A recent leak of internal documents from gray-hat software developer Hacking Team has revealed another zero-day vulnerability in the Flash plugin. As Ars Technica reports, the vulnerability has been verified by anti-virus maker Symantec and is known to affect Internet Explorer, though Symantec believes it can affect Flash in other browsers, as well. If exploited, this vulnerability could allow an attacker to remotely execute code on a targed machine.
In Symantec's blog post on the topic, the company warns, "Given the source of the proof-of-concept code, it is possible that this vulnerability has already been exploited in the wild. Following its disclosure, it can be expected that groups of attackers will rush to incorporate it into exploit kits before a patch is published by Adobe." Ars says Adobe is aware of this vulnerability and plans to issue a patch on Wednesday. In the meantime, we concur with their advice to disable Flash if possible.
|In the lab: Asus' ROG Strix Z270E Gaming motherboard||9|
|Android apps coming to all future Chromebooks||0|
|Steam client lets users move games and use Xbox controllers||4|
|Samsung Galaxy S8 phones won't appear at MWC||4|
|Xiaomi exec Hugo Barra leaves Chinese handheld maker||4|
|Samsung details the cause of Note 7 battery fires||22|
|Mushkin enters the keyboard market with the Carbon KB-001||32|
|Report: PC gaming hardware market expands to an all-time high||45|
|Asus ROG Maximus IX Formula chills with an EKWB waterblock||4|
|Face it. We all know the success of PC Gaming is because of the invention of the RGB LED.||+51|