In the past, malicious program would wait until the wee hours of the morning to communicate with their overlords, but there are so many applications on a computer nowadays polling the Net for information and updates that delays are no longer necessary. "They don't have to wait," he said. "They can get lost in all the chatter."
If companies need to use old copies of Java with known vulnerabilities, Hansmann recommended they at least take an inventory of where they're using Java. "Do they really need it on all their systems?" he asked.
Sign up for MIS Asia eNewsletters.