HT5642: About the security content of iOS 6.1 Software UpdateLearn about About the security content of iOS 6.1 Software Update
Currently Being ModeratedJan 31, 2013 7:40 AM (in response to billiefromden haag)
There's apparently another security bug in Java.
Depending on what you're working with, you may be able to download and invoke the application outside of the browser — such as can be done with Minecraft — or you can both enable the Java JVM plug-in within the browser and also disable the version-check defenses in Xprotect (see the comments here for details) that are blocking the Java webstart stuff (again), if you need to run that stuff from the web browser.
Otherwise, Oracle will likely be providing an update to block the most recent attacks.
There are two other potential wrinkles here, where the Java JVM web plug-in disables itself after some interval of non-use, and there are also diagnostics issued when launching an app that isn't signed by a developer ID from Apple. Java checks for its own signatures, and Apple checks for its signatures, and the Java apps aren't signed with the Apple keys.
Currently Being ModeratedJan 31, 2013 9:22 AM (in response to billiefromden haag)
@Mr. Hoffman. Thanks very much for your answer to my problem. I'll try your approach and see if it works. I just so wish that Apple had a message explaining the problem for us all. On one hand it is good that it is blocked of course, but they just should've made it clear why it isn't working. Perhaps next time they will. :-)
Currently Being ModeratedFeb 1, 2013 1:31 PM (in response to billiefromden haag)
This appears to be documentation for the Oracle patch; this update includes fixes for 44 security vulnerabilities that can reportedly effect clients running Java.