	{"id":92855,"date":"2020-12-29T04:10:29","date_gmt":"2020-12-29T12:10:29","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92855"},"modified":"2020-12-29T11:21:38","modified_gmt":"2020-12-29T19:21:38","slug":"the-history-of-adobe-flash-player-from-multimedia-to-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/","title":{"rendered":"The History of Adobe Flash Player: From Multimedia to Malware"},"content":{"rendered":"<p><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" class=\"aligncenter size-large wp-image-92853\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero-1024x535.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero-300x157.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero-150x78.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero-768x401.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero-657x343.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>If you were an early adopter of the internet, you remember how the height of multimedia was <a href=\"https:\/\/www.w3docs.com\/learn-html\/html-blink-tag.html\">the &quot;blink&quot; tag, that made text on a page flash<\/a>. In order to go beyond the text and static image limitations of early web pages, a number of companies began developing tools to display rich multimedia content on the web, and the platform that became dominant was Adobe&#8217;s Flash. <\/p>\n<p>Flash had the advantage of being lightweight, and, with a browser plugin, could run on multiple operating systems. But it was also a security nightmare, presenting vulnerabilities that were regularly exploited by malware creators. Its need for regular &#8211; sometimes weekly &#8211; updates meant that users were sensitized about the need to frequently updated their plugins. This worry was exploited, and eventually led fake Flash Player installers to be the leading vector for malware on the Mac. <\/p>\n<p>Adobe has officially ended support for Flash on December 31, 2020. Here&#8217;s a look back at the checkered history of this multimedia and malware platform. <\/p>\n<h3>Early days<\/h3>\n<p>In the early 1990s, multimedia tools, such as Macromedia Director\/Shockwave or Apple&#8217;s HyperCard, allowed multimedia content to be used in apps distributed on CD-Roms. They were the basis for some of the earliest interactive software and games, such as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Encarta\">Encarta<\/a> encyclopedia, <a href=\"https:\/\/web.archive.org\/web\/20120402213934\/http:\/\/lnkall.com\/projects\/sillynoisyhouse.html\">Silly Noisy House<\/a>, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Myst\">Myst<\/a>. But the growth of the internet in the mid-1990s meant that tools were needed to provide similar content in web browsers. Bandwidth was a fraction of what people have today, so any such platform needed to be lithe and rapid. <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/encarta.png\" alt=\"\" width=\"867\" height=\"650\" class=\"aligncenter size-full wp-image-92851\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/encarta.png 867w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/encarta-300x225.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/encarta-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/encarta-768x576.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/encarta-657x493.png 657w\" sizes=\"(max-width: 867px) 100vw, 867px\" \/><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/FutureWave_Software\">FutureWave Software<\/a>, co-founded by Charlie Jackson and Jonathan Gay in 1993, first worked on some drawing software, but then changed direction to develop a vector-based animation tool to compete with Macromedia Shockwave. Vector-based animations use much less data than bitmap animations, since the data only needs to describe the relationship between points, along with colors and other data. <\/p>\n<p>The company released FutureSplash Animator in May 1996. The software was adopted by a number of major websites, such as MSN and a Disney website, and in December of that year, Macromedia bought the company and rebranded the software as Macromedia Flash. <\/p>\n<p>Flash was the leading multimedia software for several years, and in 2000, <a href=\"https:\/\/en.wikipedia.org\/wiki\/ActionScript\">ActionScript<\/a>, an object-oriented programming language inspired by Apple&#8217;s HyperTalk, was added to the Flash platform. This allowed developers to script actions rather than animate them, enhancing the types of content available, to include web games and streaming media. <\/p>\n<h3>Flash becomes dominant<\/h3>\n<p>In 2005, Adobe purchased Macromedia, and added Flash to its Creative Suite. This corresponded with the growth of video content on the web, and Flash was an easy way to embed video and play it back on web pages, since it depended on a simple plugin. Around that time, three former PayPal employees launched a startup called YouTube, and they adopted Flash as the technology for displaying videos on their website. <\/p>\n<p>Since HTML did not have direct support for video content, and since there were a variety of codecs (software used to encode and decode video content), having a single browser plug-in made it easy for anyone to download this free software and view videos. Suddenly, anyone on a Mac or Windows PC could watch videos &#8211; albeit in very low resolution, compared to today &#8211; in their browser. <\/p>\n<p>Flash was the dominant platform for displaying multimedia content on the web. When Apple was developing the iPhone, the company worked with Adobe in the hopes of using Flash on the device, but the performance was insufficient. Adobe had a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Adobe_Flash_Lite\">Flash Lite<\/a> platform, designed for mobile devices, but <a href=\"https:\/\/mashable.com\/2012\/11\/19\/history-of-flash\/\">it didn&#8217;t work well enough with mobile processors<\/a>, particularly because of its battery usage, so Flash was not offered on the iPhone. <\/p>\n<h3>The slow demise of Flash<\/h3>\n<p>It&#8217;s taken a long time, but it&#8217;s clear that the 2007 release of the iPhone marked the inflection point for Flash. Since the iPhone didn&#8217;t support Flash, YouTube developed technology to display its videos, in an app, without Flash. <\/p>\n<p>In 2010, Steve Jobs penned his <a href=\"https:\/\/web.archive.org\/web\/20100501010616\/http:\/\/www.apple.com\/hotnews\/thoughts-on-flash\/\">Thoughts on Flash<\/a> open letter, pointing out the many reasons why the company wouldn&#8217;t allow Flash on the iPhone. These included reliability, security, performance, and especially battery life. With Flash unable to be on the soon-to-be-dominant mobile device, there was no future for the software. since it was intended to be a &quot;write once, run anywhere&quot; platform, and it wouldn&#8217;t run on the device that more and more people were using to consume media, it was left behind. <\/p>\n<p>In this letter, Jobs said:<\/p>\n<blockquote>\n<p>Symantec recently highlighted Flash for having one of the worst security records in 2009. We also know first hand that Flash is the number one reason Macs crash. We have been working with Adobe to fix these problems, but they have persisted for several years now. <\/p>\n<\/blockquote>\n<p>From this point on, Flash lost its luster. YouTube began using an experimental version of its website using HTML5 in 2010, and in 2015 switched to that open standard for all its videos.<\/p>\n<h3>Flash and security<\/h3>\n<p>Because of these many security vulnerabilities, Adobe was required to issue updates to Flash Player often. (See the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/adobe-flash-player\/\">many posts on the Intego Mac Security Blog about Flash Player security updates<\/a>.) By 2011, Flash Player was no longer included with Mac OS X, and users had to download it to view Flash content on the web. Many were duped by websites telling them that they needed Flash Player to view content: they would download what they thought were legitimate Flash Player installers, only to find that malware had infected their Macs. <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-1024x681.png\" alt=\"\" width=\"1024\" height=\"681\" class=\"aligncenter size-large wp-image-92852\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-1024x681.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-300x199.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-768x510.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-1536x1021.png 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert-657x437.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/fake-alert.png 1944w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Flashback was a particularly serious Trojan Horse that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-september-26-2011-mac-flashback-trojan-horse-masquerades-as-flash-player-installer-package\/\">Intego discovered in 2011<\/a>. Flashback created a botnet &#8211; a network of computers that could be controlled remotely &#8211; and <a href=\"https:\/\/www.zdnet.com\/article\/q2-2012-flashback-infects-10-of-macs-android-malware-up-300\/\">it was estimated that it infected 10% of home Macs in 2012<\/a>, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-is-dead-yet-10-of-macs-infected-with-fake-flash-malware\/\">was still infecting about the same number of Macs in January 2020<\/a>. This prompted Apple to release a specific <a href=\"https:\/\/support.apple.com\/kb\/dl1517?locale=en_GB\">Flashback malware removal tool<\/a> in 2012.<\/p>\n<p>Flash Player updater malware was increasingly common, and became the default way to distribute malware on the Mac. Some of this malware was truly malicious, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-flash-player-update-infects-mac-with-scareware\/\">some of it was scareware<\/a>, designed to make Mac users think their computers were compromised, and pay to have them &quot;fixed.&quot; <\/p>\n<p>2016 was a particular busy year. Malware such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/\">OceanLotus<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/\">InstallCore<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\">SilverInstaller<\/a>, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/\">MacDownloader<\/a> all leveraged fake Flash Player installers that year to infect Macs.<\/p>\n<p>In 2016, because of security vulnerabilities in unpatched versions of the Flash Player plugin, <a href=\"https:\/\/support.apple.com\/en-us\/HT202681\">Apple started blocking old versions of Flash Player in its Safari web browser<\/a>, with the browser displaying a dialog prompting users to download an up-to-date version from the Adobe website. <\/p>\n<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/out-of-date.png\" alt=\"\" width=\"420\"  class=\"aligncenter size-full wp-image-92854\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/out-of-date.png 840w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/out-of-date-300x106.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/out-of-date-150x53.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/out-of-date-768x271.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/out-of-date-657x232.png 657w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/p>\n<p>In 2018, the<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\"> Shlayer malware surfaced<\/a>, attacking Macs once again through fake Flash Player installers. <\/p>\n<p>Browser plug-ins in general are problematic. For many years, we had to install and update plug-ins to be able to play certain types of content &#8211; remember Real Audio? &#8211; rather than have these elements installed natively on our computers. This led to an acceptance of this jury-rigged approach to the web, which has finally been superseded by improved HTML and CSS (Cascading Style Sheets, which describe how web content displays). <\/p>\n<h3>The end of Flash<\/h3>\n<p>Since Steve Jobs&#8217; screed against Flash Player, it had become accepted that this software was problematic. In 2015, Facebook&#8217;s head of security called for its demise, and Mozilla disabled it by default in the Firefox browser. Flash games and videos were so popular on Facebook that even <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-35151494\">the BBC ran a story about how the company was moving away from the platform<\/a>, mentioning that they, too, had ported the company&#8217;s iPlayer platform to HTML5. A Wired article at the time, <a href=\"https:\/\/www.wired.com\/2015\/07\/adobe-flash-player-die\/\">Flash. Must. Die.<\/a>, said, &quot;Flash is officially more trouble than it\u2019s worth. Here&#8217;s how you can kill it now.&quot; <\/p>\n<p>In 2017, Adobe announced that <a href=\"https:\/\/www.theverge.com\/2017\/7\/25\/16026236\/adobe-flash-end-of-support-2020\">Flash would reach the end of its life on December 31, 2020<\/a>. This warning, two and a half years before the cutoff date, gave developers plenty of time to change their technologies, but by then, many steps had already been taken to eliminate it. For some time, Google&#8217;s Chrome browser contained its own version of Flash, that was part of the browser, rather than a plug-in, and security specialists long recommended using Chrome for those users who needed to view Flash content. But in July 2019, even <a href=\"https:\/\/www.theverge.com\/2019\/6\/13\/18678388\/google-chrome-76-stable-dark-mode-incognito-flash-paywall\">Google turned off Flash by default in the browser<\/a>. <\/p>\n<p>So the time has come to say goodbye to a tool that allowed us, in the early days of the internet, to play games and view videos. This technology has been superseded by open standards, and switching away from Flash allows users to be much safer when visiting websites. The reliance on open standards means that it&#8217;s rare to find audio or video content that is incompatible with your operating system, and you don&#8217;t depend on dangerous or outdated software to experience media on your computer. <\/p>\n<p>Farewell, Flash, it was an interesting ride. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Flash Player was an early tool that provided multimedia content on the internet, but it wasn&#8217;t long before it became one of the most dangerous vectors of malware. <\/p>\n","protected":false},"author":46,"featured_media":92853,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[186,182],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Flash Player was an early tool that provided multimedia content on the internet, but it wasn&#039;t long before it became one of the most dangerous vectors of malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The History of Adobe Flash Player: From Multimedia to Malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Flash Player was an early tool that provided multimedia content on the internet, but it wasn&#039;t long before it became one of the most dangerous vectors of malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-29T12:10:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-29T19:21:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png\",\"width\":1200,\"height\":627},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/\",\"name\":\"The History of Adobe Flash Player: From Multimedia to Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#primaryimage\"},\"datePublished\":\"2020-12-29T12:10:29+00:00\",\"dateModified\":\"2020-12-29T19:21:38+00:00\",\"description\":\"Flash Player was an early tool that provided multimedia content on the internet, but it wasn't long before it became one of the most dangerous vectors of malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The History of Adobe Flash Player: From Multimedia to Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The History of Adobe Flash Player: From Multimedia to Malware\",\"datePublished\":\"2020-12-29T12:10:29+00:00\",\"dateModified\":\"2020-12-29T19:21:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#webpage\"},\"wordCount\":1486,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png\",\"keywords\":[\"Adobe Flash Player\",\"Flash Player\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Flash Player was an early tool that provided multimedia content on the internet, but it wasn't long before it became one of the most dangerous vectors of malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/","og_locale":"en_US","og_type":"article","og_title":"The History of Adobe Flash Player: From Multimedia to Malware - The Mac Security Blog","og_description":"Flash Player was an early tool that provided multimedia content on the internet, but it wasn't long before it became one of the most dangerous vectors of malware.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-12-29T12:10:29+00:00","article_modified_time":"2020-12-29T19:21:38+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png","width":1200,"height":627},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/","name":"The History of Adobe Flash Player: From Multimedia to Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#primaryimage"},"datePublished":"2020-12-29T12:10:29+00:00","dateModified":"2020-12-29T19:21:38+00:00","description":"Flash Player was an early tool that provided multimedia content on the internet, but it wasn't long before it became one of the most dangerous vectors of malware.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The History of Adobe Flash Player: From Multimedia to Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The History of Adobe Flash Player: From Multimedia to Malware","datePublished":"2020-12-29T12:10:29+00:00","dateModified":"2020-12-29T19:21:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#webpage"},"wordCount":1486,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png","keywords":["Adobe Flash Player","Flash Player"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/12\/flash-hero.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-o9F","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92855"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92855"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92855\/revisions"}],"predecessor-version":[{"id":92859,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92855\/revisions\/92859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/92853"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}