Skip to main content
  1. Home
  2. Computing
  3. Legacy Archives

Oracle releases security patch to fix Java vulnerabilities

Add as a preferred source on Google
Image used with permission by copyright holder

Java made headlines last week when researchers identified a security flaw in the software that allowed hackers to remotely execute malicious code in the wild. On Sunday, Oracle announced on its software security blog that it released a new security alert to repair two problems in the application. Security Alert CVE-2013-0422, which can be downloaded here, will prevent against two vulnerabilities that were remotely executable. The company’s post confirmed that the flaws were only present in Java 7 versions and did not impact Java on servers, Java desktop applications, or embedded Java.

The other change in this latest patch is that Java’s security settings will now be set to “high” by default. The more restricted setting means that a computer owner needs to directly authorize the execution of any unsigned or self-signed applets. That means a user will be notified if a malicious site attempts to run an applet and can shut down the execution before it attacks the machine. The Java Control Panel, released in update 10 of the latest Java version, can also let users turn the software on and off from their browsers.

Recommended Videos

While the patch download will secure your computer against this new attack threat, the discovery of last week’s zero-day vulnerability has led some tech experts to renew their calls to abandon Java entirely. The zero-day vulnerability is just the latest security flaw of that type to appear in the software, which is a common part of both work and home computing for many people. Users were encouraged to disable the app until the patch appeared from Oracle, but it seems unlikely that even this new security weakness will lead to a serious drop in the program’s pervasiveness.

According to InformationWeek, Oracle is slated to release another patch on Tuesday. Be prepared for lots of upkeep this week if you are a regular Java user.

Image via Roger Price

Anna Washenko
Former Contributor
Anna is a professional writer living in Chicago. She covers everything from social media to digital entertainment, from tech…
A simple coding mistake is exposing API keys across thousands of websites
Security gaps that are easier to miss than you think
Computer, Electronics, Laptop

After analyzing 10 million webpages, researchers have found thousands of websites accidentally exposing sensitive API credentials, including keys linked to major services like Amazon Web Services, Stripe, and OpenAI.

This is a serious issue because APIs act as the backbone of the apps we use today. They allow websites to connect to services like payments, cloud storage, and AI tools, but they rely on digital keys to stay secure. Once exposed, API keys can allow anyone to interact with those services with malicious intent.

Read more
AMD’s latest Ryzen 9 9950X3D2 pushes X3D to the limit
Dual 3D V-Cache, higher power, and a focus on enthusiast performance
AMD Ryzen 9 9950X3D2 FEatured

AMD has unveiled what might be its most extreme desktop CPU yet, the Ryzen 9 9950X3D2. And it’s going all-in on one thing: cache.

https://twitter.com/jackhuynh/status/2037159705395491033?s=20

Read more
Next-gen AI breakthrough promises chatbots that can read the room better
Researchers are teaching AI chatbots to read between the lines
Generative AI

Have you ever asked a chatbot something and felt like it completely missed your point? You say something with a bit of nuance, and the AI misses the subtlety entirely. That is exactly the problem researchers are trying to solve.

Even though the emotional connection with AI can feel deeper than human conversation for many users, most AI systems today still treat a sentence as a single block of sentiment. If you mix praise and criticism, the nuance often gets lost.

Read more