Notwithstanding the many recommendations put forth by most security professionals to protect against the actively exploited Java vulnerability, what is quite worrying is the fact that the majority of the proposals apply only to specific system configurations and environments. Since the new vulnerability is considered to be very critical, there is no doubt that it can be exploited actively to execute malicious code on a system. Having said that, the six ways suggested by the security researchers should help in reducing these risks to a great extent.

Read the full article here:
Six Ways to Protect Against the New Actively Exploited Java Vulnerability

© Copyright 2018 Fusion Software LLC 1603 Lbj Freeway, Dallas, TX 75234 214-420-5144