Java Plug-In Warning from U. S. Homeland Security | OnlineSafety411
Saturday 19th April 2014,

Malware & PC Security News

Ξ Leave a comment

Java Plug-In Warning from U. S. Homeland Security

posted by Amy  
Filed under Malware & PC Security News, Online Safety Threat Alerts


The updated version of Java 7 still posing a risk through defect

It has been estimated that more than 850 million people use the Java application in a range of electronic devices including but not limited to, personal computers, cars, blue-ray players and other mobile devices.  The Oracle Java Runtime Environment (JRE) 1.7 permits Internet users to run Java applications in standalone programs with a browser.

Although the Company Oracle, has completed a Release for a software patch, Homeland Security continues to recap the risk of using the Java application plug-in to the Internet audience. The software patch was supposed to aid in preventing hackers from a zero-day vulnerability exploit.

The Department of Homeland Security has also advised PC Users to disable the Java application due to a major security defect found within the latest Java 7 version.

Homeland Security advised: “Unless it is absolutely necessary to run Java in Web browsers, disable it …… even after updating to -Update 11.”

In an updated note posted by Homeland Security, they are repeating their original stance stating although the Oracle patch was completed, this may not prevent hackers from attacking your devices.

It is not unusual for the U. S. Government to intervene with these types of security risks as they are warning all Web Users about malware cybercriminals and hackers that are wildly exploiting the zero-day vulnerability. However, in this case, instead of the Government just advising of a “warning”, they are urging Users to actually disable the Java plug-in.

Security experts have already alerted Users that with the latest update of Java, hackers may still be able to violate computers via an execution code sent remotely.

Unfortunately, these codes can be used as to extract personal information and help in identity theft.

H D Moore is the chief security officer at Rapid-7. He has reportedly told Reuters News Agency that it could potentially take as long two (2) years to correct the defect that now poses a threat from the Java plug-in. He was also quoted in saying, “The safest thing to do at this point is just assume that Java is always going to be vulnerable. Folks don’t really need Java on their desktop”.

For additional information on how to disable Java on Windows browser, log onto – http://www.zdnet.com/how-to-disable-java-in-your-browser-on-windows-mac-7000009732/

comments powered by Disqus

Search OnlineSafety411.com

Our Site is Safe

onlinesafety411.com Webutation

We Speak Your Language! - Translate This Site Now

    Translate to:

Malware Blocking SpyHunter Installation?

Cannot install SpyHunter or other Antimalware / Antispyware due to malware blocking installation or download?
Click here to run the alternate SpyHunter download installer!
This link will bypass blocking agents (mostly designed to block exe. files) in most malware/spyware parasite threats.