The recently published java drive by exploit is undetectable (FUD) and it allows the attacker to download and run a file at the targeted computer.
A group of pupils at a middle school in Alaska took control of their classroom computers after phishing for administrator privileges.
Security firm FireEye reports that cyber criminals are exploiting previously unknown vulnerabilities in the current Java versions to depl
Yet more Java vuln
(MONROE, WA) On January 11 SkyValleyChronicle.com was one of the first newspapers – if not the first newspaper – in
Enterprising malware authors have pounced all over the opportunity created by the recent Java
Read more about Malware poses as Java update in wake of Java security scare
Cyber spies have planted Java- and Flash-exploiting malware on Web sites focused on human rights, defense and foreign policy.