Adobe Flash Player is under attack AGAIN: secure your browser now


Yes, you have probably heard this one before, but software firm Adobe has rushed out an emergency patch for another vulnerability found in Adobe Flash Player.

The vulnerability codenamed CVE-2016-7855 lets hackers target your PC by sending a malicious code hidden in a Flash file.

If opened, the file can be used to install threats and other malware onto your PC, which could eventually grant hackers complete control to your whole system.  

The bug was discovered by Google’s Threat Analysis Group, who told Adobe the vulnerability is out in the wild and is currently being exploited by cyber criminals to hack PCs running Window 7, 8.1 and 10.

Adobe advises all users who have installed Flash Player on either a Windows desktop or Mac to install the security patch immediately.

“These updates address a critical vulnerability that could potentially allow an attacker to take control of the affected system,” Adobe said in a security bulletin.

If you’re using the Flash Player plugin with either the Google Chrome, Edge or Internet Explorer web browsers then the security patches will be delivered and installed automatically by Google and Microsoft.

Adobe Flashh

RIP Adobe Flash


This latest episode highlights the need for web users to move away from using Adobe Flash Player.

While in its day it helped to transform the internet, changing it from a plain JPG/GIF platform to a full multimedia and interactive experience, the software is frequently the target of hackers who exploit holes in Flash Player in a bid to access infected devices.

No sooner does Adobe patch one hole in its security, another vulnerability seems to appear.

Earlier this year it was announced that Google Chrome and Mozilla Firefox were finally going to move away from using Adobe’s much maligned Flash Player, opting instead for HTML5, which not only offers improved security but also improvements in the responsiveness and speed, meaning web pages should load faster.


Comments are closed.