Log4j vulnerability: What you need to know

A vulnerability that gives hackers the ability to remotely execute code has been discovered in a software library  used in services provided by Microsoft, Amazon, Apple, IBM and many others.

Here is what you need to about the Log4j vulnerability:

  1. It’s a major security risk. By exploiting the Log4j vulnerability, hackers can take full control of a system. One technology CEO called the vulnerability “a design failure of catastrophic proportions.”
  2. Companies are scrambling to fix it. Companies are releasing patches and providing other mitigation efforts to remediate the problem. If you haven’t already, you’ll likely see updates from online services you use about this vulnerability in the coming days.
  3. You can protect yourself by keeping your devices up to date. Install updates for software and hardware when they become available to bolster your defenses against this new vulnerability.  In addition to computers, home WiFi routers, media players and smart home automation devices may be vulnerable.
If you have any questions, please contact the Technology Support Center at 856-256-4400, or submit a ticket in the Rowan Support Portal.