<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Java</title> <atom:link href="https://www.iphere.com/tag/java/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Report: Half of all exploits target Java</title><link>https://www.iphere.com/report-half-of-all-exploits-target-java</link> <comments>https://www.iphere.com/report-half-of-all-exploits-target-java#comments</comments> <pubDate>Thu, 06 Mar 2014 02:16:25 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Exploits]]></category> <category><![CDATA[Half]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Target]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-half-of-all-exploits-target-java</guid> <description><![CDATA[Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft’s lead and made its software more secure as well. According to data from the 2014 IBM [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-half-of-all-exploits-target-java/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Java Vulnerabilities Pervasive In The Enterprise</title><link>https://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise</link> <comments>https://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise#comments</comments> <pubDate>Sat, 20 Jul 2013 08:13:09 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Pervasive]]></category> <category><![CDATA[Vulnerabilities]]></category> <guid
isPermaLink="false">http://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise</guid> <description><![CDATA[Bit 9 study shows that most enterprises run outdated, vulnerable versions of Java. Less than 1 percent run the latest version. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/java-vulnerabilities-pervasive-in-the-enterprise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Massive Java update won’t get Oracle out of attacker’s crosshairs</title><link>https://www.iphere.com/massive-java-update-won%e2%80%99t-get-oracle-out-of-attacker%e2%80%99s-crosshairs</link> <comments>https://www.iphere.com/massive-java-update-won%e2%80%99t-get-oracle-out-of-attacker%e2%80%99s-crosshairs#comments</comments> <pubDate>Fri, 21 Jun 2013 09:24:32 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[attacker’s]]></category> <category><![CDATA[crosshairs]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Massive]]></category> <category><![CDATA[Oracle]]></category> <category><![CDATA[Update]]></category> <category><![CDATA[won’t]]></category> <guid
isPermaLink="false">http://www.iphere.com/massive-java-update-won%e2%80%99t-get-oracle-out-of-attacker%e2%80%99s-crosshairs</guid> <description><![CDATA[Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security chain, and Oracle isn’t securing it fast enough. The update released by Oracle yesterday addresses 40 [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/massive-java-update-won%e2%80%99t-get-oracle-out-of-attacker%e2%80%99s-crosshairs/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Another Java Zero-Day Vulnerability Hits Black Market</title><link>https://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market</link> <comments>https://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market#comments</comments> <pubDate>Thu, 17 Jan 2013 02:12:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[another]]></category> <category><![CDATA[Black]]></category> <category><![CDATA[Hits]]></category> <category><![CDATA[Java]]></category> <category><![CDATA[Market]]></category> <category><![CDATA[Vulnerability]]></category> <category><![CDATA[ZeroDay]]></category> <guid
isPermaLink="false">http://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market</guid> <description><![CDATA[Call it malware cash and carry: Less than 24 hours after Oracle on Sunday released a security update that addresses two critical zero-day vulnerabilities in Java that are being actively exploited by attackers, an online vulnerability seller began offering a brand-new Java bug for sale. &#8220;On Monday, an administrator of an exclusive cybercrime forum posted [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/another-java-zero-day-vulnerability-hits-black-market/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>