Adobe Flash Player零日漏洞威胁网络用户


Criminals use appears in the new Adobe Flash Player zero-day drive-by download vulnerability by malware infections unsuspecting website visitors.

Zero-day vulnerability is a flaw in a previously unknown, there is no available patches and updated security software can handle it.

CISCO security researchers reported that hackers exploit the vulnerability spread adware and establish botnets. A botnet is a group of usually without the consent of the computer owner’s computer hackers to take over, and used for evil purposes, such as the spread of malware, send spam e-mail or launch denial of service attacks.

A famous blog Kafeine first reported this zero-day vulnerability has been included in the famous Anger in hacking toolkit. Exploit kit contains tools to create malware attacks, and can be sold for profit on the Internet.

Kafeine also reported that the real test Windows 8.1 and Chrome browser users from this vulnerability.

Flash Player in recent years has been found to have many loopholes, and has become the target of hackers. Many Web sites require users to install Flash Player to display Flash animations. Hackers have focused on other web technology, but also require a local user applications such as Java, Adobe Reder and Silverlight.

As this vulnerability, there is no patch can repair, but Adobe has been aware of the problem and said they are looking for solutions.

Comodo Internet Security (CIS) provides the best zero-day protection, because it uses a unique “default deny” architecture that supports auto-sandbox, preventing the verification procedures for the safe operation of the system. They will run in a sandbox known as a safe and reliable system, so files can be analyzed unknown whether there are malicious behavior.

Comodo security software, including a terminal management version, you can ensure your safety, because it depends not only detect known threats to those systems that require frequent updating virus signature files.

Write a comment