Softtek Softtek
  • Our experience
  • Overview
  • Insights
  • Blog
  • Newsroom
  • Careers
  • Contact us
softtek Language Selector
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Search button
AI
APPROACH
INDUSTRIES
SERVICES & SOLUTIONS
TRANSCEND
Softtek GenAI
FRIDA AI for Software Engineering
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
Sustainability by Softtek
Softtek
Language selector
search button
AI
Softtek GenAI
FRIDA AI for Software Engineering
APPROACH
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
INDUSTRIES
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
SERVICES & SOLUTIONS
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
TRANSCEND
Sustainability by Softtek
Our experience
Overview
Insights
Blog
Newsroom
Careers
Contact us
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Softtek Blog

Does the Java scare got you thinking about your security?

Author:
Author Leonel Navarro
Published on:
Jan 14, 2013
Reading time:
Jan 2013
|
SHARE
Share on LinkedIn
Share on X
Share on Facebook
SHARE
Share on LinkedIn
Share on X
Share on Facebook

Interestingly enough, these last five days have given the Application Security arena a run for its money, with the attention around the zero-day flaw in Java 7. It seemed to be a vulnerability that allowed a remote, unauthenticated attacker to execute arbitrary code in a vulnerable system, which could be attributed to the fact that the default Java security level setting was set to ‘Medium,’ enabling the attacker to run code without prompting the user before any unsigned Java applet or Java Web Start application was run. (You can read more about the alert here.) The vulnerability ended up being so serious that on Friday the Department of Homeland Security warned users to disable Java software completely, while Apple actually disabled it remotely on its machines that had the program installed.


laptop secureA zero-day vulnerability is one that is not known to the vendor or public, but rather by those who discovered it, i.e. the hackers. The name comes from the notion that there have been zero days to address it. Furthermore, a zero-day exploit takes advantage of the fact that the vulnerability is non-public/unknown to get targeted information or research and orchestrate a more sophisticated attack. An attack with a true zero-day vulnerability is extremely difficult – many times, impossible – to stop, since there’s no known signature that enables tools to detect it.

As you read on, think of the number of systems that could potentially be exploited due to zero-day flaws “in the wild.” Indeed, there is a black market for zero-day vulnerabilities… scary, isn’t it? Fortunately, there are programs out there that reward researchers that ethically report zero-day flaws disclosed to the public after a patch has been released.   But let’s take this experience as an example to strengthen the importance of Application Security as part of your overall Information Security strategy. While zero-day flaws impact commercial software that often is being used by your organization and is largely not in your control, it is also true that security vulnerabilities may be present in your core Web applications. What’s worse is that they could be exploited, leading to data breaches or unauthorized access to your networks and resources. Thankfully, today there are many application security offerings out there and a plethora of tools and recommendations, so neglecting to take proper precautions in application security testing will be tough to justify.

Moral of the ‘story’: Don’t be caught off guard; continuous evaluation of the performance and effectiveness of your Antivirus/IDS/IPS pays dividends. While Antivirus and Firewall do largely dominate the security technology scene, as reported in Sep 2012 by Gartner’s Eric Alhlm and Lawrence Pingree in their research, Report highlight for Survey Analysis: Profiles of the Leading and Lagging IT Security Programs in North America, your information security strategy must also include a strong vulnerability management process that allows you to constantly scan for known vulnerabilities at the network layer. It is vital to revisit your application security policy,  ensure that all vulnerabilities identified as “critical” and “high” in your core applications get fixed, and that it is done in a timely manner.

Related posts

Apr 20, 2013
SMB Security Outsourcing Trend Gains Steam
Jun 27, 2013
In Latin America, IT security remains a concern
Jan 14, 2013
CIO Social Chat Reveals What’s On Their Minds

Let’s stay in touch!

Get Insights from our experts delivered right to your inbox!

Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram
Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram

© Valores Corporativos Softtek S.A. de C.V. 2025.
privacy notice
legal disclaimer
code of ethics
our policies
webmaster@softtek.com