> Rather than using typical targeted approaches like "spear phishing" with e-mails to individuals, the attackers used a "watering hole" attack—compromising the server of a popular mobile developer Web forum and using it to spring the zero-day Java exploit on site visitors.<p>> "The attack was injected into the site's HTML, so any engineer who visited the site and had Java enabled in their browser would have been affected," Sullivan told Ars, "regardless of how patched their machine was."<p>It seems it's high time now to start working with two separate profiles in a browser if you're forced to use Java - one internal-only with Java enabled, and the second for browsing the internet, with Java disabled (of course this works as long as your internal apps do not get hacked...).<p>Rather easy to achieve with Firefox (probably there are command line switches for Chrome as well):<p>1. Create two profiles, `external` and `internal`, using
`firefox -p`<p>2. Open external profile and disable Java (will be kept in profile settings)<p>Then, run first `firefox -p external`, then `firefox -no-remote -p internal`, that way links opened e.g. from email clients will go to the external instance.<p>To differentiate the two instances, you can install some theme: <a href="http://www.getpersonas.com/en-US/" rel="nofollow">http://www.getpersonas.com/en-US/</a><p>Total paranoiacs could try to find/write some extension that will block all the pages other than approved internal ones in the internal profile (perhaps AdBlock Plus will do?).