The Latest in IT Security

Posts Tagged ‘adobe reader’

24
Apr
2012

Rogue AVs have not really taken much attention recently probably because they are no longer boldly screaming in everyone’s faces as compared to the time when the most trending topics produce massive amounts of blackhat SEO-poisoning URLs. So where are they lurking nowadays? They are still using the SEO-poisoning method, of course. They would need […]

Read more ...

Phony LinkedIn invitations are not a new phenomenon. What tends to change is the underlying delivery method used for the malware distribution – In this case compromised websites that unknowingly host malicious scripts. The LinkedIn reminders that are included in the attack include several variables such as names, relationships, and the number of messages awaiting […]

Read more ...

PDF exploits have been targeted by Blackhole exploit kits for some time now. The Blackhole exploit kit will deliver various malicious PDF files to a user if the victim is running a potentially vulnerable version of Adobe Reader. When these PDFs are opened through Adobe Reader, a known vulnerability is exploited which will then compromise […]

Read more ...


Categories

SUNDAY, JUNE 08, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments