Facebook employees' laptops compromised

Think your users are too smart to fall victim to malware attacks? Think again. Even in a company like Facebook, where most of the employees are pretty technically astute, a sophisticated zero day attack that was based on a Java exploit recently rendered several laptops infected. According to reports, the same attack has impacted other companies, as well.

The Java bug that made the attack possible has been patched by Oracle in a Feb. 1 update, but this demonstrates that you should never assume anyone is safe from zero day threats. Read more here:

http://threatpost.com/en_us/blogs/facebook-says-employee-laptops-compromised-sophisticated-attack-021513

Deb Shinder

Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.

Share
Published by
Deb Shinder

Recent Posts

Azure Charts: If you’re not using this cool feature, you should be

This Azure Quick Tip shows you how to use Azure Charts, a great resource that…

2 hours ago

What to do after you migrate your virtual machines to the cloud

There are countless reference works available online (including many that I have written myself) that…

5 hours ago

Review: Identity verification solution Specops Secure Service Desk

Specops Secure Service Desk is an innovative solution for positively identifying a user who calls…

22 hours ago

Apple Silicon: What it means for the world of personal computing

Apple is moving away from Intel processors to use its own Apple Silicon processors to…

1 day ago

RAID 0 vs. RAID 1: When to use each level and why

Two of the most popular RAID levels for improving performance are RAID 0 and RAID…

1 day ago

Got cybersecurity tools? Good. Got too many? That may be a problem

Strength in numbers may not apply to cybersecurity tools. In fact, using too many tools…

2 days ago