On Wed, 20 Feb 2013 16:32:56 +0100, Josh Berry <[email protected]> wrote:
I think most of these have simply meant that somebody in the Apple
network
had the plugin running. Considering that most attacks of note I've read
about involved direct emailing of exploited pdfs to executives, this
makes
sense.
I suppose it's like in the Facebook exploit, there was a JWS-based attack
hidden in a page of a forum visited by developers. As Josh said, some
employee connected with the Java plugin enabled and so was infected.
--
Fabrizio Giudici - Java Architect @ Tidalwave s.a.s.
"We make Java work. Everywhere."
http://tidalwave.it/fabrizio/blog - [email protected]
--
You received this message because you are subscribed to the Google Groups "Java
Posse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/javaposse?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.