Apple Inc. (NASDAQ:AAPL) finally closed the java malware hack on Wednesday. Now many wonder whether users should shut off Java for good or not.
On Tuesday, the Cupertino-based company, Apple Inc. (NASDAQ:AAPL) shared some details regarding the matter. Apparently, hackers attacked a small number of corporate Macs when the users visited software developer website, iPhoneDevSDK, which was infected with the Java-based malware. This is the same malware attack that affected Facebook Inc (NASDAQ:FB).
Just hours later, Apple Inc. (NASDAQ:AAPL) shipped the Java for OS X 2013-001 1.0 update to improve security and compatibility.
Apple Inc. (NASDAQ:AAPL)’s more detailed report indicates, “Multiple vulnerabilities existed in Java 1.6.0_37, the most serious of which may allow an untrusted Java application to execute arbitrary code outside the Java sandbox. Visiting a Web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user.”
Much of the blame is placed on Java which has prompted tech experts to recommend shutting Java systems down. Cisco added that Java is responsible for most malware attacks, about eighty percent and online advertising is the main culprit.
Earlier today, we reported that there were some major leads in the Apple Inc. (NASDAQ:AAPL) and Facebook Inc (NASDAQ:FB) hacking incident. There was even a mention that China was funding these internet attacks in the United States and Europe, but China disputed such claims. Now there are some noted signs that the US attacks might be coming from a spy group in Eastern Europe with hopes of obtaining company secrets.
On Tuesday, Oracle released some emergency patches to correct the flaws and loopholes hackers are utilizing. Oracle suggested in the release note that customers apply a critical patch update as soon as they can. They added that Tuesday’s update contains the quarterly patch release. Earlier this month, they released an emergency update that fixed fifty bugs, but this time it didn’t include all the updates that originally came with the first update.