Oracle Patches Java 7 & Java 6 Following Apple Hack To Close “Remote Compromise”



Following today’s big story that a number of employee computers within Apple were compromised following a zero-day Java exploit, Oracle has just released update 15 for Java 7 and update 41 for Java 6.

While there’s no specific mention of what has been updated, there’s excellent reason to believe it fixes the vulnerability that compromised both Apple and Facebook.

What You Need To Know About Today’s Apple Hack



What Happened?

According to Apple, a “small number” of its employees computers were compromised due to a vulnerability in Java.

How Did It Happen?

It appears that this zero-day exploit is the same one that resulted in a number of Facebook employees having malware installed on their laptops as a result of visiting a mobile developer website that had been compromised: Apple says their employees were infected “through a website for software developers.”

Apple Kills Java On The Mac To Fight Malware Like Flashback


Don't trust the Java.
Don't trust the Java.

Apple released a small Java update for OS X users this Wednesday. The update effectively removed the Java applet plug-in that typically comes pre-installed in all web browsers on the Mac. Why? Well, Apple has been trying to distance itself from Java for quite some time, mainly due to the fact that most malware spreads via Java vulnerabilities.

Take the recent Flashback trojan, for example. Millions of Macs were comprised because hackers were able to exploit a security vulnerability in Java on the browser. You could visit a bad site with a corrupt Java applet and get infected. After this week’s update, Java is no longer included in browsers like Safari.

How To Fix Mac Missing Plug-In Errors [MacRx]


Missing Plug-In

If you’re a Mac user on the Internet, chances are you’ve come across a few websites where embedded content isn’t displayed correctly. Instead you get an icon or an error message saying Missing Plug-In, often with few additional details about exactly what is missing.

While there’s no single installer which will solve all missing plug-in problems, there are a few common things to start with. If those don’t work you can delve deeper into non-common formats or the forgotten codecs of yesteryear.

iOS Development Makes Objective-C The Third Most Common Programming Language


iOS app development makes Objective-C one of the most popular programming languages.
iOS app development makes Objective-C one of the most popular programming languages.

According to a recent study, iPhone and iPad app development has a bigger learning than curve than any other mobile platform. It also costs developers more in terms of time and expenses to develop an iOS app than to create an Android, BlackBerry, or Windows Phone app.

Despite those challenges, iOS has boosted the popularity of Objective-C, the programming language used by Apple for both Mac and iOS development – making it the third most popular language with developers.

Oracle Wins Partial Victory Against Google In Copyright Infringement Case



After a weekend deliberation, a federal jury in San Francisco handed Oracle a partial victory by finding Google guilty of copyright infringement yet remaining deadlocked on whether Google’s use of the Java APIs fell under “fair use.” The jury found that Google infringed a minimal amount of Java source code with Judge William Alsup indicating that Oracle would only be entitled to statutory damages as a result. This certainly wasn’t what Oracle was hoping for and when Oracle’s lawyer seemed to suggest they were entitled to more than just statutory damages, Judge William Alsup quickly put the kibosh on that notion based on the minimal amount of code infringed, stating what they’re seeking as “bordering on the ridiculous.”

Apple Releases New Flashback Trojan Removal Tool For Lion Users Without Java


Apple's newest tool nukes Flashback on your Java-less Mac.
Apple's newest tool nukes Flashback on your Java-less Mac.

Following two independent Java security updates and one last patch to detect and remove the Flashback trojan, Apple has released another software tool for getting rid of Flashback on a Mac running OS X Lion without Java installed.

Flashback is the name of a virus that was able to infect a Mac and link it up to a botnet of around 600,000 other Macs. If you’ve updated your Mac with the latest Java patch, you should be fine, but Apple has provided this new tool for safe measure to Mac users running Lion without Java already installed.

Scared Of Flashback? Here’s How To Disable Java On Your Mac And Stay Safe


Kaspersky is helping Apple identify vulnerabilities in Mac OS X.
Got the Flashback spooks?

Apple has said that its working on a tool to end the notorious Flashback botnet once and for all, but there’s still the remotest chance you could get infected. Keep in mind that only around 600,000 Macs have fallen prey to Flashback, and that number is a tiny fraction of the millions of Mac users around the world. Most of the machines that have been infected already are centralized in North America.

Your Mac is completely up to date and you’ve already checked to see if you’re infected by the Flashback trojan. If everything is squared away and you’re not infected already, here’s how to ensure there is zero chance you’ll get infected while you wait for Apple to save the day.

Apple: We’re Working On Software To Find And Kill The Flashback Trojan


Apple has crippled Flashback significantly, and the number of infected users is dropping rapidly.
Get it? It's a trojan and Apple.

A Mac trojan called Flashback resurfaced in the news over the last week or so after it was revealed that 600,000+ Macs were infected by the nefarious botnet. We’ve showed you how to see if you’re infected by Flashback, and Apple has released two updates already to patch the malware.

Apple is about to get into the antivirus business, as the company has said that it is working its own tool for you to detect and remove Flashback once and for all. The folks in Cupertino will also be working with ISPs around the globe to hunt down the source of this botnet and kill it at the root.