Sharing is caring!

Security updates for software programs aren’t a rare occurrence, but they do need to be heeded when announced. Adobe was fresh from patching a zero-day vulnerability for its Flash Player when it again, released another security update on November 8. This time, the issue was nine code execution flaws that could allow an attacker to wrestle control of a device if the system remains vulnerable.

While some users easily dismiss updates, Adobe labeled this one as “critical” so every user who has Flash Player products on their system should get the update. The affected products were the Flash Players for desktops, Google Chrome, Microsoft Edge, Internet Explorer 11 and Linux. The easiest way to update is through the product’s own update mechanism. But users can also head to the Download Center to get a copy and manually install a new version.

Adobe also suggests checking on the product version after updating Flash Player. Doing this ensures that the Player has indeed been bumped up to the latest version. After the update, Flash Player should be version on desktops, Chrome, Edge, Explorer and version on Linux.

Also on the same day, Adobe also released a security update for Adobe Connect for Windows. The issue resolved was an input validation vulnerability found in the events registration module allowing it to be used in cross-scripting attacks. The versions of Connect affected were 9.5.6 and earlier. Once upgraded, the version should be 9.5.7.

If you are still running version and version of Flash Player, you better get an update now. Security on the web has always been a hot topic but it takes on a new meaning these days what with the advancement of technology and the increased sophistication of those who want nothing more to do than inflict harm.