Pages

Sunday, January 28, 2018

Flash's end of life: How should security teams prepare?

Whether you're a fan of Adobe Flash or not, it has been a building block for interactive content on the web, and we must acknowledge what it has accomplished before talking about its eventual removal from the internet. These plug-ins helped usher in a new age of web browsing and, at the same time, were targets for vulnerabilities and exploits within browsers.

As HTML5 becomes more popular, even now becoming close to a standard, use of the once-popular Flash is diminishing. Using HTML5 enables a more secure and efficient browsing experience that works across both mobile and desktop platforms.

Adobe is aware that, even though Flash is steadily declining, there are still many sites that rely on their technology to function; therefore, Adobe has given a timeframe of 2020 before Flash's end of life. The company knew it needed to give clients who are currently using its software the proper lead time to migrate toward other software to run their applications before pulling the plug.

Adobe itself has encouraged those using Flash to migrate any existing Flash content to new open formats. During this time, Adobe has mentioned that it will stop updating and distributing Flash, but will continue to support it through regular security patches, features and capabilities. Hearing this, I get the feeling that they'll be keeping Flash on life support for a while, before they completely pull the plug on the project altogether.

In order to not be caught off guard when Flash's end of life is official, security teams should be aware of which applications in their organization are currently using Flash, and then create migration paths to have them updated to HTML5 or other open standards. Even if there might be small portions of support after 2020, you never want to be running end-of-life code, especially code that has historically had security vulnerabilities.

Also, security teams should take notice of which desktops are currently using the Flash plug-in and attempt to have it removed around this time. Since Flash acceptance has declined, and will continue to take a nose-dive after this news, there should be less need for the Flash plug-in moving forward.

You should prepare for Flash's end of life by taking stock of your systems; remove the plug-in for systems that may connect to sites that haven't migrated away from Flash yet. By following the school of thought of least privilege and having only software that's needed installed, the attack surface becomes limited.

Eventually, Flash won't be supported, and if bugs are found within the software, then attackers could utilize them for phishing attacks by supporting sites that are designed to use Flash and haven't migrated away. If you don't need it, don't install it.

Read the rest of my article here: http://searchsecurity.techtarget.com/answer/Flashs-end-of-life-How-should-security-teams-prepare

68 comments:

  1. The information security landscape has changed dramatically in recent years. While the network hacker continues to pose a threat, regulatory compliance has shifted the focus to internal threats. 토토사이트

    ReplyDelete
  2. Security for these semi-rural areas is a growing concern. Trespassing, theft and burglary are major concerns for rural property owners and residents as sometimes crooks view these rural isolated areas as easy marks security companies

    ReplyDelete
  3. Nice post. I learn something more challenging on different blogs everyday. It will always be stimulating to read content from other writers and practice a little something from their store just like Earth day Poems for the kids . I'd prefer to use some with the content on my blog whether you don't mind. Thanks for sharing.

    ReplyDelete
  4. Functions of such agency are unlimited and depend upon the field of security deployment. While choosing a security services in Thiruvanmiyur agency.

    ReplyDelete
  5. By looking after one 'store' rather than a few, copy stock expenses are dispensed with. privacidadenlared.es

    ReplyDelete
  6. The article was up to the point and described the information very effectively. Thanks to blog author for wonderful and informative post.
    Security Solution firm

    ReplyDelete
  7. You are a very persuasive writer. I can see this in your article. Nice Post. You have a way of writing compelling information that sparks much interest.

    ReplyDelete
  8. This is a informative post. Post that is trustworthy, informative, and local will be, The good news is that once you stop posting such clickbait stories. My social platforms are given below. Please follow us.
    creativemarket
    riverdavesplace
    inprnt

    ReplyDelete
  9. Thank you for give us great and informative post. That is very useful for us i think that post Read lots of people so brand your self that click that link

    ReplyDelete

  10. شركة غسيل خزانات بالمدينة المنورة شركة غسيل خزانات بالمدينة المنورة
    افضل شركة تنظيف منازل بالمدينة المنورة شركة تنظيف منازل بالمدينة المنورة

    ReplyDelete
  11. Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work. buy facebook 5 star reviews

    ReplyDelete
  12. On the other hand they might have the option to offer fundamental web related administrations however battle when their customer's prerequisites are progressively intricate or custom. Digital Market service

    ReplyDelete
  13. for example, exceptionally constructed substance the executives frameworks, internet business, blog comment service

    ReplyDelete
  14. فنحن نقوم بكافة أعمال التنظيف للشقق والفلل والقصور نعمل على تنظيف كافة المنزل بداية من الأرضيات سواء كانت بلاط أو سراميك أو رخام و أيضا نقوم بتنظيف فرش الأرضيات سواء موكيت أو سجاد بأكثر من طريقة سواء باستخدام البخار أو بجهاز الرغوة الالية أو باستخدام الفرشاة الاليه. كما نقوم بتنظيف الأثاث بأجود المواد التي لا تؤثر على درجة الالوان أو حالة الأخشاب كما نقوم بتلميع الزجاج ممها بلغ ارتفاعة.

    شركة غسيل موكيت بابها
    شركة عزل خزانات بابها
    شركة تنظيف خزانات المياه بابها
    شركة تنظيف كنب بابها
    شركة رش مبيدات بابها
    شركة رش مبيدات بابها
    شركة مكافحة الحشرات بابها

    ReplyDelete
  15. Insights show that about 40% of the SEOs in the market handle at any rate 11 customers while 23% SEOs handle at any rate 21 customers. blog comments service in 1$

    ReplyDelete
  16. If you're back-linking via weblogs, make sure to place good quality remarks. If you're placing junk e-mail remarks, they'll be moderated as well as your web site's or even blog's hyperlink won't appear with regard to open public show. High Authority SEO

    ReplyDelete
  17. Along these lines, realizing them well ahead of time can give the chance to either transform them or moderate any issues they may cause.SEO PACKAGE

    ReplyDelete
  18. نحن نمتلك مجموعة من الخبراء والمتخصصين فى شركة تنظيف بابها ونحن نستطيع التعامل مع كافة المساحات المختلفة فلا يهم ان كنت تمتلك منزل او فيلا فأن لدينا خبرات كبيرة تمكنا من تقديم خدماتنا على اكمل وجه ولدينا عمال وفنيين محترفين ولهم خبرات مختلفة نقدم ايضآ تنظيف لواجهات الشركات والفنادق. فكل ما تحتاجه من معدات واجهزة ومنظفات ذات جودة عالمية موجودة بشركتنا فنحن نسعى فقط لارضاء العميل أولآ واخيرآ

    شركة عزل خزانات بخميس مشيط
    شركة مكافحة حشرات بخميس مشيط
    شركة غسيل مجالس بخميس مشيط
    شركة غسيل خزانات المياه بخميس مشيط
    شركة غسيل خزانات بخميس مشيط
    شركة تنظيف شقق بابها

    ReplyDelete
  19. Mistakenly arrangement DNS servers will in general reason personal time and creep blunders. Backlinks service

    ReplyDelete
  20. With the goal that the sites which is having the total insights regarding your business and gives more data to your customers or buyers and makes Business Card Design

    ReplyDelete
  21. Yahoo, Ask.com, AOL, Baidu, DuckDuckGo and so forth.) without making any installment to them.Letterhead Design

    ReplyDelete
  22. page as there are a few sites have just been recorded under these web crawler stages so which needs to make a solid Logo Design

    ReplyDelete
  23. exceptionally high and there are arrangements of elements that for the most part impact the site positioning. Brand Identity Design

    ReplyDelete
  24. website architecture and improvement, internet showcasing and site improvement that before the computerized office was authored, Songs Lyrics

    ReplyDelete
  25. Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic. If possible, as you gain expertise, would you mind updating your blog with extra information? It is extremely helpful for me. Dolittle 2020

    ReplyDelete
  26. Your business card and other stationery ought to be an impression of your business - a window to the spirit. In this way, on the off chanceCooperate Identity design

    ReplyDelete
  27. Thank you because you have been willing to share information with us. we will always appreciate all you have done here because I know you are very concerned with our. oftWave Therapy Equipment

    ReplyDelete
  28. Regardless of whether they are in course deals, pre-request, conveyance or hardware administration, blink app for pc

    ReplyDelete
  29. When it comes time to find private investigators San Diego, you are going to want to think about several things. First of all, you are going to want to make... huffexpress

    ReplyDelete
  30. Hacking is the new force. It has surfaced as one of the major and noticeable digital wrongdoings which should be countered. Known about the expression, precious . Subway surfer hack

    ReplyDelete
  31. نحن نمتلك مجموعة من الخبراء والمتخصصين فى شركة تنظيف بابها ونحن نستطيع التعامل مع كافة المساحات المختلفة فلا يهم ان كنت تمتلك منزل او فيلا فأن لدينا خبرات كبيرة تمكنا من تقديم خدماتنا على اكمل وجه ولدينا عمال وفنيين محترفين ولهم خبرات مختلفة نقدم ايضآ تنظيف لواجهات الشركات والفنادق. فكل ما تحتاجه من معدات واجهزة ومنظفات ذات جودة عالمية موجودة بشركتنا فنحن نسعى فقط لارضاء العميل أولآ واخيرآ

    شركة عزل خزانات بخميس مشيط
    شركة مكافحة حشرات بخميس مشيط
    شركة غسيل مجالس بخميس مشيط
    شركة غسيل خزانات المياه بخميس مشيط
    شركة غسيل خزانات بخميس مشيط
    شركة تنظيف شقق بابها

    ReplyDelete
  32. A great website with interesting and unique material what else would you need. security jobs near me

    ReplyDelete
  33. This is my first time i visit here. I found so many entertaining stuff in your blog, especially its discussion. From the tons of comments on your articles, I guess I am not the only one having all the leisure here! Keep up the good work. I have been meaning to write something like this on my website and you have given me an idea. Life insurance quotes

    ReplyDelete
  34. Extremely pleasant and fascinating post. I was searching for this sort of data and appreciated perusing this one. Continue posting. Much obliged for sharing. Domino99

    ReplyDelete
  35. Conforming to the interloper will likewise get you some an opportunity to think and plan a potential getaway when they let their gatekeeper down. home invasion

    ReplyDelete
  36. A blog like yours should be earning much money from adsense.’~::- IT Support Essex

    ReplyDelete
  37. Can anyone help me out? It will be much appreciated. Cyber Security

    ReplyDelete
  38. Can you give me some tips for piece of software writing? Erklärungsvideo

    ReplyDelete
  39. Every email you send should have your signature with the link to your web site or weblog. That usually brings in some visitors. zahnarzt zürich

    ReplyDelete
  40. Click Halal Provide you Halal Meat delivery in United Kingdom online. We offers you halal lamb meat, halal beef, halal sheep, frozen chicken, fish & sirloin steak

    ReplyDelete
  41. What a fantabulous post this has been. Never seen this kind of useful post. I am grateful to you and expect more number of posts like these. Thank you very much. Security System Provider

    ReplyDelete
  42. Thank you because you have been willing to share information with us. we will always appreciate all you have done here because I know you are very concerned with our. http://www.automotorszerelo.hu/

    ReplyDelete
  43. The following are important advances that must be taken just as specific contemplations that you might need to consider before stepping toward opening your own security monitor organization: Security company Toronto

    ReplyDelete
  44. I admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. 먹튀폴리스

    ReplyDelete
  45. I liked this article for its research content and words used. Thanks for sharing
    Please do visit our blog
    Banquets in Indore

    ReplyDelete
  46. breach the security When your website or blog goes live for the first time, it is exciting. That is until you realize no one but you and your.

    ReplyDelete
  47. Awesome article! I want people to know just how good this information is in your article. It’s interesting, compelling content. Your views are much like my own concerning this subject. buy instagram video likes and views

    ReplyDelete
  48. The accompanying measurements portray the reality of cyber harassing. cyber security in hyderabad

    ReplyDelete
  49. Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers as defined by ITU-T X. 800 Recommendation. Examples of security services are key management, access control, and authentication. security company birmingham

    ReplyDelete
  50. Another frugal tip is growing your own plants from seeds, which is a lot of fun, and very much cheaper than buying instant plants and vegetables for your garden. frugal living

    ReplyDelete
  51. I am thankful to you for sharing this plethora of useful information. I found this resource utmost beneficial for me. Thanks a lot for hard work. Importer Security filling

    ReplyDelete
  52. Currently, security Robots are not designed or intended for intervention. Their role is to be a www.24response.com commanding or "authoritative" presence and act as a "look-out" and hopefully serve as a deterrent to nefarious activity.

    ReplyDelete
  53. Artikel yang luar biasa. Sangat menarik untuk dibaca. Saya sangat suka membaca artikel yang bagus. Terima kasih! terus goyang Security Guard Training Toronto

    ReplyDelete
  54. Glimmer's finish of life is legitimate, Help With Economics Homework security groups ought to know about which applications in their association are right now utilizing Blaze, and afterward make movement ways to have them refreshed to HTML5 or other open principles. Regardless of whether there may be little bits of help after 2020, you never need to be running finish of-life code, particularly code that has generally had security weaknesses.

    ReplyDelete
  55. Thanks for the blog filled with so many information. Stopping by your blog helped me to get what I was looking for. Now my task has become as easy as ABC. Complete Alarm Systems

    ReplyDelete