If you still need a reason to patch that installation of Adobe Reader, pay close attention to this discovery by Secure Computing's anti-malware research labs. The group has stumbled upon an exploit ...
Security firm EdgeSpot has been looking for PDF file exploits lately. Now, the firm's researchers have found two interesting ones. The first is one that uses the PDF JS API this.getPageNumWords() and ...
I get letters from a business partner and yesterday received a weird one with a link to a google docs page. The email looked official so i clicked the link. BAD. Here it is but BEWARE it is a honeypot ...
The update, labeled Security Update 2010-005, addresses a "heap buffer overflow" in the way CoreGraphics handles PDF files. The vulnerability could allow "unexpected application termination or ...
The Zeus botnet is now using an unpatched flaw in Adobe’s PDF document format to infect users with malicious code, security researchers said today. The attacks come less than a week after other ...
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. “Today, we ...
The trick involves hiding a common Adobe Reader exploit inside a PDF file that appears to antivirus software as a harmless image Criminals have started using an obscure image filter to make malicious ...
A new browser-based hack that allows users to wirelessly “jailbreak†their iPhone, iPod touch or iPad has led to fresh concerns over the security of the iOS platform, while Apple has promised that ...
Exploit targets a previously unknown vulnerability in Adobe Reader, and works even if JavaScript support is disabled, Group-IB researchers say Cyber criminals are using a new PDF exploit that bypasses ...
Exploits of Adobe’s PDF format jumped dramatically last year, and continue to climb during 2010, a McAfee security researcher said Wednesday. Microsoft , meanwhile, recently said that more than 46% of ...
The authors have taken a bug and turned it into an exploit. Once the unsuspecting user visits the website or opens the PDF, this exploit will allow further malware to be dropped on the victim’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results