1. frogboy

    Security Alert Recently Patched Flash Bug Can Leak Windows Credentials

    Earlier this week, Adobe patched a vulnerability in Flash Player that allows an attacker to use malicious Flash files to leak Windows credentials. The security issue is tracked under the CVE-2017-3085 identifier and affects Flash Player versions from 23.0.0.162 up to 26.0.0.137, running on...
  2. Petrovic

    Update Adobe Flash Player 25.0.0.127 Final | AIR 25.0.0.134 Final | Shockwave Player 12.2.8.198

    Be sure to uncheck any unwanted add-ons if offered. Although Adobe suggests downloading the update from the Adobe Flash Player Download Center, that link includes a pre-checked option to install unnecessary extras, such as McAfee Scan Plus or Google Drive. If you use the download center...
  3. Andra Zaharia

    Security Alert: RIG EK Exploits Outdated Popular Apps, Spreads Cerber Ransomware

    Hi everyone! I just wanted to quickly share our latest security alert. At the moment, cybercriminals are using a swarm of malicious domains to launch drive-by attacks against unsuspecting users. The campaign works by injecting malicious scripts into insecure or compromised systems. Victims...
  4. frogboy

    Flash tops the Exploit Kits Chart in 2016 again

    If you needed another reason not to use Flash anymore, a new security report by Recorded Future may convince you to consider this at the very least. The company analyzed 141 exploits kits that were available between November 16, 2015 and November 15, 2016. The main takeaway of the research...
  5. frogboy

    Security Alert Proofpoint: Microsoft Word Intruder 8 Adds Support for Flash Vulnerability

    Researchers from Proofpoint have issued a warning following an analysis of Microsoft Word Intruder (MWI), a kit designed for building malicious Microsoft Word documents for use in targeted attacks. In a blog post on the firm’s website, Proofpoint staff said the most recent iteration of MWI...
  6. Logethica

    Q&A Major Websites That Still Use Flash Player

    Major Websites That Still Use Flash Player: SOURCE: neurogadget.com (ARTICLE DATE: 4 Sep 2016) As much as every website wants to adopt HTML5, there are several factors that make this impossible. This is why many websites, apps and software still uses Flash player despite its security concerns...
  7. kev216

    Microsoft Edge will pause flash content in future updates

    "Adobe Flash isn't responding." It's the message you can feel coming as soon as your browser grinds to a halt and you abandon all hope of salvaging what you were working on. Well, if you're a developer that's part of the Windows Insider program and have grabbed Windows 10 build 14316, you're...
  8. frogboy

    Exploit Broker Zerodium Offers $100k Per Flash Zero-Day

    Exploit broker Zerodium has announced a month-long bounty program for code that can bypass the new heap isolation mitigation in Flash Player. It said that it will pay up to $100,000 per working zero-day. Adobe has been working to strengthen Flash Player, a perennially popular target for...
  9. frogboy

    Surprise! Flash Is Not 2015's Most Insecure Software

    Flash ranks only 3rd in 2015's most vulnerable software list Now that 2015 has officially ended let's take a retrospective look over what happened during the past year when it comes to critical or highly critical security vulnerabilities. During the past 365 days, independent security...
  10. frogboy

    Facebook Ditches Flash for HTML5 Video

    Users won't probably notice, but developers will Facebook announced today that will no longer serve videos via Flash anymore, ditching the much-maligned technology for the newer, cooler, and much safer HTML5 alternative. At the end of January, YouTube announced it was giving up Flash and...
  11. S

    Adobe Flash Player Multiple Vulnerabilities

    I didn't see this posted after a search. I wanted to make sure that everyone knows about the 20+ Vulnerabilities in Adobe Flash Player. The update was released on August 9th I believe. Security Bulletin: Adobe Security Bulletin Original Source...