Java exploit used in Red October cyberespionage attacks, researchers say

The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based Java exploits, according to researchers from Israeli IT security firm Seculert.

read more

Read more: Java exploit used in Red October cyberespionage attacks, researchers say

Incoming search terms

Story added 15. January 2013, content source with full text you can find at link above.