Protecting Yourself from Java Exploits

As one of the most ubiquitous platforms on the web, Java is of great interest to hackers due to its large user base (it runs on an estimated 850 million computers and mobile devices). Exploits seem to crop up at least every few months and, last week, the latest Java vulnerability came to light. This particular exploit takes advantage of a vulnerability in Java 7 Update 10 and affects PCs, Macs, and Linux operating systems. CMIT Marathon clients are already protected, but others should immediately upgrade to Java SE 7 Update 11.

9DtDFag4_400x400Because of the frequency with which Java exploits seem to occur, we strongly recommend as a best practice that you turn off Java completely in your main browser. This article on CNET explains how to do so on the most popular browsers.

However, some important line-of-business applications rely on Java to function correctly. If you use such applications, we recommend having a secondary browser (Chrome and Firefox are both free and user-friendly) with Java installed that you only use for running those applications.

Just be sure to stay abreast of security alerts and ensure that you’re always running the latest recommended version of Java for your operating system and browser.

Here Are Some General Guidelines for Safe Browsing:

1) Do not browse unfamiliar or unreliable websites.

2) Do not click on website advertising (banner ads).

3) Do not click on links in emails, Facebook (or other social networking sites) messages, or instant messageseven from friendsunless you are certain it is legitimate.

4) Keep your anti-malware software up to date.

If you unintentionally click a link or an ad or visit a web page and you suspect you’ve been infected, contact CMIT immediately so that we can perform deep anti-malware scans. The sooner you notify us, the better the chance we’ll be able to rapidly resolve any infection.

Back to Blog


Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More