![]() One of the reasons for the failure of the Java security manager is the decrease in the catalog of new virtual viruses by its manufacturer. Microsoft Word, Adobe Reader, Microsoft Excel and Microsoft PowerPoint correspond to 3%, 3%, 2% and 1% of all monitored exploits 4. ![]() Java vulnerabilities correspond to 91% of all monitored exploits worldwide. Therefore, bank passwords, social networks, photos or private videos may be stolen due to cyber infections. Then, once on an endpoint, Java malware maliciously exploits daily activities, such as navigating the internet or using utilities. Java vulnerabilities usually target personal computers, technically named endpoints. They can work on approximately 3 billion devices, including servers, personal computers, printers, smartphones, tablets, smart credit cards, and household appliances 3.Ĭontrary to its popularity, incidents of targeted attacks using Java-based malware has been on the rise in recent years 4, 5 between 20, the number of vulnerabilities exploiting Java increased by more than 300% 5. The conclusion is that Java applications have good portability. ![]() It should be emphasized that the JVM has been implemented in thousands of OSs. Additionally, Java applications are portable, so they can be executed in any OS that includes a JVM (Java Virtual Machine) without modification or an extension. Unlike machine language instructions, Java applications are OS-independent. The goal of Java technology is to focus on creating applications that can be executed on various OSs (operating systems) and computer-controlled devices. From servers to personal computers to mobile and dedicated devices, Java applications have been used in various computers 2. In the United States, Java applications are present in 97% and 89% of company computers and personal computers, respectively 1. A large portion of the content provided by the global computer network is developed using Java technology. Currently, through the use of social network applications, global computer networks have spread widely, and their applications are concerned not only with entertainment and leisure but also with work.
0 Comments
Leave a Reply. |