The first trojan capable of taking over multiple operating systems is in the wild. The trojan uses the Java Virtual Machine as its entry point. Once executed the trojan downloads a custom set of libraries which give it ownership over the infected computer. Any systems using Java is vulnerable to the attack. once infected the computers can be used for anything including identity theft. As usual customers should install all updates as soon as they become available. Helper applications such as Flash and Java are an increasingly popular vector among virus and trojan writers.