Pavel Ignatov - Fotolia
Oracle recently announced that for the next version of the Java Development Kit, it will deprecate the Java browser plug-in because of the security risks associated with it. From a security perspective, this seems like a good move, but what does this mean for enterprises that have a lot of Java-based applications? And are there security risks we should be aware of when using the Oracle Java browser plug-in alternatives?
Oracle's Java browser plug-in has been the bane of many network administrators' lives. Although it is a popular vector hackers use to install malware or otherwise attack users, many enterprises had developed Java-based business applications and thus require administrators to support it. According to Trustwave, 78% of exploits in 2013 were targeting Java. Although the situation has improved since, it has required constant patching to prevent exploit kits and cyberespionage groups, such as Pawn Storm, from abusing zero-day and other serious vulnerabilities.
These developments, combined with the growing use of mobile device browsers, which typically don't support plug-ins, will eventually force enterprises to update and migrate from applications that rely on the Java browser plug-in. For organizations that still need client-side Java, the first option to explore is migrating from Java Applets, which rely on a browser plug-in, to the plug-in free Java Web Start technology. Java Web Start, included in the Java Platform Standard Edition 7 JDK, does not rely upon a browser, and is considered a safer way to run Java applications, partly because the most current version of the application is always used. One reason Java exploits have been so successful is that many users fail to update their version of Java.
For applets that cannot be converted to a Java Web Start application, developers can explore various alternatives suggested by Oracle in a white paper on migrating from Java applets. These include native Windows/OS X/Linux installers, which do not require a separate JRE application, or JavaFX WebView, which lets an application use an embedded version of WebKit to render HTML5 applications. Whichever option is chosen, developers should receive training in the security aspects of development, configuration and deployment, to prevent needless flaws being introduced into the new app.
Learn how to defend the Silverlight plug-in against drive-by attacks
Find out how enterprises can mitigate browser plug-in threats
Read how the AVG Web TuneUp browser extension exposed user data
Dig Deeper on Web browser security
Related Q&A from Michael Cobb
Explore the differences between symmetric vs. asymmetric encryption algorithms, including common uses and examples of both, as well as their pros and... Continue Reading
Pirated software is still a major concern nowadays. Uncover how to prevent software piracy and protect your organization's intellectual property. Continue Reading
Shellcode is a set of instructions that executes a command in software to take control of or exploit a compromised machine. Read up on the malware ... Continue Reading