the location of "at least hundreds of millions of devices," according to a newspaper report.
Facebook, LinkedIn and other online services have been resetting accounts after 2 million login credentials, apparently stolen from users' computers, were discovered on a server in the Netherlands.
An academic exercise by a security researcher blossomed into a live-fire infosec emergency last month, after a major vulnerability was found in a central U.S. government healthcare database system.
Ruby on Rails users are advised to upgrade to newly released versions of the Web development framework that contain important security fixes, according to the Rails development team.
When end users circumvent the IT department and start using software-as-a-service (SaaS) applications without permission, the IT pros complain about the plague they call "shadow IT." But it would seem the professionals are also operating in the shadows, according to a survey out today.
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.
A-V Comparative finds that seven antimalware packages are the best at removing -- not finding -- existing malware on your PC.
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."
Security researches are gradually raising warnings that the Internet of Things will increase, by multitudes, the number of things that can be hacked and attacked. The Hitchcockian plotlines are endless.
White Papers & Webcasts