Security firm EdgeSpot has been looking for PDF file exploits lately. Now, the firm's researchers have found two interesting ones. The first is one that uses the PDF JS API this.getPageNumWords() and ...
Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet Your email has been sent Attackers have been exploiting a zero-day vulnerability in Adobe Acrobat ...
This week a new web-based jailbreak tool was released which allows you to jailbreak all sorts of iDevices just by visiting a web page and swiping your finger across a screen. It makes installing ...
According to BleepingComputer, there’s a serious vulnerability in Acrobat Reader that can be exploited to steal sensitive data. Security researcher Haifei Li says that hackers have been abusing this ...
A sophisticated, two-phase attack that hides in PDF documents could be the first in a long line of exploits that target vulnerabilities in Adobe applications, researchers said this week. In a blog ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. This voice experience is generated by AI. Learn more. This ...
Attackers have been exploiting one of the recently-revealed vulnerabilities in Adobe Reader for at least three weeks, security researchers said today, with one estimating the infection count at “many ...
Adobe Systems Inc. has confirmed that there’s a critical bug in its most popular programs, but it doesn’t yet have a patch that protects Windows XP users against attacks arriving as PDF files. In an ...
Adobe is investigating the report, but has yet to confirm that the exploit bypasses the sandbox protection in Adobe Reader 10 and 11 Researchers from security firm FireEye claim that attackers are ...
The malicious PDF files are detected as Trojan.Pidief.G and the dropped files as Trojan Horse. This vulnerability is not one we have seen in the wild before and affects Adobe Flash. The authors have ...
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch yet available. Attackers have been exploiting a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results