Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Adobe on Friday issued an emergency patch for a critical bug in its Flash Player software that is being used in targeted malware attacks.
Updating to Flash version 184.108.40.206 for Windows, Macintosh and Linux closes an "object confusion" vulnerability that, if exploited, could cause an application crash or, worse, lead to the takeover of a system, according to a bulletin.
Adversaries currently are delivering emails containing the exploit as part of an attachment. Right now, only users of Internet Explorer for Windows are being hit.
Flash for Android-based mobile devices also have been updated. If the software is installed on Google's Chrome browser, it automatically was updated so users don't need to take any action.
Users are advised to patch as soon as possible.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.