Apple: A Thing Unto Itself Sans Java
...Back in October of 2010, Apple announced they would drop support for Java. This did not spur Oracle to directly support this Unix platform as it did for other... more…CVE-2018-3211: Java Usage Tracker Local Elevation of Privilege on Windows
...We found design flaw/weakness in Java Usage Tracker that can enable hackers to create arbitrary files, inject attacker-specified parameters, and elevate local privileges. In turn, these can be... more…How to Protect Your Devices from a Fast Spreading Java Virus
...Last week, a new security issue surfaced for a popular programming language known as Java. This Java security issue is classified as a zero-day threat, and it spreads malicious... more…How to Use Java – If You Must
...With Java going through another embarrassing zero-day vulnerability recently, it has become a common bit of advice for users to “uninstall Java”. In general, this is sound advice. If... more…Java Zero-Day Exploit and Ruby on Rails Vulnerabilities
...During the past two days there has been a lot of activity and concern around vulnerabilities in two different widely used technologies: Java and Ruby on Rails. With this... more…Was the FIFA Website Hacked?
...jar Fifa 2017 jar Fifa 2018 jar fifa 17 jar 240x320 download fifa 2017 jar Download fifa 2017 320x240 fifa manager 2014 java 320x240 Pes 17 320x240 jar fifa17 jar... more…The Current Web-Delivered Java 0day
...The Java 0day activity that we have been monitoring and preventing for almost the past week has been irresponsibly reported on other blogs, with early posts publicly linking... more…Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor
...to the new Java 7 classcom.sun.beans.finder.ClassFinder that allows the sun.awt.SunToolkit class to load, modify and execute the malicious code. This threat is composed of an HTML page with malicious JavaScript... more…A Mysterious Java Exploit
...Last week Kahu Security blogged about Escalating Java Attacks. Kahu’s post dissects two Java exploits. The first exploit targets CVE-2012-0507, the latest Java vulnerability that’s been seen being exploited... more…Java Zero-Day Exploit In The Wild, Spreading Ransomware
...A new zero-day exploit in Java has been found in the wild. Currently, this exploit is being used by toolkits like the Blackhole Exploit Kit (BHEK) and the Cool... more…Java 7 Update 10 allows users to restrict the use of Java in browsers
...A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime... more…Adwind: FAQ
...as Adwind RAT (Remote Access Tool), AlienSpy, Frutas, Unrecom, Sockrat, JSocket, and jRat. It is a backdoor available for purchase, and is written entirely in Java which makes it cross-platform.... more…Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
...installed with Java, including Windows, Mac OSX, Linux, and Android. Unsurprisingly we saw it resurface in another spam campaign. This time, however, it’s mainly targeting enterprises in the aerospace industry,... more…Tips For Java Junkies
...So, according to our recent poll, only 12% of you don’t have Java Runtime Environment (JRE) installed. And the rest of you (88%) are Java junkies to one degree... more…FIFA public Wi-Fi guide: which host cities have the most secure networks?
...are taking place – such as at locations around the forthcoming FIFA World Cup 2018 – offers especially fertile ground for criminals. With this in mind, can football fans feel... more…Waratek upgrades Java protection
...Waratek is introducing a feature to its Java-protection platform that enables upgrading to the current version of Java without having to install Java updates or touch the apps... more…Kam dál?
- Exploit Published for Unpatched Flaw in Windows Task Scheduler
- A Hacked Database Prompts Debate about Genetic Privacy
- Comfort is important in identification: Bank identification is the most trusted method, passwords come second
- Microsoft Edge Scripting Engine CVE-2017-11808 Remote Memory Corruption Vulnerability
- Researcher Earns $5,000 for Hacking Imgur
- How to protect iPhones against ransomware attack?
- Apple Quickly Updates Malware Definitions to Detect New SMS Scam Trojan
- Say hello to Kiddle: the child-protecting search engine
- Social media etiquette for Jim Carrey (and everyone else)
- News in brief: Facebook tags ‘disputed’ news; products to be judged on security; smart meters snafu