Please note the a high risk Java vulnerability was announced on 11 Jan 2013. It allows a Java application to grant itself permission to execute arbitrary code. An attacker could use social engineering techniques to entice a user to visit a link to a website hosting a malicious Java application.
Any web browser using the Java version 7 plug-in is affected. Some common Java tools like Java Deployment Toolkit plug-in and Java Web Start can also be used as attack vectors. Reports indicate this vulnerability is being actively exploited, and exploit code is publicly available. There is no solution/patch provided by Oracle so far.
ITS is working on accessing the implication to the central IT Services when Java in users' PCs and other system servers are disabled and will announce a plan as soon as we possibly can.
US –CERT alert: http://www.us-cert.gov/cas/techalerts/TA13-010A.html
U.S. warns on Java software as security concerns escalate: http://news.yahoo.com/government-warns-java-security-concerns-escalate-160640366--sector.html
Procedure to disable Java: http://www.java.com/en/download/help/disable_browser.xml
Information Security Team