Oracle has introduced another update to deal with some active java exploits, 2 weeks ahead of time. In January, Oracle had its Java add-on updated after the United States Dept of Homeland Security advised disabling Java completely till the widespread problems were dealt with. In addition, the earlier update changed the default security setting of Java to “High” which indicates that Java applets must be approved by users before they run, as well as made it simpler for users to completely disable Java.
Even though it was released 2 weeks ahead of time, the recent Java Critical Patch Update carried out by Oracle comes after serious attacks on several media companies including Twitter. Java was not held solely responsibility for these hacks; however Twitter went as far as restating the counsel given by Dept. of Homeland security to have the plugin disabled. The majority of browsers have stopped Java by default already. Firefox announced last week that it intends to implement click-to-play element for browser plugins such as Java, also Apple placed the vulnerable plugin on its blacklist in order to protect users. Users can visit Oracle’s Java website to download the February patch.