Adobe Flash Player’s Vulnerabilities Leaves The Door Open To Hackers
April 14, 2016
Shah Sheikh (1294 articles)
Share

Adobe Flash Player’s Vulnerabilities Leaves The Door Open To Hackers

It doesn’t matter how many times Adobe updates its Flash Player, hackers tend to find vulnerabilities in the system to infect people’s computers.  Ransomware attacks are fast becoming a big issue, and if a person thinks they can sidestep the issue, they need to think again. Once malware has affected a person’s computer, it can potentially delete their files if the ransom isn’t paid.

This is why people need to update their Flash Player the moment it’s released.

Anybody can become a victim of ransomware, and it’s difficult to know when they will take place. It can happen when they visit a website. That means you don’t have to download a program or click on ads to be infected. Without warning, their computer can become infected and they’ll be told that unless they pay money, their files are going to be deleted.

These happen because Adobe and many other developers fail to patch their software security holes, letting these hackers find a way to mess with people.

The three biggest programs that have this problem include Flash Player, Silverlight and Internet Explorer. These programs need to constantly be updated to ensure hackers don’t do serious damage to them. With major security issues, Adobe is constantly updating its files several times a week.

The most recent Flash Player is the 21.0.0.197 update, and can be downloaded for Windows users:

  • Internet Explorer – Active X
  • Google Chrome and Chromium – PPAPI
  • Firefox – NPAPI

Mac users can also download it for:

  • Safari
  • Google Chrome
  • Firefox – NPAPI
  • Chromium – PPAPI

Along with Linux and ChromeOS for Google Chrome.

The update is downloadable at get.adobe.com/flashplayer. However, it comes at a price BitmapData.draw doesn’t put the Sprites with 3D right when they are clipped by the ScrollRect. Adobe recently launched the emergency update for it, fixing the 23 vulnerabilities.

Source | Neurogadget