资讯

Under ideal conditions, a Java applet cannot use the functionality of an ActiveX control unless it is digitally signed and trusted. Due to a Microsoft oversight, a flaw resulted that would allow a ...
Despite its name, this attack method is not limited to GIFs; ZDNet's Zero Day blog has additional information on the exploit, and states that a number of files could be combined with .JAR ...
The latest version of Java—Java 7 Update 15—provides an option through its control panel to disable the Java plug-ins or to force a confirmation prompt before Java applets are allowed to run ...
However, while analyzing the command and control servers used in the campaign, security researchers from Seculert discovered a special folder containing a malicious Java applet — Web-based Java ...
A zero-day exploit against Java 7 was discovered on Sunday. Channel partners and administrators are being urged to disable the package, if possible. Java 6, and earlier versions, appears to be ...
Microsoft has warned of three flaws affecting its software, the most serious of which would allow an attacker to gain full control of a PC using Java applets.
Evidence suggests that the Web-based attack method continued to be used even after switching the infrastructure to CGI, Aviv Raff, Seculert’s chief technology officer, said Tuesday. However, it ...
Seculert researchers identified a Java exploit and corresponding attack pages on Red October command and control servers The hundreds of government, military and research organizations targeted in ...
In 2010, a similar Java-applet-based social engineering attack capable of executing malicious code on Windows, Mac OS X and Linux computers, was used to distribute the Boonana Trojan program.
In 2010, a similar Java-applet-based social engineering attack capable of executing malicious code on Windows, Mac OS X and Linux computers, was used to distribute the Boonana Trojan program.