I took the time period around Christmas off to do some non-nerdy stuff and came back to work to find an Adobe Security Bulletin that warns of a threat that Flash users are all too familiar with:
Adobe has released security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Adobe is aware of a report that an exploit for CVE-2015-8651 is being used in limited, targeted attacks.
Lovely. It is clear that Flash is a secure as ever. Which means it isn’t secure. Thus the usual advice applies. If you must run Flash, update now. But if you want to stay safe, remove Flash from your system and sleep better at night as a result.
Like this:
Like Loading...
Related
This entry was posted on December 29, 2015 at 10:16 am and is filed under Commentary with tags Adobe. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Adobe Once Again Warns Of Flash Threat That Can Take Control Of Your System
I took the time period around Christmas off to do some non-nerdy stuff and came back to work to find an Adobe Security Bulletin that warns of a threat that Flash users are all too familiar with:
Adobe has released security updates for Adobe Flash Player. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Adobe is aware of a report that an exploit for CVE-2015-8651 is being used in limited, targeted attacks.
Lovely. It is clear that Flash is a secure as ever. Which means it isn’t secure. Thus the usual advice applies. If you must run Flash, update now. But if you want to stay safe, remove Flash from your system and sleep better at night as a result.
Share this:
Like this:
Related
This entry was posted on December 29, 2015 at 10:16 am and is filed under Commentary with tags Adobe. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.