On Wed, 20 Feb 2013 16:32:56 +0100, Josh Berry <[email protected]> wrote:

I think most of these have simply meant that somebody in the Apple network
had the plugin running.  Considering that most attacks of note I've read
about involved direct emailing of exploited pdfs to executives, this makes
sense.

I suppose it's like in the Facebook exploit, there was a JWS-based attack hidden in a page of a forum visited by developers. As Josh said, some employee connected with the Java plugin enabled and so was infected.


--
Fabrizio Giudici - Java Architect @ Tidalwave s.a.s.
"We make Java work. Everywhere."
http://tidalwave.it/fabrizio/blog - [email protected]

--
You received this message because you are subscribed to the Google Groups "Java 
Posse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/javaposse?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to