A recent leak of internal documents from gray-hat software developer Hacking Team has revealed another zero-day vulnerability in the Flash plugin. As Ars Technica reports, the vulnerability has been verified by anti-virus maker Symantec and is known to affect Internet Explorer, though Symantec believes it can affect Flash in other browsers, as well. If exploited, this vulnerability could allow an attacker to remotely execute code on a targed machine.
In Symantec's blog post on the topic, the company warns, "Given the source of the proof-of-concept code, it is possible that this vulnerability has already been exploited in the wild. Following its disclosure, it can be expected that groups of attackers will rush to incorporate it into exploit kits before a patch is published by Adobe." Ars says Adobe is aware of this vulnerability and plans to issue a patch on Wednesday. In the meantime, we concur with their advice to disable Flash if possible.
|Huawei P10 phones mash more data together for better pictures||0|
|LG goes long with its upcoming G6 smartphone||3|
|In the lab: Asus' Tinker Board SBC||16|
|Corsair Lighting Node Pro brings light strip control to every PC||8|
|In the lab: HyperX's Alloy FPS mechanical gaming keyboard||10|
|Team Group Cardea SSDs are ready to handle the heat||7|
|Gigabyte's Ryzen motherboards are home, home on the range||41|
|Zotac molds GTX 1050s into low-profile tiny terrors||8|
|TR forums spotlight: krazyredboy's crazy simulator PC||21|
|Best part of the article? We're flying home with Ryzen review samples as of this writing.||+44|