By Paul Gorski
Adobe Systems Incorporated (http://www.adobe.com/) recently acknowledged a serious security bug In Adobe Flash Player v.188.8.131.527 and earlier for Windows and Macintosh. This flaw could “cause a crash and potentially allow an attacker to take control of the affected system.”
This security flaw is out in the “wild” and actively being used against computers. Adobe reports: “We are aware of reports that this vulnerability is being actively exploited in the wild via drive-by-download attacks against systems running Internet Explorer and Firefox on Windows 8.1 and below.” This means susceptible computers need only visit an infected website to be affected. See the Adobe Security Bulletin at: http://helpx.adobe.com/security/products/flash-player/apsa15-01.html.
Protect yourself against this security flaw by updating your Adobe Flash Player today. Most recent installations of Flash Player should receive automatic updates, but check your version of Flash Player at: http://helpx.adobe.com/security/products/flash-player/apsa15-01.html.
Make sure you have anti-virus/malware software installed and that it is up to date. By the time you read this, most anti-virus software programs should have the necessary updates available. Apply those updates now.
Regular readers of this column know I am not a fan of Flash Player because of the frequent serious flaws found in Flash. Flash has been a security problem for years, with flaws that could potentially affect PCs and Macs. Web developers should choose more secure technologies when developing websites.
More details and discussion regarding this particular security threat may be found at:
Again, check your Adobe Flash Player version and update as necessary at:
Paul Gorski (www.paulgorski.com) has been a technology manager nearly 20 years, specializing in workflow solutions for printing, publishing and advertising computer users. Originally destined to be a chemist, his interest in computers began in college when he wrote a program to analyze data from lab instruments he hard-wired to the back of an Apple IIe.
Posted Jan. 27, 2015