RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-25 Thread KPelkman
ted in the wild | BeyondTrust This is exactly what we have done. Thanks. Good to hear others recommend it. From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Friday, January 25, 2013 10:09 AM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | Beyond

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-25 Thread Ziots, Edward
. Thank you. [Description: Description: Lifespan] From: Sam Cayze [mailto:sca...@gmail.com] Sent: Friday, January 25, 2013 11:33 AM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust This is exactly what we have done. Thanks. Good to hear others

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-25 Thread Sam Cayze
This is exactly what we have done. Thanks. Good to hear others recommend it. From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Friday, January 25, 2013 10:09 AM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust If it is over

Re: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-25 Thread Andrew S. Baker
> *Sent:* Friday, January 25, 2013 11:04 AM > > *To:* NT System Admin Issues > *Subject:* Re: Java 7 0day actively exploited in the wild | BeyondTrust*** > * > > ** ** > > Be advised that the primary vector for Java exploits into an organization > is via the web browse

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-25 Thread Kennedy, Jim
AM To: NT System Admin Issues Subject: Re: Java 7 0day actively exploited in the wild | BeyondTrust Be advised that the primary vector for Java exploits into an organization is via the web browser plugin. So, unless your B2B app is over the public network, or requires that the browser plugin be o

Re: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-25 Thread Andrew S. Baker
@elyriaschools.org] > Sent: Tuesday, January 15, 2013 12:10 PM > To: NT System Admin Issues > Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust > > Correct, but 6 is vulnerable to it's own set of exploits that were never > fixed and they are well known. Arguabl

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-15 Thread Ziots, Edward
[mailto:kennedy...@elyriaschools.org] Sent: Tuesday, January 15, 2013 1:29 PM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust I totally understand your risk vs reward scenario. We are in the same boat. Yea, in Feb this is all a moot point. -Original

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-15 Thread Kennedy, Jim
ssage- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Tuesday, January 15, 2013 12:10 PM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust Correct, but 6 is vulnerable to it's own set of exploits that were never fixed and they

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-15 Thread Sam Cayze
edy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Tuesday, January 15, 2013 12:10 PM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust Correct, but 6 is vulnerable to it's own set of exploits that were never fixed and they are well known. Arguably

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-15 Thread Kennedy, Jim
nt: Friday, January 11, 2013 1:34 PM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-f law-709713/ From: Mark Boeck

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-15 Thread Sam Cayze
Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-f law-709713/ From: Mark Boeck [netadmin...@gmail.com] Sent: Friday, January 11, 2013 12:15 PM T

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-14 Thread Kennedy, Jim
They bumped the security settings up. It prompts every time now. -Original Message- From: Richard McClary [mailto:richard.mccl...@aspca.org] Sent: Monday, January 14, 2013 9:32 AM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust Wonder if

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-14 Thread Richard McClary
0day actively exploited in the wild | BeyondTrust Java released update 11 last night. -Original Message- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Friday, January 11, 2013 2:36 PM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | Beyond

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-14 Thread Kennedy, Jim
Java released update 11 last night. -Original Message- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Friday, January 11, 2013 2:36 PM To: NT System Admin Issues Subject: RE: Java 7 0day actively exploited in the wild | BeyondTrust http://www.zdnet.com/homeland

RE: Java 7 0day actively exploited in the wild | BeyondTrust

2013-01-11 Thread Kennedy, Jim
http://www.zdnet.com/homeland-security-warns-to-disable-java-amid-zero-day-flaw-709713/ From: Mark Boeck [netadmin...@gmail.com] Sent: Friday, January 11, 2013 12:15 PM To: NT System Admin Issues Subject: Re: Java 7 0day actively exploited in the