Third Party Apps: Consider The Risks

What are 3rd party tools? Everyone, from individuals to enterprises, uses third party tools and applications on their workstations, servers and mobile devices.  Some examples are Adobe Reader, Java, WinRAR, and many more.  They are applications that are run or installed, but are typically not centrally managed by your organization. Why are they important to an organization? Many times these tools are required to carry out critical job functions.  These can be running applications that require Java applets, fax services, custom written applications and so on. What risks can they introduce? Since these applications are usually not centrally managed, their [...]

By | 2015-10-01T09:22:47-05:00 October 1st, 2015|Adobe, Compliance, Computer & Network Security, Java, Vulnerabilities|Comments Off on Third Party Apps: Consider The Risks

Critical Oracle Update – Fixes 104 Vulnerabilities

Oracle announced a critical update for a number of products including Java.   According to Oracle, "Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible." We recommend patching Java as soon as possible.  Many organizations do not patch Java due to business application constraints.  Serious consideration should be given to the risks of Java vulnerabilities in light of these situations.  Updates can be optained from the Java website or using the Java Control Panel. 37 of these vulnerabilities affect Java SE.  35 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be [...]

By | 2014-04-24T15:07:08-05:00 April 17th, 2014|Computer & Network Security, Java|0 Comments