Find a Question:
Report: half of the security vulnerabilities back to software “Java”
Report revealed that modern security software company “Microsoft” is no longer a favorite target for malware developers, but they prefer the software they have become “Java” more than others.
The former was the “Microsoft” is a favorite target for application developers, and then after that I worked the last to improve the defense capabilities of its software, go Developers to Software Inc. “Adobe”, which remedied the matter and strengthened the capabilities of its software security to become safer even than software, “Microsoft.”
Now, according to the quarterly report “X – Forres” X-Force in 2014 and issued by the company, “IBM” IBM to understand the threats of electronic, software has become a “Java” from “Oracle” target preferred by the developers of malware.
Experts believe that there are two reasons that make the cyber attackers are focusing on a particular application or platform, the first factor is the distribution, which means that attackers prefer applications or platforms most commonly used and popular among the users.
The second factor is the ease, as experts believe that most of the developers of malware Atzmon inherently lazy, they are looking for simpler solutions in terms of targeting security vulnerabilities within the software, which suffer from the weakness of more and less security enhancements.
Based on these two workers, is the software “Java” from “Oakl ‘favorite target, they are found on all platforms almost, starting systems,” Windows “system” Mac “from” Apple “, as well as the platforms of smart devices, and also seems to be” Oracle “did not follow after the example of their counterparts in terms of enhancing the capabilities of its software security.
According to the company, “IBM”, formed cyber attacks that target software “Java” and the reality of half of the attacks observed during the month of December / December last year, and then came the “Adobe Reader” Secondly, by 22 percent, and the rest of the ratio targeted Internet browsers, such as “Internet Explorer” and “Google Chrome”, and others.
She explained, “IBM” in a leaflet that the reason behind the fact that the “Java” the most targeted by developers of malware, as the “Java” which is characterized by being involve risks, t j cause of exposing organizations to attacks advanced, so it suffers from the presence of many security holes that can be impenetrable to spread malware and control of users’ computers, and when it reaches the end point, it is difficult to prevent malicious software from the implementation of their agendas.
Experts believe that the problem with “Java” go beyond being porous, it but it works within the virtual environment of their own (machine Java Alarvatradih), the gap does not need to, but to break the model “Java” the security in order to implement the code for the SOFTWARE malicious.
Recognizes the “IBM” need “Java” for many companies and individuals, so to prevent exploitation, the company recommends restricting the implementation files “Java” known and trusted only. For small businesses and individuals, they realize that it is easier said than implemented.
To protect the user himself, experts recommend making sure to apply all security updates for “Java”, which is hoping that the message reaches the “Oracle” as soon as possible to follow the example of “Microsoft” and “Adobe” in terms of enhancing the capabilities of its software security.
In a related context, researchers said security in early February last they have found a new attempt by criminals dissidents to use the software “Java” in order to add users Nizami “Mac” and “Linux” to their lists of users of the system “Windows”, and preset the target.
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!