… if you haven’t already, that is.
There has been a barrage of coverage lately addressing ongoing security issues with Java and Universal Plug-and-Play (UPnP). Summarizing a mountain of detail that is only relevant to a small percentage of users, the takeaway is that almost everyone should: (1) Disable Java in the browser OR uninstall it completely; and (2) Disable UPnP on your router AND test it for remote UPnP vulnerabilities.
As for UPnP, the technology is built into many routers, and is supposed to make connection of networked devices easier by automatically opening ports and configuring network settings. Unfortunately, convenience doesn’t always coexist with security, and UPnP has been shown to have a number of vulnerabilities. Your best option: Turn it off in the router’s administration portal, and also run a Shields Up test to ensure that your router is not exposed to attack from outside the network. Keep in mind that some routers have been found to leave UPnP on regardless of the setting in their configuration screen, while others reportedly do not offer an option to disable it, so your mileage may vary…