Formas De Cuidar Tu Computadora
OUCH! | January 2013
IN THIS ISSUE… • What is Java? • Risks of Java • Best Defenses
Java
GUEST EDITOR
Arrigo Triulzi is the guest editor for this issue. He is an independent securityconsultant based in Geneva, Switzerland who has over 25 years of experience.
s
OVERVIEW WHAT ARE THE RISKS?
A common method cyber attackers use to hack into computers is to developspecial programs that take advantage of and exploit weaknesses in your computer’s software. These weaknesses are usually specific to one type of computer. This means the hacking tools they develop toattack Microsoft Windows computers work only on Microsoft Windows; their tools do not work on any other type of computer such as an Apple Mac, or vice versa. This limits who they can attack and how.Java is different. Since it is designed to work on almost any computer, cyber criminals can create a single attack tool that can potentially hack almost any computer in the world as long as it hasJava installed. This makes Java’s
© The SANS Institute 2013
http://www.securingthehuman.org
4 3
OUCH! | January 2013
Java
weaknesses an attractive target for attackers, as they canhack more computers with less effort. Also, Java is
complex, which means it can have many weaknesses. Finally, most people do not even know what Java is or if they have it installed. As a result,Java has become a popular target for cyber criminals.
BEST DEFENSE
Ultimately, the best defense is simple: if you are not using any programs or applications that require Java, then do not install iton your computer. absolutely require it. Only install Java if you
If you are not sure if you have Java
already installed on your computer, there is a simple way to check. Simply go to the Javawebsite listed below to check if you have Java installed. Be sure to only check if you have Java installed; do not actually install it. http://www.java.com/en/download/installed.jsp
Java is...
Regístrate para leer el documento completo.