Oracle releases emergency fix for Java zero-day exploit

The company broke out of its regular patching cycle for the second time this year to fix an actively exploited flaw

By Lucian Constantin, IDG News Service |  Security

Users can disable support for Web-based Java content from the security tab in the Java control panel if they don't need Java on the Web. The security settings for such content are set to high by default, meaning users are prompted to authorize the execution of Java applets that are unsigned or self-signed inside browsers.

This is designed to prevent the automated exploitation of Java vulnerabilities over the Web, but only works if users are capable of making informed decisions about which applets to authorize and which not to. "In order to protect themselves, desktop users should only allow the execution of applets when they expect such applets and trust their origin," Maurice said.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness