SEE: Updated report with response from Adobe and FoxIt SoftwareA security researcher has managed to create a proof-of-concept PDF file that executes an embedded executable without exploiting any ...
The identity thieves behind the Zeus malware attacks are now using the "/launch" command feature in Adobe Reader to launch malicious attacks without exploiting a vulnerability in the software. Yes, ...
Security response teams at Adobe and FoxIt are investigating ways to mitigate a new PDF hack that allows the execution of an embedded executable without exploiting any security vulnerabilities. A demo ...
PDFex can bypass encryption and password protection in most PDF readers and online validation services Researchers in Germany have invented a new hack that can allow someone to break the encryption of ...