Sharing is caring!

With Adobe Flash Player soon to be out, and HTML 5 coming in, users are sure to experience many different things, during the transition and when HTML 5 is widely used and becomes part of the web standards. Video publishers will be more than happy to have a specific standard that is set for publishing videos. Most of them have been forced to stick to Flash player to run business ads.

On the one hand, they would have a problem displaying ads into DoubleClick Digital Marketing and AdWords if Google will no longer accept display ads built using Flash, which is an eventuality when 2016 ends. Because Flash-built display ads don’t render well on mobile phones, most publishers have a separate strategy for mobile ads. When HTML5 becomes standard, they would have to change their workflow that they have been following for years.

But sticking with Flash is not really a good alternative. Adobe Flash Player is plagued with vulnerabilities that the usual pattern is that they release an update, announce a new vulnerability, and then send a patch. And if users fail to update to fix a zero-day vulnerability, for instance, attackers can still take advantage.

The reality is that Flash is being used as a route for attackers, as it presents holes suitable for exploitation. In a recent report, a private U.S. for-profit company SANS said that the EITest campaign that has been distributing malware payloads using Angler EK, has switched to using Neutrino EK. But the infection is still spread via Adobe Flash Player.

If security vulnerabilities continue to be left unattended, more serious threats could come your way. 3 exploit kits have been detected – Neutrino, Magnitude and Angler, all of which have been used to infect systems with ransomware, such as DMA Locker and CryptXXX. Trojans are also trotting their way into vulnerable systems. These include Gootkit and Dridex, two banking Trojans that suck out online banking credentials and millions of money from bank accounts, respectively.

According to director of engineering at Qualys, Amol Sarwate, during an interview with, hackers are moving into exploiting vulnerabilities instead of “finding a zero day –  i.e., previously unknown – vulnerability, is time consuming and involved”.

The only defense user have is to update applications, strictly follow security restriction policies, and install the latest patches. This is why users of Adobe Flash Player are advised to allow automatic updates to ensure vulnerabilities don’t stay vulnerable for long.