{"id":971,"date":"2013-02-20T00:00:00","date_gmt":"2013-02-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/20\/apple-confirms-cyber-attack-releases-java-update-and-malware-removal-tool-pcworld\/"},"modified":"2021-12-30T11:38:31","modified_gmt":"2021-12-30T11:38:31","slug":"apple-confirms-cyber-attack-releases-java-update-and-malware-removal-tool-pcworld","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/20\/apple-confirms-cyber-attack-releases-java-update-and-malware-removal-tool-pcworld\/","title":{"rendered":"Apple confirms cyber attack, releases Java update and malware removal tool | PCWorld"},"content":{"rendered":"<p>The words \u201cApple\u201d and \u201csecurity breach\u201d don\u2019t often appear together, but on Tuesday the company said that some computers belonging to its employees had been targeted by hackers originating from China\u2014the same group, reportedly, that last week infiltrated computers belonging to Facebook employees. Since OS X Lion, Macs have shipped without Java installed, and as an added security measure OS X automatically disables Java if it has been unused for 35 days.   To protect Mac users that have installed Java, today we are releasing an updated Java malware removal tool that will check Mac systems and remove this malware if found. True to its word, Apple released a Java update late on Tuesday for Mac OS X 10.7 or later that patches a number of security vulnerabilities as well as scanning for the most common variants of the malware in question and removing them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The patch also updates Apple\u2019s provided version of Java to 1.6.0_41; the update is available by choosing Software Update from the Apple menu or visiting the Mac App Store and clicking on Updates. <\/p>\n<p>In line with the company\u2019s recent policy on Java, these downloads will disable Apple\u2019s built-in Java plugin; users who try to run applets in their browser will instead be prompted to download the latest version of the Java plug-in from Oracle.   One additional casualty this time around, for 10.7 and later, is the Java Preferences app that usually lives in OS X\u2019s Utilities folder\u2014Apple says it\u2019s no longer necessary for configuration.<\/p>\n<p>Apple is only the latest target in a recent spate of cyber attacks that have hit institutions like the New York Times and the Wall Street Journal along with tech companies like Facebook and Twitter; most of those attacks have been traced back to China. <\/p>\n<p>Link: http:\/\/www.pcworld.com\/article\/2028740\/apple-confirms-cyber-attack-will-release-security-tool.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-971","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=971"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/971\/revisions"}],"predecessor-version":[{"id":3458,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/971\/revisions\/3458"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}