{"id":1040,"date":"2014-02-20T22:58:08","date_gmt":"2014-02-21T02:58:08","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/?p=1040"},"modified":"2016-09-05T15:38:00","modified_gmt":"2016-09-05T19:38:00","slug":"zero-day-adobe-and-microsoft-exploits","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2014\/02\/20\/zero-day-adobe-and-microsoft-exploits\/","title":{"rendered":"Zero Day Adobe and Microsoft Exploits"},"content":{"rendered":"<p>Adobe has released <em>(for the second time this month)<\/em> an emergency update for its widely used Flash Player to combat active attacks that exploit a previously unknown security bug that hackers are actively exploiting to surreptitiously install malware on end-user computers.<\/p>\n<p><strong><span style=\"text-decoration: underline;\">Attackers are already exploiting it!<\/span><\/strong><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Please apply this patch and stay secure.<br \/>\n<\/span><\/strong>If your version of Flash on Chrome (on either Windows, Mac or Linux) is not yet updated, you may just need to close and restart the browser. The version of Chrome that includes this fix is v. 33.0.1750.117 for Windows, Mac, and Linux. To learn what version of Chrome you have, click the stacked bars to the right at of the address bar, and select \u201cAbout Google Chrome\u201d from the drop down menu (the option to apply any pending updates should appear here as well).<\/p>\n<p>The most recent versions of Flash are available from the Adobe <strong><span style=\"color: #9b00d3;\">download <\/span><\/strong><a href=\"http:\/\/get.adobe.com\/flashplayer\/\"><strong><span style=\"color: #9b00d3;\">center here<\/span><\/strong><\/a><strong><span style=\"color: #9b00d3;\">, <\/span><\/strong>but beware potentially unwanted add-ons, like McAfee Security Scan, Chrome browser etc..). To avoid this, uncheck the pre-checked box before downloading, or grab your OS-specific Flash download from here. Windows users who browse the Web with anything other than Internet Explorer will need to apply this patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).<\/p>\n<p>AND..<\/p>\n<p>Microsoft has released a stop-gap fix for a previously unknown zero-day vulnerability in Internet Explorer versions 9 and 10 to combat a separate zero-day campaign. IF possible (many users cannot because of other &#8216;line of business software&#8217; that requires versions 9 or 10) to update to version 11 of IE, since it contains exploit mitigations not available in earlier releases. Those who are prevented from running version 11 should install the Microsoft fix as soon as possible.<\/p>\n<p>Microsoft site explanation <a href=\"https:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/02\/19\/fix-it-tool-available-to-block-internet-explorer-attacks-leveraging-cve-2014-0322.aspx\"><strong><span style=\"color: #9b00d3;\">is here<\/span><\/strong><\/a><\/p>\n<p>Actual \u2018Fix-It tool <a href=\"http:\/\/go.microsoft.com\/?linkid=9844137\"><strong><span style=\"color: #9b00d3;\">is here<\/span><\/strong><\/a><\/p>\n<p>If you run it make sure you \u2018right-click\u2019 on the file after it\u2019s downloaded and \u2018Run As Administrator\u2019<\/p>\n<p>Be safe folks, Peace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe has released (for the second time this month) an emergency update for its widely used Flash Player to combat active attacks that exploit a previously unknown security bug that hackers are actively exploiting to surreptitiously install malware on end-user computers. Attackers are already exploiting it! Please apply this patch and stay secure. If your &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2014\/02\/20\/zero-day-adobe-and-microsoft-exploits\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Zero Day Adobe and Microsoft Exploits&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[50,175,10,213,21,13,151,11],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/1040"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=1040"}],"version-history":[{"count":2,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/1040\/revisions"}],"predecessor-version":[{"id":1071,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/1040\/revisions\/1071"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=1040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=1040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=1040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}