<div style="text-align:center"><img src="http://www.pingonope.com/wp-content/uploads/2011/12/wtf4.jpg" alt="Imagem inline 1"><br></div><div style="text-align:center"><br></div><a href="http://blogs.technet.com/b/mmpc/archive/2012/07/25/how-to-protect-yourself-from-java-based-malware.aspx" style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-style:initial;border-color:initial;font:inherit;vertical-align:baseline;color:rgb(0,83,153);text-decoration:none;font-family:Verdana,Arial,sans-serif;line-height:18px;background-color:rgb(255,255,255)">Microsoft</a><span style="color:rgb(37,37,37);font-family:Verdana,Arial,sans-serif;font-size:12px;line-height:18px;background-color:rgb(255,255,255)"> has decided is enough is enough: Java-based malware sees no end and it's time to do something about it. The software giant points to two type-confusion vulnerabilities (</span><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507" style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-style:initial;border-color:initial;font:inherit;vertical-align:baseline;color:rgb(0,83,153);text-decoration:none;font-family:Verdana,Arial,sans-serif;line-height:18px;background-color:rgb(255,255,255)">CVE-2012-0507</a><span style="color:rgb(37,37,37);font-family:Verdana,Arial,sans-serif;font-size:12px;line-height:18px;background-color:rgb(255,255,255)"> and </span><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1723" style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-style:initial;border-color:initial;font:inherit;vertical-align:baseline;color:rgb(0,83,153);text-decoration:none;font-family:Verdana,Arial,sans-serif;line-height:18px;background-color:rgb(255,255,255)">CVE-2012-1723</a><span style="color:rgb(37,37,37);font-family:Verdana,Arial,sans-serif;font-size:12px;line-height:18px;background-color:rgb(255,255,255)">) that have been very actively exploited in recent months. Redmond thus wants you to do one of three things: update Java, disable it, or uninstall it. </span><div>
<font color="#252525" face="Verdana, Arial, sans-serif"><span style="font-size:12px;line-height:17px">leia mais: </span></font><a href="http://www.zdnet.com/microsoft-update-java-or-kill-it-7000001650/">http://www.zdnet.com/microsoft-update-java-or-kill-it-7000001650/</a></div>
<div><a href="http://techblog.avira.com/2012/03/29/critical-java-exploit-used-to-spread-malware/en/">http://techblog.avira.com/2012/03/29/critical-java-exploit-used-to-spread-malware/en/</a></div><div><a href="http://thehackernews.com/2012/04/new-java-exploits-boosts-blackhole.html">http://thehackernews.com/2012/04/new-java-exploits-boosts-blackhole.html</a> </div>
<div><div style="text-align:center;font-family:verdana,sans-serif"><div style="text-align:right"><div style="text-align:left"><div style="text-align:left"><font size="1"><span style="font-variant:normal;font-family:verdana,sans-serif"><p style="text-align:center">

</p></span></font></div><div style="text-align:center;font-family:verdana,sans-serif"></div></div></div></div><div style="text-align:center"><div style="text-align:left"><font size="1"><span style="font-family:verdana,sans-serif"><i>Att. Kembolle Amilkar </i></span><br style="font-family:verdana,sans-serif">
<span style="font-family:verdana,sans-serif">#/</span><span style="font-family:verdana,sans-serif">[ <a href="http://www.kembolle.com.br" target="_blank">kembolle.com.br</a> ] - Consultoria Segurança da Informação. </span><br style="font-family:verdana,sans-serif">
<span style="font-family:verdana,sans-serif">#/ [ <a href="http://samurayconsultoria.com.br" target="_blank">samurayconsultoria.com.br</a> ] - Chief Security Officer - Samuray Consultoria. </span><br style="font-family:verdana,sans-serif">
<span style="font-family:verdana,sans-serif">#/ Systems Analyst | Esp. Information Security | Computer Forensic Expert | </span><br style="font-family:verdana,sans-serif"><span style="font-family:verdana,sans-serif">#/ Owasp Chapter Lider Cuiabá - <a href="https://www.owasp.org/index.php/Cuiaba" target="_blank">https://www.owasp.org/index.php/Cuiaba</a></span><br style="font-family:verdana,sans-serif">
<span style="font-family:verdana,sans-serif">#/ Mobile: [65] 9979-2925  && contato[at]<a href="http://kembolle.com.br" target="_blank">kembolle.com.br</a>.</span></font></div><div style="text-align:left"><font style="font-family:verdana,sans-serif;color:rgb(153,153,153)" size="1"><b></b></font></div>
</div>
<br>
</div>