website statistics

Security researchers have discovered a new zero-day vulnerability in Java Runtime Environment, an exploit that can be used to install malware on a PC.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

If you have Java installed on your browser, you run an imminent risk of being victim to a possible zero-day exploit. The vulnerability has just been discovered by security researchers and it is being said that it can be exploited to drop a payload, such as a malware, into the targeted computer.


Java

According to the security analysts who were able to spot this vulnerability on the web, it is present in Java Runtime Environment version 1.7 or later. Essentially, with the help of this vulnerability, an attacker can force your computer to download a payload and then run it. The payload usually carries a malware with it which, in turn, can wreck havoc on your computer and steal your critical information.

For now, security researchers have found the exploit being used to exploit Windows machines. However, given the nature of the exploit, it has been revealed that it can also be used to exploit machines running other OS, such as Linux or Mac OS X.

The server on which the exploit has been found to be existent links up to an IP address in China whereas the command-and-control server of the payload malware that is installed through this exploit is believed to be in Singapore right now. Oracle may take a while in updating and patching the vulnerability, so for now, the best thing to do is to simply disable Java on your browser.

No substantially useful patch for this vulnerability is available from any other security vendor until now. So rather than waiting for Oracle to patch it up, you should disable Java for now and stay tuned for any official updates from Oracle.

Source: FireEye

Buy Cheapest Related Product From Amazon.com


Nexus 7 Tablet Ad Appears On Google Home Page

ATIV May Be Samsung’s Windows Based Devices Trademark
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 30, 2012(1 year, 7 months ago.)

Recent Search

Recent Tutorials

At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
This review of iSkysoft Video Converter tells you everything you want to know about this Win 8/7 compatible video/DVD tool. Check the below to learn more details.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook