Blog Posts Tagged with "Flash"
September 10, 2012 Added by:Le Grecs
Convenience vs. Security: My goal of not installing Flash and Java on a new system didn't last more than a few hours. Yet, as infosec professionals, following the disable unnecessary services philosophy, we advise not installing these types of applications for security reasons...
November 21, 2011 Added by:Emmett Jorgensen
There is software that can scan your network and check for these un-patched systems. The software can report back exactly which software updates are missing, and then use another tool to actually exploit those vulnerabilities. An attacker could take complete control of your computer...
October 12, 2011 Added by:Emmett Jorgensen
When will manufacturers stop using Flash as the primary storage? Consider that in 2002 many experts assumed that Flash cells would not be stable when scaled past 45nm and predicted that it would need to be replaced by 2010. We know now that those predictions proved to be false...
August 10, 2011 Added by:Headlines
Adobe has released patches for multiple products, including Flash, Shockwave, Photoshop and RoboHelp. This is the first security update released in nearly a month, and four of the five updates are labeled as being of "Critical Severity". Summaries and links to the patches are as follows...
May 16, 2011 Added by:Keith Mendoza
I don't know what credibility Vupen has left as a company in the eyes of the information security industry. They're actions are no different from patent trolls or the many script kiddies who troll around the web showing their half-baked warez...
April 18, 2011 Added by:Headlines
Adobe has issued an update to counter the latest Flash player zero-day flaw which is similar to a vulnerability patched last month that was suspected of playing a critical role in the network breach of security vendor RSA, a division of EMC...
April 12, 2011 Added by:Headlines
This vulnerability could allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash file embedded in a Microsoft Word file delivered as an email attachment...
April 04, 2011 Added by:Headlines
Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...
December 22, 2010 Added by:Headlines
Security in the cyber space is paramount, but in the face of reduced budgets caused by the poor economy, many business are letting security best practices fall to the way side. Astaro has comprised the following top five internet vulnerabilities businesses can not afford to ignore...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013