a priority update to plugVulnerability-related.PatchVulnerabilitya critical security flaw in its popular Flash Player on Windows . As per an official announcement by the company , the latest patch will addressVulnerability-related.PatchVulnerabilityissues in Adobe Flash Player 29.0.0.171 and other earlier versions . The vulnerabilities , according to Adobe , are being used by hackers to embed malicious content distributed via email . Security firm Icebrg on Thursday announcedVulnerability-related.DiscoverVulnerabilitythat a zero-day vulnerability has led to exploitation in Adobe Flash specifically targeted towards users in the Middle East . The vulnerability ( CVE-2018-5002 ) enables attackers to execute certain actions by executing code on the victims ' computers . As per the blog post , the exploit uses a Microsoft Office document for the attack . To circumvent the fact that Adobe Flash is blocked on most browsers , the exploit involves loading Flash Player from within Microsoft Office . The flaw was reportedVulnerability-related.DiscoverVulnerabilityby Icebrg in collaboration with Qihoo 360 Core Security . `` While this attack leveraged a zero-day exploit , individual attacker actions do not happen in isolation . There are several other behavioural aspects that can be used for detection . Any single observable might be low confidence but multiple observables clustered might be indicative of suspicious or malicious activity , '' said Icebrg staff in its blog post . Of course , this is not the first instance wherein Flash Player 's vulnerabilities have been exploitedVulnerability-related.DiscoverVulnerability. Back in October last year , the company had issuedVulnerability-related.PatchVulnerabilitya security patch to fixVulnerability-related.PatchVulnerabilitya critical leak . Users have been strongly recommended to update Adobe Flash in order to avoid any such vulnerabilities seeping into your machines . The update , however , is not a guarantee towards protection against future discrepancies . It is thus advised to enable flash on only a secondary browser that is not used majorly on the computer .
A Warwick company ’ s managing director is warning other businesses to protect themselves from cyber criminals after being held to ransomAttack.Ransom. Kettell Video Productions was targeted by tech scammers who infected its IT systems with viruses before demandingAttack.Ransom£1,000 in online currency Bitcoins or the files would be permanently deleted . Luckily , owner Stuart Kettell routinely backs up all his company ’ s systems so nothing was lost but he warned others to do the same to avoid disaster . “ It was scary : I had no idea about cyber-attacks before and really didn ’ t know what to do , ” he said . “ Critical files , including images and videos for clients , were wiped out along with a lifetime of personal memories . “ The affected files were lost for good – the only way to recover them was with the key code held by the blackmailer – but luckily I back-up everything to an external data cartridge . “ In the end it was more an inconvenience…but it could have threatened the business . “ I would strongly urge all business owners to back-up their essential files. ” Mr Kettell acted quickly when he realised the audio-visual specialists in Arlescote Close were under attack by the web sharks in December , 2015 . “ I noticed all my photos , videos and pdf files ghosting to white with a new filename… it attacked my desktop first then it wormed its way into folders one file at a time every few seconds , ” he said . “ I ’ ve no idea how the malware was introduced as we use software that ’ s designed to prevent against such attacks . “ And the demand for paymentAttack.Ransomseemed very professional : I was given links where I could buy Bitcoins and even offered the chance to decrypt one file for free . “ I unplugged my computer , isolated it from the internet , and ran some anti-malware software to stop the virus spreading further. ” Latest figures from the Crime Survey for England & Wales estimated there were 1.3m computer virus offences and 667,000 hacking related offences committed in the year ending September 2016 . Sergeant Gary Sirrell from the cybercrime team at West Midlands Regional Organised Crime Unit said commercial web attacks are increasingly being committed against smaller firms and not big multi-nationals . “ Small and medium sized companies are easier targets : they often don ’ t have the resources or expertise to protect against cyberattacks , ” he said . “ And if they are targeted , the impact can be devastating . “ But there are steps business owners can take to mitigate the risk . “ A really effective tactic involves ‘ layering ’ defences to include a firewall , anti-malware software , staff training and regular re-training ) around phishing email awareness , and finally to plugVulnerability-related.PatchVulnerabilityany holes in your defences by updatingVulnerability-related.PatchVulnerabilitysoftware patches and updatesVulnerability-related.PatchVulnerabilityin a timely manner . “ By exercising good cyber hygiene , and having a strong backup policy , Stuart avoided the dilemma of whether to see his business significantly damaged , or to have to hand over a ransomAttack.Ransomto organised crime gangs to get his data unlocked . “ If more businesses in the West Midlands proactively took such steps there would be significantly fewer crimes victims . ”
The details of more than 100m Indians ’ Aadhaar ID cards have leakedAttack.Databreachfrom four government portals , according to a report from the Centre for Internet and Society ( CIS ) . Based on the numbers available on the websites looked at , [ the ] estimated number of Aadhaar numbers leakedAttack.Databreachthrough these four portals could be around 130-135 million If you ’ re not familiar with the Aadhaar numbers , we ’ ve previously reported on the history of and concerns surrounding this biometric ID card . Now a fundamental part of Indian society , anyone that has not signed up faces being denied access to many government and private-sector services and schemes . As the government presses on with intertwining the card into everyday life , concerns about the security of the vast amounts of personal data being stored and the potential for its misuse by cyber-criminals continue to mount . The disclosures came as part of a report entitled Information Security Practices of Aadhaar ( or lack thereof ) : A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information , which focuses on just four of India ’ s numerous government portals : But it ’ s not just the ID numbers that the report is worried about ; it also claims that the leaksAttack.Databreachcontain “ personally identifiable information of beneficiaries or subjects of the leaked databases ” , putting the estimated number of bank accounts leakedAttack.Databreachat around 100m . The Unique Identification Authority of India ( UIDAI ) , which issues the Aadhaar numbers , claims that there have been no leaksAttack.Databreach, according to The Times of India . The paper also quotes one official as saying something rather different While Aadhaar numbers are available , the biometric information is not … The leaked databases do not pose a real threat … because the Aadhaar number can not be misused without biometrics . And another that another official as saying that the “ Aadhaar number is not confidential just as bank account number which is mentioned in cheque books and shared with lot of people ” . It seems that , despite the official line , Aadhaar numbers are getting outAttack.Databreachinto the public domain . The question has to be whether the personally identifiable information that is being published alongside them is enough for fraudsters to stealAttack.Databreachsomeone ’ s identity . I haven ’ t yet seen any reports of fraud being committed on the back of a stolen Aadhaar number . Only time will tell . While this new , controversial ID system beds itself in , the world will be watching closely to see where the cracks in security are , how fraudsters take advantage and how the government reacts to plugVulnerability-related.PatchVulnerabilityany holes . We ’ ll certainly be keeping a close eye on developments .