Adobe releases patches for 60+ vulnerabilities

On November 14, Adobe released patches to fix numerous security flaws, including serious issues with Adobe Flash and Reader. These vulnerabilities affect Mac, PC and Chrome OS. In order to protect against these and future vulnerabilities, you should make sure that automatic updates are set:

https://helpx.adobe.com/flash-player/kb/flash-player-background-updates.html

and remember to restart your browser on a regular basis to ensure that any updates are fully applied.

This is just the latest reminder of the serious security issues associated with running Flash. NYU IT recommends that you uninstall it completely by downloading and running the Uninstaller from adobe.com. If you enabled Flash to complete the Benefits Annual Enrollment process, this is a good time to remove it. In addition, Adobe has announced that Flash is being retired by 2020 and replaced with newer interactive media, such as HTML5.

If you need to run Flash, require permission before the plugin runs, so that you can control the circumstances in which it is used. You can set this up via the Adobe Settings Manager website (which, ironically, requires Flash to run) to “Always Ask” before performing functions.

https://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager02.html

or check the instructions for your browser below:

If you would like more information on the specific vulnerabilities addressed by these updates, see: