The Flash Apocalypse is Nigh
Image by 00luvicecream from Pixabay

The Flash Apocalypse is Nigh

I’m simultaneously amazed and not surprised that Adobe Flash is still as widely used as it is currently. I was just working with a client who uses a website for a very large financial services company where certain key features rely on Flash. And this site was just launched. I know of several other clients who regularly rely on training websites to ensure employee compliance that require Flash be enabled to view their webinars. It’s as if all the major technology companies haven’t been warning for years that Adobe Flash was a dead-end technology riddled with security flaws. Heck, Google started hammering nails in Flash’s coffin five years ago, and yet, here it is, still required throughout the corporate workplace.

“I’m not dead yet!”

Unlike the famous Monty Python scene, there’s nothing humorous about Adobe’s stated plans to discontinue support for the stand-alone Flash Player at the end of this year. Not only will it no longer be supported, Adobe has stated that it will just stop working at that point, and should be uninstalled. I can see some of you scratching your head, “Hang on, isn’t Flash built into my browser?” And therein lies maybe a small amount of grace for tardy developers who are hoping to eke out a few more miles from their Flash content. Chrome, Firefox and Edge all have Flash built into the browser, but make you manually unblock each website that still requires Flash to operate, and there are, as of today, no definite dates for when those browsers kick Flash to the curb for good. You can bet that it won’t be too much past Adobe’s deadline. If you are relying on a website that still uses Flash, you know who you are: the hoops you have to jump through to use a Flash website are essentially impossible to avoid. Make sure you contact your content provider to find out what plans they have, if any, to upgrade their websites when Adobe Flash finally shuffles off this mortal coil.

Read more at www.C2Techs.net

要查看或添加评论,请登录

Christopher Woo的更多文章

  • Your business isn’t too small to be targeted

    Your business isn’t too small to be targeted

    Noted security company Acronis recently released its mid-year 2022 report on cyber security, and to say that their…

  • The Elements of a Secure Email Account

    The Elements of a Secure Email Account

    Though the numbers are dwindling rapidly, there are still plenty of working professionals who have spent more time…

  • Don’t expect Facebook to honor your privacy

    Don’t expect Facebook to honor your privacy

    As someone who is beyond jaded by social media and the mega-corporations behind them, this news isn’t surprising, and I…

  • Should you flag a number as “spam”?

    Should you flag a number as “spam”?

    It happens to all of us. You are elbow deep in your day’s work (or fun, if you are fortunate!) and your phone buzzes.

  • Honda key fobs vulnerable to hack

    Honda key fobs vulnerable to hack

    If you are a long-time reader of this blog, you’ll know that while the majority of our focus is on business technology,…

    1 条评论
  • AirTags opened a Pandora’s Box of privacy problems

    AirTags opened a Pandora’s Box of privacy problems

    If there is one thing that is certain, if there is a useful technology invented that is supposed to benefit us, there…

  • Assembling a proper WFH environment

    Assembling a proper WFH environment

    It’s 2022 and approaching the third(!) year of the pandemic. Your company is onboard with “telecommuting” and perhaps…

  • Password and Account Madness

    Password and Account Madness

    Warning: this article will melt your brain. Consume in small portions and rest frequently.

  • Should you limit what you do with your phone?

    Should you limit what you do with your phone?

    Today’s smartphones are incredibly powerful. If you are savvy enough, and determined, you could probably do a good…

    1 条评论
  • T-Mobile breached again

    T-Mobile breached again

    Most Americans have stopped keeping count but this will be the fifth or sixth data breach for T-Mobile, the second…

社区洞察

其他会员也浏览了