View Single Post
  #4   Spotlight this post!  
Unread 31-08-2012, 11:15
F22Rapture's Avatar
F22Rapture F22Rapture is offline
College Student, Mentor
AKA: Daniel A
FRC #3737 (4H Rotoraptors)
Team Role: Mentor
 
Join Date: Jan 2012
Rookie Year: 2012
Location: Goldsboro, NC
Posts: 476
F22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant futureF22Rapture has a brilliant future
Re: PSA for Java devs -- critical security patch released for Java Runtime Environmen

Quote:
Originally Posted by JesseK View Post
The JRE is no more of a "chronic" security problem than any other standard software.

[...]

Good PSA, but perhaps keep your opinions founded in fact next time.




Not to be rude, but a few google searches would reveal that Java *is* a much larger security issue than most standard software. Technically speaking it may not have more flaws than most software, but it's highly multiplatform, installed on a very large number of devices, and not kept updated very well, which makes it a gigantic target. The recent Macintosh botnet which infected 650,000 computers exploited Java, as has several of the largest pieces of malware in the last few years.

The United States Computer Emergency Response Team recommends:

Quote:
To protect against future Java vulnerabilities, consider the following workarounds:

Disable the Java plug-in...
Uninstall java...
http://www.kb.cert.org/vuls/id/636312

As does Mozilla
https://blog.mozilla.org/security/20...vulnerability/


It's not like I'm just pulling this out of nowhere.

Last edited by F22Rapture : 31-08-2012 at 11:31.